Threat Intelligence

Secure Data Movement: Zero Trust Bottleneck

84% of government security leaders say sharing sensitive data spikes cyber risk—yet half still use manual transfers in 2026. Zero Trust's real bottleneck? Secure data movement nobody discusses.

{# Always render the hero — falls back to the theme OG image when article.image_url is empty (e.g. after the audit's repair_hero_images cleared a blocked Unsplash hot-link). Without this fallback, evergreens with cleared image_url render no hero at all → the JSON-LD ImageObject loses its visual counterpart and LCP attrs go missing. #}
Graph showing 84% cyber risk increase from data sharing in Zero Trust environments

Key Takeaways

  • 84% of security leaders see data sharing as a major cyber risk amplifier.
  • 53% rely on manual data movement processes amid rising AI threats.
  • Cross-domain tech resolves the speed-security myth in Zero Trust.

84% of government IT security leaders agree: sharing sensitive data across networks heightens cyber risk. That’s the stark opener from the fresh Cyber360 report, surveying 500 pros in government, defense, and critical services across the U.S. and UK.

A number that stops you cold.

Why Secure Data Movement Is the Zero Trust Bottleneck

Zero Trust programs promise airtight security—no implicit trust, ever. But here’s the hitch: they assume connectivity solves the puzzle. Open a ticket, spin up a gateway, shove the data through. Problem fixed? Wrong. Dead wrong.

New data nails it. 53% of these orgs still lean on manual processes for data movement between systems. In 2026. With AI cranking operations to blistering speeds on attack and defense sides alike. This isn’t a glitch; it’s the core reason so many Zero Trust rollouts sputter and stall.

The gap? Data movement itself. Not identity verification. Not endpoint hardening. The pipes carrying the payload across boundaries.

Think of it like this: Zero Trust is a fortress with perfect walls, but the drawbridge — creaky, manual, wide open to tampering — is where invaders slip in.

Threats aren’t waiting politely.

Is Secure Data Movement Failing National Security?

Cyber360 clocks an average 137 attempted or successful cyberattacks per week against national security outfits in 2025, up from 127 the year prior. U.S. agencies? A 25% weekly surge.

Enterprises mirror the mess. Verizon’s 2025 Data Breach Investigations Report shows third-party breaches doubling to 30% of incidents. IBM pegs multi-environment breaches at $5.05 million average — a cool million more than on-prem alone.

Boundaries are the bleeders: IT to OT, tenants to clouds, partners to internals. Dwell time and dollars pile up there.

“78% of respondents cited outdated infrastructure as a primary source of cyber vulnerability, specifically pointing to analog systems and manual processes as weak links.”

That’s Cyber360, blunt as a hammer.

49% call out data integrity in transit — stopping tampering across classified or coalition nets — as their top headache. 45% wrestle with identity across domains. Attackers have feasted on these for years.

Dragos’ 2025 OT report adds fuel: 75% of OT attacks now spark from IT breaches, with 70% of OT systems linking to IT nets soon. Air gaps? Ancient history. And don’t get started on managed file transfers — Cl0p’s MOVEit rampage hit 2,700 orgs, exposing 93 million souls’ data. GoAnywhere, Cleo: same playbook, same weak pipes.

Speed and security aren’t enemies — that’s the myth.

Can You Have Fast AND Secure Data Movement?

Pick one, teams figure: zippy transfers or ironclad protection. Most grab security, swallow the lag. Fine for minute-long decisions. Useless for seconds. Catastrophic for milliseconds.

AI flips the script. Autonomous detection pipelines don’t twiddle thumbs at gateways. They act. But when 53% of national security shops manually shuffle data, the gap between AI demand and analog reality? That’s your attack surface, glaring.

An AI model — fraud spotter, threat sorter, target analyzer — thrives on fresh, trusted data. Stale feeds or unverified arrivals? It chokes on garbage in, garbage out. Bottleneck’s not the brains. It’s the plumbing.

Cross-domain tech steps up here, not as a tick-box but a game-repairer. Enforce trust at boundaries, not after. Coordinate systems smoothly, ditching brittle point-to-point links attackers shred effortlessly.

History echoes this loud.

The Historical Parallel: Enigma’s Pipes

World War II codebreakers cracked Enigma not by hacking the machine — but by owning the transmission lines. Data en route was the soft underbelly. Allies bombed cables, intercepted couriers, starved the flow.

Fast-forward: today’s digital battlespace runs parallel. Secure data movement isn’t a side quest; it’s the Enigma of our era. Ignore it, and your Zero Trust castle crumbles from plumbing rot. Bold call: by 2027, orgs mastering cross-domain pipes will cut breach costs 40%, as AI defenses finally breathe free.

Corporate hype often glosses this — gateways as saviors! — but Cyber360 strips the spin. Manual processes? Outdated infra? They’re the villains, not the vendors’ shiny toys.

The fix demands rethinking.

Cross-Domain Tech: Zero Trust’s Missing Link

Properly deployed, these tools nix the speed-security false choice. Validate at the edge: filter, policy-check, release. Systems sync as one organism, not duct-taped silos.

Cyber360 hints at the shift. Respondents crave it — integrity guards, multi-domain auth, automated flows. No more Cl0p-style pipe bombs.

Prediction: AI acceleration forces this. Detection loops hit milliseconds; data lags kill them. National security orgs first, then enterprises. The 137 weekly hits? They’ll plummet for adapters.

But inertia bites. 78% stuck on legacy. Time to unplug the manuals.

Unique insight: this bottleneck mirrors the early internet’s SMTP woes — email flew free until spam armies exploited it. Secure data movement is SMTP 2.0 for Zero Trust. Fix the protocol now, or watch breaches balloon.


🧬 Related Insights

Frequently Asked Questions

What is secure data movement in Zero Trust?

It’s policy-enforced transfer across trust boundaries — validating integrity, identity, and content in transit, without assuming safety post-connection.

Why do 53% still use manual data processes?

Outdated infrastructure and legacy compliance lock them in, despite AI demanding millisecond speeds.

How do cross-domain solutions fix the bottleneck?

They automate boundary checks, enabling fast, trusted flows between IT/OT, clouds, and classified nets — no more speed-security trade-off.

Written by
Threat Digest Editorial Team

Curated insights, explainers, and analysis from the editorial team.

Frequently asked questions

What is secure data movement in Zero Trust?
It's policy-enforced transfer across trust boundaries — validating integrity, identity, and content in transit, without assuming safety post-connection.
Why do 53% still use manual data processes?
Outdated infrastructure and legacy compliance lock them in, despite AI demanding millisecond speeds.
How do <a href="/tag/cross-domain-solutions/">cross-domain solutions</a> fix the bottleneck?
They automate boundary checks, enabling fast, trusted flows between IT/OT, clouds, and classified nets — no more speed-security trade-off.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by The Hacker News

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.