Email:

Phone No.

Whatsapp

84% of breaches in Singapore are now driven by AI

  • Home
  • 84% of breaches in Singapore are now driven by AI
84% of breaches in Singapore are now driven by AI
84% of breaches in Singapore are now driven by AI
84% of breaches in Singapore are now driven by AI
84% of breaches in Singapore are now driven by AI
84% of breaches in Singapore are now driven by AI

AI

84% of breaches in Singapore are now driven by AI

Artificial intelligence is no longer a future risk in Singapore’s cyber landscape. It is already shaping how breaches happen, how quickly they unfold, and how difficult they are to detect. A recent report on Gigamon’s 2026 Hybrid Cloud Security Survey said AI has been involved in 84% of reported security breaches in Singapore over the past 12 months, enabling attackers to move with a speed and scale that many organisations struggle to match. The same coverage also highlights a recurring problem: defenders may be investing heavily in tools, yet still lack the visibility to prove what is happening across their environments. 

This matters because AI does not need to invent new classes of attacks to change the outcome. It can automate the slow parts of intrusion, such as finding weaknesses, crafting lures, testing credentials, or adapting malware. When the time between “first contact” and “meaningful impact” collapses, the advantage shifts to whoever can see, decide, and respond fastest. In that race, visibility becomes the currency of resilience.

Why AI is accelerating the attack chain

The survey findings point to a threat model where AI is “embedded in nearly every stage of the attack chain”, making detection and response harder to keep up with. Attackers can use AI to speed up reconnaissance, reduce the effort needed to discover vulnerabilities, and tailor social engineering at scale. Even where the underlying techniques are familiar, the operational tempo changes.

This is also why organisations can feel confident while still being exposed. The survey coverage describes high investment in new security tools in Singapore, alongside a persistent gap in understanding how data moves across networks and cloud environments. Tooling without coverage creates what you might call “confidence without control”. It looks like progress on paper, but it does not reliably prevent a breach, nor does it guarantee fast containment when attackers get in.

The “AI security illusion” and why confidence can be dangerous

Gigamon frames the disconnect as an “AI security illusion”, where confidence outpaces proof. In Singapore’s slice of the results, nearly two-thirds of organisations reportedly believe their ability to secure new AI technologies is defined or integrated. Yet a significant proportion still experienced breaches, with some experiencing multiple breaches.

This is not simply a cultural problem. It is structural. Hybrid cloud environments fragment ownership across teams and vendors. Traffic is increasingly encrypted, lateral movement happens inside the perimeter, and critical workloads run across multiple platforms. When an incident happens, the limiting factor is often not a lack of alerts, but a lack of trustworthy context. If you cannot see what changed, what moved, and what accessed what, then the response becomes guesswork.

Why visibility has become the primary defensive battleground

The survey narrative elevates visibility as both the top security priority and the area where defenders are falling behind. This is not abstract. Visibility is the difference between detecting a compromised identity early versus discovering it after data exfiltration. It is the difference between isolating a single workload versus containing a breach that has already spread across cloud and on-premise systems.

A useful way to think about this is “data in motion”. Many organisations have reasonable awareness of stored data, but weaker awareness of how data moves between services, accounts, and networks. Attackers rely on that blind spot. They move laterally using legitimate credentials, blend into east-west traffic, and exploit the fact that traditional monitoring often focuses on the edge rather than internal movement.

What “deep observability” is trying to solve

Gigamon’s position is that closing the gap requires “deep observability”, meaning richer, network-derived telemetry that helps teams see data in motion across hybrid environments. In Gigamon’s own product explanation, deep observability extends traditional observability by delivering network-derived telemetry, including packets, flows, and application metadata, into security and monitoring tools. The idea is not to replace existing tools, but to feed them better evidence.

This matters because many breaches are missed not because of a lack of signals, but because signals are too thin. A basic alert might say an account is logged in. Richer telemetry can help answer whether unusual access patterns, unexpected service-to-service calls, or anomalous data transfers followed that login. In a world of AI-accelerated attacks, that extra context helps teams respond with precision rather than broad disruption.

The cloud trust reversal and why it affects breach strategy

One of the more revealing themes in the survey coverage is the erosion of trust in public cloud AI deployments. Leaders increasingly believe data lakes are more secure for AI workloads, while a large share report reluctance to deploy AI in public cloud environments, rising year on year. This suggests a shift in risk appetite driven by perceived control. Organisations are looking for places where visibility and governance feel more tangible.

There is a strategic risk here. If organisations respond by moving AI workloads into environments they think are “safer”, but do not upgrade telemetry and access control, they may simply relocate the same blind spots. Breach reduction depends less on where workloads sit and more on whether access is tightly governed, behaviour is monitored, and anomalies are investigated quickly.

Quantum anxiety is really about data lifetime

Singapore leaders reportedly expressed great concern about “harvest now, decrypt later” attacks, where encrypted data stolen today may be decrypted in the future as cryptographic-breaking capabilities mature. The key point is not whether quantum computing breaks encryption tomorrow. It is that some data remains sensitive for years, such as identity records, health information, and long-lived corporate secrets.

The practical takeaway is that visibility and classification must extend to encrypted flows and stored archives. If you cannot identify what sensitive data is moving where, you cannot prioritise controls to reduce long-term exposure. This is also where crypto-agility planning and data minimisation become risk management tools, not academic concerns.

Where Privacy Ninja fits in

AI-driven breaches highlight a basic reality: when attackers move faster, organisations need tighter governance and clearer response coordination. Privacy Ninja helps organisations build that readiness with a blend of operational support and technical validation.

Our DPO-as-a-Service provides a dedicated point of contact to keep PDPA compliance on track, maintain core data protection policies and practices, and handle data protection queries and requests consistently. When incidents arise, the DPO helps coordinate initial response and communications as the organisation’s key data protection contact, so actions are recorded and follow-up is disciplined.

Where technical assurance is required, Privacy Ninja’s vulnerability assessment and penetration testing services help validate real exposure paths, including weak access controls, misconfigurations, and internet-facing attack surfaces that AI-enabled actors can exploit quickly.

The “84% AI-driven breaches” headline is alarming, but its real lesson is operational. If AI compresses the attack timeline, then prevention and response must be built around visibility, speed, and proof. The organisations that perform best will not be those with the longest tool list. They will be those who can see data in motion, detect abnormal behaviour early, and respond precisely before attackers scale impact.

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us