Unite.AI 05月08日 00:07
The State of Pentesting in 2025: Why AI-Driven Security Validation Is Now a Strategic Imperative
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Pentera发布的《2025年渗透测试现状报告》揭示了网络安全领域面临的严峻挑战和快速变革。企业正通过自动化、AI工具应对日益增长的威胁。尽管安全投入增加,但67%的美国企业在过去两年仍遭遇数据泄露,凸显了安全堆栈复杂性与漏洞之间的关联。网络安全保险公司正推动企业采用新技术。软件渗透测试兴起,取代了传统的手动测试,以实现可扩展性和实时验证。安全预算持续增长,渗透测试频率却未能同步,导致新漏洞出现。企业越来越重视风险对齐,并积极利用渗透测试结果进行改进。AI驱动的安全验证正从合规义务转变为战略武器。

📈尽管企业部署了更复杂的安全堆栈,但仍有67%的美国企业在过去24个月内经历了数据泄露,其中76%的企业数据保密性、完整性或可用性受到直接影响,36%的企业经历了计划外停机,28%的企业面临财务损失。这表明安全堆栈的复杂性与漏洞之间存在关联。

🛡️网络安全保险公司正成为网络安全创新的推动者。59%的美国企业应保险公司要求实施了新的安全工具,93%的首席信息安全官表示,保险公司影响了他们的安全态势,这些建议超越了合规性要求,影响了技术战略。

⚙️软件渗透测试的使用正在增加。超过55%的组织现在依赖于内部程序中的软件渗透测试,另有49%的组织使用第三方提供商。相比之下,只有17%的组织仍然完全依赖内部手动测试。这种向自动化对抗性测试的转变反映了一种更广泛的趋势:在不断演变的威胁时代,需要可扩展、可重复和实时的验证。

🎯企业越来越重视风险对齐,将测试重点放在最容易发生漏洞的领域。近57%的企业优先考虑面向网络的资产,其次是内部服务器、API、云基础设施和物联网设备。API正成为攻击者和防御者关注的重点,但由于缺乏可见性和标准监控,容易被利用。

🤝渗透测试报告不再被束之高阁。62%的企业立即将结果转移给IT部门以确定修复优先级,47%的企业与高级管理层分享结果,21%的企业直接向董事会或监管机构报告。这反映了渗透测试与战略风险管理更深入的融合。

The 2025 State of Pentesting Survey Report by Pentera paints a striking picture of a cybersecurity landscape under siege—and evolving fast. This isn’t just a story about defending digital borders; it’s a blueprint of how enterprises are transforming their approach to security, driven by automation, AI-based tools, and the unrelenting pressure of real-world threats.

Breaches Persist Despite Bigger Security Stacks

Despite deploying increasingly complex security stacks, 67% of U.S. enterprises reported experiencing a breach in the past 24 months. These weren't minor incidents either—76% reported a direct impact on confidentiality, integrity, or availability of data, and 36% experienced unplanned downtime, while 28% faced financial losses.

The correlation is clear: as stack complexity rises, so do the alerts—and the breaches. Enterprises using more than 100 security tools experienced an average of 3,074 weekly alerts, while those using between 76–100 tools faced 2,048 alerts per week

Yet this avalanche of data often overwhelms security teams, delaying response times and allowing real threats to slip through the cracks.

Cybersecurity Insurance Is Shaping Tech Adoption

Cyber insurers have become unexpected drivers of cybersecurity innovation. A striking 59% of U.S. enterprises implemented new security tools specifically at the request of their insurer, and 93% of CISOs reported that insurers influenced their security postures. In many cases, these recommendations went beyond compliance—they shaped tech strategy.

The Rise of Software-Based Pentesting

Manual pentesting is no longer the default. Over 55% of organizations now rely on software-based pentesting within their in-house programs, with another 49% using third-party providers. In contrast, just 17% still rely solely on in-house manual testing.

This transition to automated adversarial testing reflects a broader trend: the need for scalable, repeatable, and real-time validation in an era of ever-evolving threats. These automated platforms simulate attacks ranging from file-less malware to privilege escalation, enabling enterprises to assess their resilience continuously and without disruption.

Security Budgets Are Growing—Fast

Security isn’t getting cheaper, but organizations are prioritizing it anyway. The average annual pentesting budget is $187,000, accounting for 10.5% of total IT security spend. Larger enterprises (10,000+ employees) spend even more—an average of $216,000 annually.

In 2025, 50% of enterprises plan to increase their pentesting budgets, and 47.5% expect to grow their overall security spend. Only 10% anticipate a decrease in investment. These numbers highlight security's rise from an operational necessity to a boardroom priority.

Security Testing Is Still Playing Catch-Up

Here’s a startling disconnect: 96% of enterprises report infrastructure changes at least quarterly, but only 30% conduct pentesting at that same frequency. The result? New vulnerabilities slip through untested changes, expanding the attack surface with each software push or config update.

Only 13% of large enterprises with over 10,000 employees conduct quarterly pentests. Meanwhile, nearly half still test only once per year—a dangerous lag in today’s dynamic threat environment.

Risk Alignment Is Sharper Than Ever

Encouragingly, security leaders are focusing testing where breaches actually happen. Nearly 57% prioritize web-facing assets, followed by internal servers, APIs, cloud infrastructure, and IoT devices. This alignment reflects a growing awareness that attackers don't discriminate—they exploit any available vulnerability across the entire attack surface.

APIs, in particular, have emerged as a high-priority target, both for attackers and defenders. These interfaces are increasingly essential to business operations but often lack visibility and standard monitoring, making them ripe for exploitation.

Operationalizing Pentest Results

Pentest reports are no longer being shelved. Instead, 62% of enterprises immediately transfer findings to IT for remediation prioritization, while 47% share results with senior management and 21% report directly to their boards or regulators.

This shift toward action reflects a deeper integration of pentesting into strategic risk management—not just compliance checkboxing. Security validation is becoming part of the business conversation.

What’s Holding Back Even Faster Progress?

While the trendlines are positive, key inhibitors remain. The top two barriers to more frequent pentesting are budget constraints (44%) and a lack of available pentesters (48%)—the latter reflecting a global shortfall of 4 million cybersecurity professionals, according to the World Economic Forum.

Operational risk, such as fear of outages during testing, remains a concern for 30% of CISOs.

From Compliance Obligation to Strategic Weapon

Pentesting has evolved far beyond its origins as a regulatory requirement. Today, it supports strategic initiatives, including M&A due diligence and executive-level decision-making. Nearly one-third of respondents now cite “executive mandate” and “preparing for M&A” as key reasons for conducting pentests.

This marks a fundamental transformation: from a reactive check-up to a proactive and continuous measure of cyber resilience.

Final Thoughts

The 2025 State of Pentesting Survey Report is more than a status update—it’s a wake-up call. As attack surfaces grow and threat actors become more sophisticated, organizations can no longer afford slow, manual, or siloed approaches to security testing. AI-powered, software-based pentesting is stepping in to close that gap with speed, scale, and insight.

The organizations that thrive in this new era will be those that treat security validation not just as a technical necessity, but as a strategic imperative.

For more insights, download the full 2025 State of Pentesting Survey Report from Pentera.

The post The State of Pentesting in 2025: Why AI-Driven Security Validation Is Now a Strategic Imperative appeared first on Unite.AI.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

渗透测试 网络安全 AI安全 风险管理 安全预算
相关文章