Rising Security Budgets Are Not Reducing Breach Costs
- PAGO Networks

- Jan 14
- 3 min read
The average cost of a data breach in 2025 is about $4.44 million.

Forrester projects that global cybersecurity investment will grow at double digit rates through the coming years, rising from roughly $155 billion in 2024 to nearly $175 billion in 2025 and continuing upward toward $300 billion by the end of the decade. At the same time, the latest data from IBM and other industry trackers shows that the average cost of a data breach in 2025 is about $4.44 million. That figure is slightly lower than the record high in 2024, but still close to the levels seen in 2023, which suggests that increasing budgets alone are not meaningfully reducing the impact of incidents.
Those numbers represent direct financial loss, legal fees, regulatory fines, customer notification, and lost business, and they vary by region and industry. In the United States the average breach cost eclipses $10 million in 2025, a record high among all regions. Globally, more than half of breaches involve customer personal identifiable information, and longer breach lifecycles tend to translate directly into higher costs.
In APAC the challenge is even more pronounced than in the US. Costs here run roughly 22% higher than in North America due to a mix of supply chain complexity, cloud configuration mistakes, emerging regulatory pressures, and other structural issues. These regional differences underscore that security investment effectiveness is a global problem, not just a local one.
The hard truth is that most organizations detect threats in some form these days. SIEM alerts, endpoint telemetry, anomaly detection tools, and threat feeds are all generating signals. The part that often fails is what happens after those signals. When response is slow, breaches spread rapidly across cloud and SaaS environments. Loss of customer trust and revenue erosion add up faster than technical remediation costs, and regulatory action or litigation can dwarf the original breach expense.
Looking at the data, speed of response is clearly a differentiator. Organizations that identify and contain breaches in under 200 days see significantly lower costs compared with those that take longer. Shorter time to resolution is associated with millions of dollars in savings on average, showing that operational agility pays off in hard dollars.
Distribution of types of malware cases as a percentage of total malware incidents.

That means the question for many teams should not be how much we spend but how we spend it. There is a large body of academic and industry thinking around optimizing security investment, including models that suggest optimal spend should be tied to expected loss outcomes rather than arbitrary percentages of revenue. But in practical terms, improving operational speed comes down to 3 things working together:
Detection has to be faster and smarter, with automation and correlation analysis that cut through noise and surface real risks.
Decision speed matters, too, by combining real threat context with the judgment of seasoned analysts so that teams do not waste time debating uncertainty while attackers move.
Containment speed is the part most organizations struggle with the most because it depends on always on operations and the ability to execute response procedures without hesitation.
What actually enables this level of operational speed in real environments. It is not a single tool, but an integrated technology stack supported by continuous operations.
In practice, operational speed is enabled through a combination of:
A unified telemetry layer across endpoint, network, cloud, and identity;
Automated correlation and normalization to reduce noise and surface real risk;
Continuous threat intelligence enrichment to support faster decisions;
24/7 monitoring and response workflows executed by dedicated MDR teams
If companies can align these elements, they stand a much better chance of reducing the real cost of breaches over time. Efficiency does not come from bigger budgets but from investing in the right capabilities and improving the way teams operate when it matters most.
Sources



