Research reveals growing gaps between AI experimentation and risk patterns as usage deepens across business workflows MOUNTAIN VIEW, Calif., Feb. 5, 2026 /PRNewswireResearch reveals growing gaps between AI experimentation and risk patterns as usage deepens across business workflows MOUNTAIN VIEW, Calif., Feb. 5, 2026 /PRNewswire

As Enterprise AI Use Deepens, New Research Highlights the Urgent Need for Data Governance

2026/02/06 00:18
Okuma süresi: 4 dk

Research reveals growing gaps between AI experimentation and risk patterns as usage deepens across business workflows

MOUNTAIN VIEW, Calif., Feb. 5, 2026 /PRNewswire/ — Enterprise use of AI is expanding rapidly across development, operations, and knowledge work, but new research shows these changes in behavior are creating new data risks that legacy technology can’t see or govern. The 2026 AI Adoption & Risk Report, released today by Cyberhaven Labs and based on billions of real-world data movements around Generative AI SaaS applications, endpoint AI applications, and AI agents, offers a clear-eyed look at how enterprises are actually using AI and why governance and data security must be ready for these changes.

“What this research makes clear is that enterprise AI adoption isn’t just accelerating, it’s fragmenting,” said Nishant Doshi, CEO of Cyberhaven. “A small set of teams is moving fast and embedding AI deeply into daily work, while security and governance are often playing catch-up. As organizations plan for 2026 and beyond, the risk isn’t AI itself; it’s not understanding how AI is actually being used. Without visibility into which tools are in play, what data is flowing through them, and where controls need to adapt, enterprises risk widening the gap between innovation and trust.”

The report surfaces the following key findings about enterprise AI adoption and usage:

1. An AI Adoption Gap is Emerging
AI adoption and use is not unfolding as a steady, industry-wide wave. Instead, it is becoming increasingly polarized.

  • A widening gap is emerging between AI early adopters and organizations that remain hesitant to embrace these technologies.
  • The top 1% of early adopter organizations use more than 300 GenAI tools.
  • By contrast, cautious enterprises typically employ fewer than 15 GenAI tools.

2. Most GenAI SaaS Tools Are Objectively Risky, with the Average Employee Entering Sensitive Data into AI Tools Once Every Three Days
Most AI use today occurs in tools that do not meet traditional enterprise risk standards — yet employees continue to enter sensitive data into them at high rates.

  • Across the top 100 most-used GenAI SaaS applications, 82% are classified as “medium,” “high,” or “critical” risk.
  • Cyberhaven Labs data shows that 32.3% of ChatGPT usage occurs through personal accounts, as does 24.9% of Gemini usage.
  • 39.7% of all data movements into AI tools involve sensitive data, including prompts or copy-paste actions.
  • This behavior significantly limits organizational visibility into AI usage and data flows.

3. Coding Assistants and AI Agents are Becoming the “Second Wave” of Workplace AI
AI coding assistants (such as Cursor, GitHub Copilot, and Claude Code) continued to grow steadily through 2025.

  • In companies leading in AI adoption, nearly 90% of developers use these tools, whereas in a typical organization, adoption is closer to 50%.
  • On the other side of the spectrum, only 6% of developers use AI coding assistants. This illustrates the growing gap of AI adoption, with developers at frontier companies being 11.5× more likely to use AI coding assistants.
  • In the later months of 2025, 30% of developers using AI coding assistants reported using at least two.

As enterprise AI adoption continues to accelerate, the Cyberhaven Labs 2026 AI Adoption & Risk Report underscores a widening divide between innovation and oversight. AI adoption is becoming uneven across organizations, teams, and workflows, with the highest levels often occurring in environments with the least mature governance and visibility.

“AI is no longer a side experiment for most enterprises; it’s becoming a core part of the infrastructure,” added Doshi. “Organizations that succeed will be those that move beyond one-size-fits-all policies and invest in security approaches that reflect real usage patterns. By bringing visibility, context, and control together, enterprises can enable teams to innovate with AI while maintaining trust, compliance, and resilience as adoption continues to evolve.”

Explore the full report findings here.

These research findings will be discussed live during a webinar today with Harvard Business Review Analytic Services, featuring a conversation among Alex Clemente, Managing Director, HBR-AS, Nishant Doshi, CEO, Cyberhaven, and Dan Walsh, CISO, Datavant. Register here.

Earlier this week, Cyberhaven announced the general availability of its Data Security Posture Management solution, a key part of its unified AI & data security platform, purpose-built to protect sensitive data wherever it lives and goes, including endpoints, SaaS, cloud, on-prem environments, and AI workflows.

About Cyberhaven
Cyberhaven protects sensitive data wherever it lives and goes. Built for the AI era, Cyberhaven’s unified data security platform combines DSPM, data loss prevention, insider risk management, and AI security with deep data lineage and agentic AI. Cyberhaven helps organizations stop data loss, reduce insider risk, and enable AI adoption securely, without slowing their business. For more information, visit www.cyberhaven.com.

