What does Agentic AI mean for cybersecurity?

Issue 2 2025 Information Security, AI & Data Analytics

You will be interested in what AI agents offer if you have ever felt frustrated when booking trips, finding troubleshooting information, coordinating complex supply chains, or managing any elaborate environment.

AI agents are poised to reshape how we get things done. They stand in for us, managing and delegating numerous tasks towards an overarching outcome, giving people more time to focus on higher-value tasks.

They also pose security risks. What should you know about AI agents and how to secure them from malicious employees and cybercriminals?

The artificial helper

In the late 1980s, Francesco Cirillo needed to remedy his poor time management. He saw a kitchen timer shaped like a tomato and used it to break his tasks into smaller work intervals. He named his technique after the Italian word for tomato: Pomodoro.

Cirillo created an elegant model for an age-old productivity technique: split projects into smaller tasks. Now, artificial intelligence is evolving this concept with AI agents. Also called agentic AI, these AIs act on behalf of humans and systems, coordinating multiple tasks, but instead of following fixed sets of instructions, AI agents learn to adapt their behaviours.

An AI agent could work directly with a system, such as scheduling meetings on your behalf. It could be much more complex, such as managing supply chain items or planning an elaborate trip, orchestrated through scripts and specialised ‘narrow’ AIs.

The Harvard Business Review wrote that it promises to "transform many aspects of human-machine collaboration." No wonder Deloitte predicts that half of the companies using generative AI will adopt agentic AI by 2027.

"Agentic AI is very exciting and could be the big productivity boost everyone has been expecting from AI. It is more than automation; it will help us manage complex and dynamic objectives at high speed, increasing the impact that machine systems make for us. With that comes new security risks," says Gerhard Swart, chief technology officer at cybersecurity company, Performanta.

Risky AI

An executive trusts their personal assistant, a patient trusts their doctor, and an inventory controller trusts their logistics manager. Trust is crucial because those people are exposed to the inner workings of processes and information.

“The same applies to AI agents, which immediately flags the biggest security concern,” says Swart. "For agentic AI to work, it needs access to secure systems, often several different systems. That kind of access is very dangerous if it falls under the influence of malicious employees or cybercriminals."

Unless AI agents are sufficiently secure and managed, they pose significant risks due to their extensive reach and the degree to which we will come to rely on them. Already, major vendors such as Salesforce, which has an agentic AI service called Agentforce, run bug bounty programs to help find security gaps affecting AI agents.

Protecting AI agents

“From a risk perspective, we can consider AI agents as similar to human users with access to sensitive systems. This comparison helps define what can keep AI agents safe,” says Swart. "An AI agent can access important business data, scheduling and email applications, SaaS services, etc. We can determine much from that vantage, such as ensuring we understand and limit the agent's access to systems."

Methods to secure AI agents include:

• Strong identity management and authentication systems.

• Policies should be implemented to encourage and guide usage and avoid shadow AI agents.

• Regular human-in-the-loop evaluations of AI agents' output and behaviour.

• Limiting data exposure and using encryption smartly.

• Continuous security monitoring.

Continuous monitoring is one of the most important measures. The best managed security service providers (MSSPs) employ sophisticated monitoring and remediation systems that include AI. Moreover, globally top-rated MSSPs such as Performanta take a risk-first approach to identify, monitor, and protect a customer's most crucial areas, lowering the associated risks and costs.

“Partnering with an MSSP is particularly prudent for AI agents. MSSPs invest in active monitoring and remediation tools, including AI agents, that can act as fast as the attackers,” says Swart.

"Active monitoring and remediation are crucial and need to be very fast. They should be as fast as machines can act. MSSPs invest in this speed and accuracy. If you want to get the most from AI agents, while keeping risks and costs down, especially as you start to deploy agents, partnering with a top MSSP is the best option,” he concludes.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Hikvision launches AcuSeek NVR
Surveillance Products & Solutions AI & Data Analytics
By integrating natural language interaction, Hikvision’s AcuSeek NVR enables precise video and image retrieval within seconds, marking a transformative milestone for the security industry's advance into intelligent and efficient applications.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...
SIEM rule threat coverage validation
Information Security News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.