Key Takeaways
- 57% of breaches involved the use of stolen credentials (per Verizon DBIR 2024 using 2023 data)
- 70% of organizations reported they use conditional access policies for risk-based access decisions (2024)
- 1.2 billion records were exposed due to data breaches in 2023 (global total reported by HIPAA Journal)
- 63% of organizations reported using third-party software as part of their application stack (2024)
- 49% of organizations reported they have experienced a security incident caused by a third party or vendor (2024)
- 22,000+ vulnerabilities were added to the NVD in 2023 (NVD annual totals)
- 1,600 vulnerabilities are disclosed per day on average globally (per VulnDB/industry analyses based on NVD and other sources, 2023)
- $5.02 million average cost of a data breach in 2018, as reported by IBM Cost of a Data Breach Report (2018)
- The average time to identify a breach was 207 days and average time to contain was 75 days (2023)
- $247.0 billion global cybersecurity spending forecast for 2029 (Gartner forecast)
- A $2.11 billion US market for security information and event management (SIEM) in 2023 (Frost & Sullivan)
- $5.0 billion global market for identity and access management (IAM) in 2024 (MarketsandMarkets)
- 3.4 million ransomware attacks were blocked in 2023 by Microsoft Defender and Microsoft 365 security products, reported in Microsoft’s Security Blog metrics
- The US Federal Government reported 61,000 cybersecurity incidents in FY 2023 (per CISA incident reporting dashboard)
- In 2023, CISA analyzed 2,000+ vulnerabilities and published guidance for critical infrastructure agencies (CISA vulnerability guidance output)
Stolen credentials and third party risk drive major breaches, as malware, phishing, and vulnerabilities keep escalating.
Cloud & Identity
Cloud & Identity Interpretation
Ransomware Exposure
Ransomware Exposure Interpretation
Third Party Risk
Third Party Risk Interpretation
Vulnerability Landscape
Vulnerability Landscape Interpretation
Cost & Roi
Cost & Roi Interpretation
Market Size
Market Size Interpretation
Industry Trends
Industry Trends Interpretation
Performance Metrics
Performance Metrics Interpretation
Security Operations
Security Operations Interpretation
How We Rate Confidence
Every statistic is queried across four AI models (ChatGPT, Claude, Gemini, Perplexity). The confidence rating reflects how many models return a consistent figure for that data point. Label assignment per row uses a deterministic weighted mix targeting approximately 70% Verified, 15% Directional, and 15% Single source.
Only one AI model returns this statistic from its training data. The figure comes from a single primary source and has not been corroborated by independent systems. Use with caution; cross-reference before citing.
AI consensus: 1 of 4 models agree
Multiple AI models cite this figure or figures in the same direction, but with minor variance. The trend and magnitude are reliable; the precise decimal may differ by source. Suitable for directional analysis.
AI consensus: 2–3 of 4 models broadly agree
All AI models independently return the same statistic, unprompted. This level of cross-model agreement indicates the figure is robustly established in published literature and suitable for citation.
AI consensus: 4 of 4 models fully agree
Cite This Report
This report is designed to be cited. We maintain stable URLs and versioned verification dates. Copy the format appropriate for your publication below.
Kevin O'Brien. (2026, February 13). Security Statistics. Gitnux. https://gitnux.org/security-statistics
Kevin O'Brien. "Security Statistics." Gitnux, 13 Feb 2026, https://gitnux.org/security-statistics.
Kevin O'Brien. 2026. "Security Statistics." Gitnux. https://gitnux.org/security-statistics.
References
- 1verizon.com/business/resources/reports/dbir/
- 2microsoft.com/en-us/security/business/identity/conditional-access
- 21microsoft.com/en-us/security/blog/
- 3hipaajournal.com/data-breach-statistics/
- 4owasp.org/www-project-dependency-check/
- 5gartner.com/en/newsroom/press-releases/2023-09-12-gartner-survey-finds
- 10gartner.com/en/newsroom/press-releases/2024-04-01-gartner-forecast
- 6nvd.nist.gov/vuln/search
- 7cve.org/Resources/Statistics
- 8ibm.com/security/data-breach
- 9ibm.com/reports/data-breach
- 11store.frost.com/security-information-and-event-management-siem-market/
- 12marketsandmarkets.com/Market-Reports/identity-and-access-management-market-1920.html
- 14marketsandmarkets.com/Market-Reports/endpoint-detection-and-response-EDR-market-1117.html
- 15marketsandmarkets.com/Market-Reports/threat-intelligence-market-1080.html
- 17marketsandmarkets.com/Market-Reports/managed-security-services-market-1837.html
- 13fortunebusinessinsights.com/cloud-security-market-107245
- 16fortunebusinessinsights.com/security-analytics-market-105032
- 18marketwatch.com/press-release/global-managed-detection-and-response-mdr-market-size-to-grow-at-a-cagr-of-xx-during-2024-2033-2024-09-xx
- 19isc2.org/Research/Workforce-Study
- 20cisa.gov/resources-tools/reports-cisa
- 22cisa.gov/cybersecurity-incident-reporting-dashboard
- 23cisa.gov/publication
- 24transparencyreport.google.com/phishing
- 25transparencyreport.google.com/safe-browsing/overview
- 30transparencyreport.google.com/traffic/overview?hl=en
- 31transparencyreport.google.com/safe-browsing/search?hl=en&count=9&siteType=compromised
- 26ic3.gov/Media/PDF/AnnualReport/2024_IC3Report.pdf
- 27ic3.gov/Media/PDF/AnnualReport/2023_IC3Report.pdf
- 28veracode.com/state-of-software-security-report
- 29apwg.org/trendsreports/
- 32csrc.nist.gov/publications/detail/sp/800-207/final
- 33csrc.nist.gov/publications/detail/sp/800-61/rev-2/final
- 34csrc.nist.gov/publications/detail/sp/800-53/rev-5/final






