What does Agentic AI mean for cybersecurity?

Issue 2 2025 Information Security, AI & Data Analytics

You will be interested in what AI agents offer if you have ever felt frustrated when booking trips, finding troubleshooting information, coordinating complex supply chains, or managing any elaborate environment.

AI agents are poised to reshape how we get things done. They stand in for us, managing and delegating numerous tasks towards an overarching outcome, giving people more time to focus on higher-value tasks.

They also pose security risks. What should you know about AI agents and how to secure them from malicious employees and cybercriminals?

The artificial helper

In the late 1980s, Francesco Cirillo needed to remedy his poor time management. He saw a kitchen timer shaped like a tomato and used it to break his tasks into smaller work intervals. He named his technique after the Italian word for tomato: Pomodoro.

Cirillo created an elegant model for an age-old productivity technique: split projects into smaller tasks. Now, artificial intelligence is evolving this concept with AI agents. Also called agentic AI, these AIs act on behalf of humans and systems, coordinating multiple tasks, but instead of following fixed sets of instructions, AI agents learn to adapt their behaviours.

An AI agent could work directly with a system, such as scheduling meetings on your behalf. It could be much more complex, such as managing supply chain items or planning an elaborate trip, orchestrated through scripts and specialised ‘narrow’ AIs.

The Harvard Business Review wrote that it promises to "transform many aspects of human-machine collaboration." No wonder Deloitte predicts that half of the companies using generative AI will adopt agentic AI by 2027.

"Agentic AI is very exciting and could be the big productivity boost everyone has been expecting from AI. It is more than automation; it will help us manage complex and dynamic objectives at high speed, increasing the impact that machine systems make for us. With that comes new security risks," says Gerhard Swart, chief technology officer at cybersecurity company, Performanta.

Risky AI

An executive trusts their personal assistant, a patient trusts their doctor, and an inventory controller trusts their logistics manager. Trust is crucial because those people are exposed to the inner workings of processes and information.

“The same applies to AI agents, which immediately flags the biggest security concern,” says Swart. "For agentic AI to work, it needs access to secure systems, often several different systems. That kind of access is very dangerous if it falls under the influence of malicious employees or cybercriminals."

Unless AI agents are sufficiently secure and managed, they pose significant risks due to their extensive reach and the degree to which we will come to rely on them. Already, major vendors such as Salesforce, which has an agentic AI service called Agentforce, run bug bounty programs to help find security gaps affecting AI agents.

Protecting AI agents

“From a risk perspective, we can consider AI agents as similar to human users with access to sensitive systems. This comparison helps define what can keep AI agents safe,” says Swart. "An AI agent can access important business data, scheduling and email applications, SaaS services, etc. We can determine much from that vantage, such as ensuring we understand and limit the agent's access to systems."

Methods to secure AI agents include:

• Strong identity management and authentication systems.

• Policies should be implemented to encourage and guide usage and avoid shadow AI agents.

• Regular human-in-the-loop evaluations of AI agents' output and behaviour.

• Limiting data exposure and using encryption smartly.

• Continuous security monitoring.

Continuous monitoring is one of the most important measures. The best managed security service providers (MSSPs) employ sophisticated monitoring and remediation systems that include AI. Moreover, globally top-rated MSSPs such as Performanta take a risk-first approach to identify, monitor, and protect a customer's most crucial areas, lowering the associated risks and costs.

“Partnering with an MSSP is particularly prudent for AI agents. MSSPs invest in active monitoring and remediation tools, including AI agents, that can act as fast as the attackers,” says Swart.

"Active monitoring and remediation are crucial and need to be very fast. They should be as fast as machines can act. MSSPs invest in this speed and accuracy. If you want to get the most from AI agents, while keeping risks and costs down, especially as you start to deploy agents, partnering with a top MSSP is the best option,” he concludes.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...
Top five AIoT trends in 2026
IoT & Automation AI & Data Analytics
As we enter 2026, the convergence of artificial intelligence (AI) and IoT infrastructure is reshaping industries, unlocking unprecedented opportunities to optimise operations, enhance security, and improve sustainability.

Read more...
Integrated security key to protecting cloud applications
Infrastructure Information Security
Cloud-native applications have transformed the way businesses operate, enabling faster innovation, greater agility, and enhanced scalability. Yet this evolution brings an equally complex security landscape.

Read more...
Factories, grids, and finance: Critical infrastructure cyber lessons of 2025
Asset Management Information Security Industrial (Industry)
Africa has seen an accelerated, large-scale digitisation of our overall industrial base, and this rapid convergence of IT and OT is happening on a foundation that, in essence, was not designed to be cybersecure.

Read more...
Banking’s AI reckoning
Financial (Industry) News & Events AI & Data Analytics
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Eight African cybersecurity trends for 2026
Information Security
Check Point Software Technologies has released eight critical trends shaping Africa’s digital turning point in 2026, noting that their implementation will require the government, the private sector, and key civic institutions to cooperate.

Read more...
Securing a South African healthcare network
Surveillance Healthcare (Industry) AI & Data Analytics
VIVOTEK partnered with local integrator Chase Networks and distributor Rectron to deliver a fully integrated security ecosystem, providing PathCare with a centralised view of all facilities, simplifying monitoring of sensitive laboratory areas, and ensuring SOP compliance.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.