Media Contact:
press@cyberhaven.com

Cision View original content to download multimedia:https://www.prnewswire.com/news-releases/as-enterprise-ai-use-deepens-new-research-highlights-the-urgent-need-for-data-governance-302680423.html

SOURCE Cyberhaven

Piyasa Fırsatı
The Mountain Logosu
The Mountain Fiyatı(MOUNTAIN)
$0.0001577
$0.0001577$0.0001577
-4.19%
USD
The Mountain (MOUNTAIN) Canlı Fiyat Grafiği
Sorumluluk Reddi: Bu sitede yeniden yayınlanan makaleler, halka açık platformlardan alınmıştır ve yalnızca bilgilendirme amaçlıdır. MEXC'nin görüşlerini yansıtmayabilir. Tüm hakları telif sahiplerine aittir. Herhangi bir içeriğin üçüncü taraf haklarını ihlal ettiğini düşünüyorsanız, kaldırılması için lütfen service@support.mexc.com ile iletişime geçin. MEXC, içeriğin doğruluğu, eksiksizliği veya güncelliği konusunda hiçbir garanti vermez ve sağlanan bilgilere dayalı olarak alınan herhangi bir eylemden sorumlu değildir. İçerik, finansal, yasal veya diğer profesyonel tavsiye niteliğinde değildir ve MEXC tarafından bir tavsiye veya onay olarak değerlendirilmemelidir.

Ayrıca Şunları da Beğenebilirsiniz

Wormhole Unveils W Token 2.0 with Enhanced Tokenomics

Wormhole Unveils W Token 2.0 with Enhanced Tokenomics

The post Wormhole Unveils W Token 2.0 with Enhanced Tokenomics appeared on BitcoinEthereumNews.com. Joerg Hiller Sep 17, 2025 13:57 Wormhole introduces W Token 2.0, featuring upgraded tokenomics, a strategic Wormhole Reserve, and a 4% base yield, aiming to optimize ecosystem growth and align incentives. Wormhole has announced a significant upgrade to its native token, unveiling the W Token 2.0. This upgrade introduces new tokenomics including the establishment of a Wormhole Reserve, a 4% base yield, and an optimized unlock schedule, marking a pivotal development in the ecosystem, according to Wormhole. The W Token Evolution Launched in October 2020, Wormhole’s W token has been central to the platform’s mission of creating a connected internet economy. The latest upgrade aims to enhance the token’s utility across more than 40 blockchains. With a capped supply of 10 billion, the W token supports governance, staking, and ecosystem growth, aligning incentives for network security and development. Introducing the Wormhole Reserve The Wormhole Reserve will accumulate value from both onchain and offchain activities, supporting the ecosystem’s expansion. As Wormhole adoption grows, the token will capture value through network expansions and ecosystem applications, ensuring that growth is directly reflected in the token’s value. 4% Base Yield and Governance Rewards Wormhole 2.0 introduces a 4% base yield for W holders who actively participate in governance. The yield, derived from existing token supplies and protocol revenues, is designed to incentivize active participation without inflating the token supply. Optimized Unlock Schedule Updating its token release schedule, Wormhole replaces annual cliffs with bi-weekly unlocks, starting October 3, 2025. This change aims to reduce market pressure and provide a more stable environment for investors and contributors. The bi-weekly schedule will span over 4.5 years, affecting categories such as Guardian Nodes and Community & Launch. Wormhole’s Future Vision With these upgrades, Wormhole aims to expand its role as…
Paylaş
BitcoinEthereumNews2025/09/18 15:48
Hacker behind the UXLINK attack loses $48 million to a phishing scam

Hacker behind the UXLINK attack loses $48 million to a phishing scam

The post Hacker behind the UXLINK attack loses $48 million to a phishing scam appeared on BitcoinEthereumNews.com. The UXLINK exploiter has been phished merely hours after the AI-powered Web 3 social platform’s multi-sig wallet had been breached. Lookonchain had reported on Monday that UXLINK’s multi-signature wallet was compromised, with funds drained across centralized and decentralized exchanges.  According to the blockchain analytics platform, the attacker was phished and lost 542 million UXLINK tokens, valued at approximately $48 million.  Interestingly, the hacker who attacked $UXLINK was targeted by a phishing attack and lost 542M $UXLINK($48M).https://t.co/Cp9QNHPE8Xhttps://t.co/M8tbPYAdiq pic.twitter.com/PxadIIfkDi — Lookonchain (@lookonchain) September 23, 2025 UXLINK had earlier admitted that its multi-sig wallet had been breached, and said that “a significant amount of crypto” was illicitly transferred, but most of them were frozen. “Our team is working through legal and compliant measures to ensure that the UXLINK token supply fully aligns with the rules stated in the whitepaper. The white paper remains the sole community consensus and standard for UXLINK’s token economy,” the project team wrote on X. UXLINK breach involved six wallets Security monitoring firm Cyvers Alerts flagged unusual activity early Monday on an Ethereum address linked to UXLINK. The account executed a delegateCall, removed the existing administrator role, and added a new multisig owner. After making the change, the hacker moved at least $4 million in USDT, $500,000 in USDC, 3.7 wrapped Bitcoin (WBTC), and 25 ETH. Onchain evidence also showed that the attacker sold UXLINK tokens on decentralized exchanges using six separate wallets. These trades netted at least 6,732 ETH, valued at roughly $28.1 million. Hours after pulling off the UXLINK exploit, the attacker themselves fell victim to a phishing scheme. Arbiscan onchain records show the loss occurred on Tuesday at around 02:15 UTC under the transaction hash 0xa70674ccc9caa17d6efaf3f6fcbd5dec40011744c18a1057f391a822f11986ee. Phishing attack on the UXLINK scammer. Source: Arbiscan. Two large transfers of UXLINK tokens were directed from the…
Paylaş
BitcoinEthereumNews2025/09/23 18:34
Tron Makes Bold Moves in TRX Tokens Acquisition

Tron Makes Bold Moves in TRX Tokens Acquisition

Tron's Justin Sun supports TRX's strategic treasury initiative. TRX prices rise, signaling short-term recovery, yet long-term climate is uncertain. Continue Reading
Paylaş
Coinstats2026/02/09 15:28