What does Agentic AI mean for cybersecurity?

Issue 2 2025 Information Security, AI & Data Analytics

You will be interested in what AI agents offer if you have ever felt frustrated when booking trips, finding troubleshooting information, coordinating complex supply chains, or managing any elaborate environment.

AI agents are poised to reshape how we get things done. They stand in for us, managing and delegating numerous tasks towards an overarching outcome, giving people more time to focus on higher-value tasks.

They also pose security risks. What should you know about AI agents and how to secure them from malicious employees and cybercriminals?

The artificial helper

In the late 1980s, Francesco Cirillo needed to remedy his poor time management. He saw a kitchen timer shaped like a tomato and used it to break his tasks into smaller work intervals. He named his technique after the Italian word for tomato: Pomodoro.

Cirillo created an elegant model for an age-old productivity technique: split projects into smaller tasks. Now, artificial intelligence is evolving this concept with AI agents. Also called agentic AI, these AIs act on behalf of humans and systems, coordinating multiple tasks, but instead of following fixed sets of instructions, AI agents learn to adapt their behaviours.

An AI agent could work directly with a system, such as scheduling meetings on your behalf. It could be much more complex, such as managing supply chain items or planning an elaborate trip, orchestrated through scripts and specialised ‘narrow’ AIs.

The Harvard Business Review wrote that it promises to "transform many aspects of human-machine collaboration." No wonder Deloitte predicts that half of the companies using generative AI will adopt agentic AI by 2027.

"Agentic AI is very exciting and could be the big productivity boost everyone has been expecting from AI. It is more than automation; it will help us manage complex and dynamic objectives at high speed, increasing the impact that machine systems make for us. With that comes new security risks," says Gerhard Swart, chief technology officer at cybersecurity company, Performanta.

Risky AI

An executive trusts their personal assistant, a patient trusts their doctor, and an inventory controller trusts their logistics manager. Trust is crucial because those people are exposed to the inner workings of processes and information.

“The same applies to AI agents, which immediately flags the biggest security concern,” says Swart. "For agentic AI to work, it needs access to secure systems, often several different systems. That kind of access is very dangerous if it falls under the influence of malicious employees or cybercriminals."

Unless AI agents are sufficiently secure and managed, they pose significant risks due to their extensive reach and the degree to which we will come to rely on them. Already, major vendors such as Salesforce, which has an agentic AI service called Agentforce, run bug bounty programs to help find security gaps affecting AI agents.

Protecting AI agents

“From a risk perspective, we can consider AI agents as similar to human users with access to sensitive systems. This comparison helps define what can keep AI agents safe,” says Swart. "An AI agent can access important business data, scheduling and email applications, SaaS services, etc. We can determine much from that vantage, such as ensuring we understand and limit the agent's access to systems."

Methods to secure AI agents include:

• Strong identity management and authentication systems.

• Policies should be implemented to encourage and guide usage and avoid shadow AI agents.

• Regular human-in-the-loop evaluations of AI agents' output and behaviour.

• Limiting data exposure and using encryption smartly.

• Continuous security monitoring.

Continuous monitoring is one of the most important measures. The best managed security service providers (MSSPs) employ sophisticated monitoring and remediation systems that include AI. Moreover, globally top-rated MSSPs such as Performanta take a risk-first approach to identify, monitor, and protect a customer's most crucial areas, lowering the associated risks and costs.

“Partnering with an MSSP is particularly prudent for AI agents. MSSPs invest in active monitoring and remediation tools, including AI agents, that can act as fast as the attackers,” says Swart.

"Active monitoring and remediation are crucial and need to be very fast. They should be as fast as machines can act. MSSPs invest in this speed and accuracy. If you want to get the most from AI agents, while keeping risks and costs down, especially as you start to deploy agents, partnering with a top MSSP is the best option,” he concludes.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Crypto in SA: between progress and precaution
Information Security
“As cryptocurrency gains momentum and legitimacy, it’s becoming increasingly important for people to pay attention to financial security”, says Richard Frost, head of technology and innovation at Armata Cyber Security.

Read more...
Cyber recovery requires a different approach to disaster recovery
Information Security
Disaster recovery is about getting operations back on track after unexpected disruptions; cyber recovery, however, is about calculated actions by bad actors aiming to disrupt your business, steal sensitive data, or hold your system hostage.

Read more...
MDR users claim 97,5% less
Sophos Information Security
The average cyber insurance claim following a significant cyberattack is just $75 000 for MDR users, compared with $3 million for endpoint-only users, according to a new independent study.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Kaspersky KATA 7.0 for targeted attack protection
Information Security Products & Solutions
] Kaspersky has announced a major update to its Kaspersky Anti Targeted Attack (KATA) including enhanced network detection and response (NDR) capabilities with deeper network visibility, internal threats detection and other critical security features.

Read more...
Milestone announces a platform to enable access to data and train AI models
Surveillance AI & Data Analytics
Milestone Systems has announced Project Hafnia to build services and democratise AI-model training with high-quality, compliant video data leveraging NVIDIA Cosmos Curator and AI model, fine-tuning microservices.

Read more...