What does Agentic AI mean for cybersecurity?

Issue 2 2025 Information Security, AI & Data Analytics

You will be interested in what AI agents offer if you have ever felt frustrated when booking trips, finding troubleshooting information, coordinating complex supply chains, or managing any elaborate environment.

AI agents are poised to reshape how we get things done. They stand in for us, managing and delegating numerous tasks towards an overarching outcome, giving people more time to focus on higher-value tasks.

They also pose security risks. What should you know about AI agents and how to secure them from malicious employees and cybercriminals?

The artificial helper

In the late 1980s, Francesco Cirillo needed to remedy his poor time management. He saw a kitchen timer shaped like a tomato and used it to break his tasks into smaller work intervals. He named his technique after the Italian word for tomato: Pomodoro.

Cirillo created an elegant model for an age-old productivity technique: split projects into smaller tasks. Now, artificial intelligence is evolving this concept with AI agents. Also called agentic AI, these AIs act on behalf of humans and systems, coordinating multiple tasks, but instead of following fixed sets of instructions, AI agents learn to adapt their behaviours.

An AI agent could work directly with a system, such as scheduling meetings on your behalf. It could be much more complex, such as managing supply chain items or planning an elaborate trip, orchestrated through scripts and specialised ‘narrow’ AIs.

The Harvard Business Review wrote that it promises to "transform many aspects of human-machine collaboration." No wonder Deloitte predicts that half of the companies using generative AI will adopt agentic AI by 2027.

"Agentic AI is very exciting and could be the big productivity boost everyone has been expecting from AI. It is more than automation; it will help us manage complex and dynamic objectives at high speed, increasing the impact that machine systems make for us. With that comes new security risks," says Gerhard Swart, chief technology officer at cybersecurity company, Performanta.

Risky AI

An executive trusts their personal assistant, a patient trusts their doctor, and an inventory controller trusts their logistics manager. Trust is crucial because those people are exposed to the inner workings of processes and information.

“The same applies to AI agents, which immediately flags the biggest security concern,” says Swart. "For agentic AI to work, it needs access to secure systems, often several different systems. That kind of access is very dangerous if it falls under the influence of malicious employees or cybercriminals."

Unless AI agents are sufficiently secure and managed, they pose significant risks due to their extensive reach and the degree to which we will come to rely on them. Already, major vendors such as Salesforce, which has an agentic AI service called Agentforce, run bug bounty programs to help find security gaps affecting AI agents.

Protecting AI agents

“From a risk perspective, we can consider AI agents as similar to human users with access to sensitive systems. This comparison helps define what can keep AI agents safe,” says Swart. "An AI agent can access important business data, scheduling and email applications, SaaS services, etc. We can determine much from that vantage, such as ensuring we understand and limit the agent's access to systems."

Methods to secure AI agents include:

• Strong identity management and authentication systems.

• Policies should be implemented to encourage and guide usage and avoid shadow AI agents.

• Regular human-in-the-loop evaluations of AI agents' output and behaviour.

• Limiting data exposure and using encryption smartly.

• Continuous security monitoring.

Continuous monitoring is one of the most important measures. The best managed security service providers (MSSPs) employ sophisticated monitoring and remediation systems that include AI. Moreover, globally top-rated MSSPs such as Performanta take a risk-first approach to identify, monitor, and protect a customer's most crucial areas, lowering the associated risks and costs.

“Partnering with an MSSP is particularly prudent for AI agents. MSSPs invest in active monitoring and remediation tools, including AI agents, that can act as fast as the attackers,” says Swart.

"Active monitoring and remediation are crucial and need to be very fast. They should be as fast as machines can act. MSSPs invest in this speed and accuracy. If you want to get the most from AI agents, while keeping risks and costs down, especially as you start to deploy agents, partnering with a top MSSP is the best option,” he concludes.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...
Cybersecurity in South Africa
Information Security
According to the Allianz Risk Barometer 2025, cyber incidents, including ransomware attacks, data breaches and IT outages, are now the top global business risk, marking their fourth year at the top.

Read more...
Are AI agents a game-changer?
Information Security
While AI-powered chatbots have been around for a while, AI agents go beyond simple assistants, functioning as self-learning digital operatives that plan, execute, and adapt in real time. These advancements do not just enhance cybercriminal tactics, they may fundamentally change the battlefield.

Read more...
Disaster recovery vs cyber recovery
Information Security
Disaster recovery centres on restoring IT operations following events like natural disasters, hardware failures or accidents, while cyber recovery is specifically tailored to address intentional cyberthreats such as ransomware and data breaches.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Open and collaborative logistics systems
Hikvision South Africa Surveillance Logistics (Industry) AI & Data Analytics
E-commerce and other high-volume logistics operations need open and collaborative technology ecosystems that drive efficiencies, throughput and digital transformation. Hikvision discusses the benefits of harnessing open and collaborative systems in the logistics market.

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...
The deepfake crisis is here and now
Information Security Training & Education
Deepfakes are a growing cybersecurity threat that blur the line between reality and fiction. These AI-generated synthetic media have evolved from technological curiosities to sophisticated weapons of digital deception, costing companies upwards of $600 000 each.

Read more...
Hikvision launches latest range of cameras
Hikvision South Africa Surveillance AI & Data Analytics
Hikvision has launched its latest network cameras with ColorVu 3.0 technology and EasyIP 4.0 Plus, which elevate video security by delivering improved image quality, enhanced intelligent functions, superior audio capabilities, and a refined product design and materials.

Read more...