84% of government IT security leaders agree: sharing sensitive data across networks heightens cyber risk. That’s the stark opener from the fresh Cyber360 report, surveying 500 pros in government, defense, and critical services across the U.S. and UK.
A number that stops you cold.
Why Secure Data Movement Is the Zero Trust Bottleneck
Zero Trust programs promise airtight security—no implicit trust, ever. But here’s the hitch: they assume connectivity solves the puzzle. Open a ticket, spin up a gateway, shove the data through. Problem fixed? Wrong. Dead wrong.
New data nails it. 53% of these orgs still lean on manual processes for data movement between systems. In 2026. With AI cranking operations to blistering speeds on attack and defense sides alike. This isn’t a glitch; it’s the core reason so many Zero Trust rollouts sputter and stall.
The gap? Data movement itself. Not identity verification. Not endpoint hardening. The pipes carrying the payload across boundaries.
Think of it like this: Zero Trust is a fortress with perfect walls, but the drawbridge — creaky, manual, wide open to tampering — is where invaders slip in.
Threats aren’t waiting politely.
Is Secure Data Movement Failing National Security?
Cyber360 clocks an average 137 attempted or successful cyberattacks per week against national security outfits in 2025, up from 127 the year prior. U.S. agencies? A 25% weekly surge.
Enterprises mirror the mess. Verizon’s 2025 Data Breach Investigations Report shows third-party breaches doubling to 30% of incidents. IBM pegs multi-environment breaches at $5.05 million average — a cool million more than on-prem alone.
Boundaries are the bleeders: IT to OT, tenants to clouds, partners to internals. Dwell time and dollars pile up there.
“78% of respondents cited outdated infrastructure as a primary source of cyber vulnerability, specifically pointing to analog systems and manual processes as weak links.”
That’s Cyber360, blunt as a hammer.
49% call out data integrity in transit — stopping tampering across classified or coalition nets — as their top headache. 45% wrestle with identity across domains. Attackers have feasted on these for years.
Dragos’ 2025 OT report adds fuel: 75% of OT attacks now spark from IT breaches, with 70% of OT systems linking to IT nets soon. Air gaps? Ancient history. And don’t get started on managed file transfers — Cl0p’s MOVEit rampage hit 2,700 orgs, exposing 93 million souls’ data. GoAnywhere, Cleo: same playbook, same weak pipes.
Speed and security aren’t enemies — that’s the myth.
Can You Have Fast AND Secure Data Movement?
Pick one, teams figure: zippy transfers or ironclad protection. Most grab security, swallow the lag. Fine for minute-long decisions. Useless for seconds. Catastrophic for milliseconds.
AI flips the script. Autonomous detection pipelines don’t twiddle thumbs at gateways. They act. But when 53% of national security shops manually shuffle data, the gap between AI demand and analog reality? That’s your attack surface, glaring.
An AI model — fraud spotter, threat sorter, target analyzer — thrives on fresh, trusted data. Stale feeds or unverified arrivals? It chokes on garbage in, garbage out. Bottleneck’s not the brains. It’s the plumbing.
Cross-domain tech steps up here, not as a tick-box but a game-repairer. Enforce trust at boundaries, not after. Coordinate systems smoothly, ditching brittle point-to-point links attackers shred effortlessly.
History echoes this loud.
The Historical Parallel: Enigma’s Pipes
World War II codebreakers cracked Enigma not by hacking the machine — but by owning the transmission lines. Data en route was the soft underbelly. Allies bombed cables, intercepted couriers, starved the flow.
Fast-forward: today’s digital battlespace runs parallel. Secure data movement isn’t a side quest; it’s the Enigma of our era. Ignore it, and your Zero Trust castle crumbles from plumbing rot. Bold call: by 2027, orgs mastering cross-domain pipes will cut breach costs 40%, as AI defenses finally breathe free.
Corporate hype often glosses this — gateways as saviors! — but Cyber360 strips the spin. Manual processes? Outdated infra? They’re the villains, not the vendors’ shiny toys.
The fix demands rethinking.
Cross-Domain Tech: Zero Trust’s Missing Link
Properly deployed, these tools nix the speed-security false choice. Validate at the edge: filter, policy-check, release. Systems sync as one organism, not duct-taped silos.
Cyber360 hints at the shift. Respondents crave it — integrity guards, multi-domain auth, automated flows. No more Cl0p-style pipe bombs.
Prediction: AI acceleration forces this. Detection loops hit milliseconds; data lags kill them. National security orgs first, then enterprises. The 137 weekly hits? They’ll plummet for adapters.
But inertia bites. 78% stuck on legacy. Time to unplug the manuals.
Unique insight: this bottleneck mirrors the early internet’s SMTP woes — email flew free until spam armies exploited it. Secure data movement is SMTP 2.0 for Zero Trust. Fix the protocol now, or watch breaches balloon.
🧬 Related Insights
- Read more: FBI Wipes Russian Spy Routers Clean as Iran Hammers U.S. Factory Controls
- Read more: [OpenAI Axios Hack] macOS Cert Revoked After North Korean Breach
Frequently Asked Questions
What is secure data movement in Zero Trust?
It’s policy-enforced transfer across trust boundaries — validating integrity, identity, and content in transit, without assuming safety post-connection.
Why do 53% still use manual data processes?
Outdated infrastructure and legacy compliance lock them in, despite AI demanding millisecond speeds.
How do cross-domain solutions fix the bottleneck?
They automate boundary checks, enabling fast, trusted flows between IT/OT, clouds, and classified nets — no more speed-security trade-off.