Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity Education & Training

Agentic AI Is Everywhere — So Are the Security Risks

By Elad Schulman
Abstract rendered coding blocks

Steve Johnson via Unsplash

May 15, 2025

2025 is shaping up as the year of AI agents. No longer just prompt responders, autonomous AI agents now plan, act, and coordinate across systems — booking meetings, writing code, buying tickets, and increasingly making decisions on our behalf. This rapid shift is being driven in part by the Model Context Protocol (MCP), a new standard that allows agents to interact with tools and data across platforms. With startups and tech giants racing to release agent-powered products, agents have moved from lab demos to enterprise workflows in a matter of months.

Companies are enabling large-scale agent deployments, PwC is building collaborative infrastructure, and some companies are selling personal AI agents by subscription. But faster rollout means faster exposure. These systems now operate with minimal oversight, unclear governance, and rapidly expanding attack surfaces — and that’s creating a new class of threats that security teams aren’t ready for.

A New Class of Threats

The risks introduced by agentic AI aren’t just technical — they’re systemic. These are systems that make decisions, carry out actions and learn from experience. When something goes wrong, it’s very hard to tell until the damage is done.

According to the OWASP Top 10 for LLM Applications (2025), agents can be tricked into abusing tools or storing bad information that corrupts future decisions — a process known as memory poisoning. Some fall into cascading hallucinations, generating plausible but false outputs that reinforce themselves over time. Others escalate privileges, impersonate users, or veer off course entirely, ignoring constraints to pursue misaligned goals. Some even use deception to bypass safeguards.

Agents can also be overwhelmed — intentionally or not — with too many tasks, draining memory, computing, or API resources. And when agent interfaces are built on frameworks like MCP, without logging, authentication, or third-party validation, it becomes nearly impossible to trace what happened — or who’s really in control.

Why Oversight Isn’t Scaling

Agentic AI is growing fast, but the ability to manage it isn’t. NVIDIA CEO Jensen Huang envisions a future where companies comprise 50,000 employees overseeing 100 million or more AI agents. This ratio spotlights the problem perfectly: human governance cannot possibly scale linearly with AI agent adoption. 

One clear and present oversight danger lies in “shadow agents” — autonomous systems launched under the radar by developers or embedded in SaaS platforms without a formal security review. These agents often operate without visibility, authentication, or logging — making it nearly impossible to track what they’re doing or how they’re behaving.

And even when oversight exists, it’s fragile. Agents can overwhelm human-in-the-loop processes with constant alerts or requests, creating decision fatigue — a tactic attackers may intentionally exploit. As agentic workflows grow more complex, the traditional governance model is breaking down, leaving organizations exposed to risks they can’t see, and can’t easily stop.

The Regulatory Gap

For all their autonomy, agents actually do not exist in a regulatory vacuum. Yet in most cases, compliance frameworks haven’t caught up with the realities of agentic AI. There’s little guidance on how to audit decision chains, assign accountability or verify that outputs meet policy standards.

Basic controls are often missing. Many MCP-based agents lack encryption, identity validation, or consistent logging — making it hard to detect tampering or unauthorized access. And as agents increasingly rely on Retrieval-Augmented Generation (RAG) to access internal knowledge sources, the risk of sensitive data exposure grows.

What’s more, traditional Identity and Access Management (IAM) systems are designed to handle human users — not autonomous agents. As a result, they can’t fail to validate or monitor non-human identities (NHIs) effectively. Without continuous identity verification and behavioral anomaly detection, spoofed or malicious agents can operate undetected within critical systems.

What Needs to Change

Agentic AI doesn’t just need new security compliance frameworks — it needs a fundamentally different operational model. Securing these systems means treating agents like any other powerful actor in the environment — subject to rigorous validation, real-time monitoring, and enforceable policies. To do that effectively, organizations must: 

Control Non-Human Identities

Use strong identity validation, continuous behavioral profiling, and anomaly detection to catch impersonation or spoofing attempts before they cause damage.

Secure RAG Systems at the Source

Enforce strict access control over knowledge sources, monitor embedding spaces for adversarial patterns, and evaluate similarity scoring for data leakage risks.

Run Automated Red Teaming — Continuously

Conduct adversarial simulations before, during, and after deployment to surface novel agent behaviors, misalignments, or configuration gaps.

Establish Governance for GenAI

Define custom policies for agent behavior, enforce them at runtime, and implement full-lifecycle logging, auditability, and permission reviews.

The Bottom Line

Agentic AI isn’t just another tech upgrade, it’s fundamentally changing the way decisions are made and who (or what) makes them. The problem is that it’s moving faster than security teams can possibly accomplish. And without real oversight, clear lines of responsibility, and the right controls in place, agents won’t just boost productivity, they’ll open the door to serious risk.

Securing them means treating AI agents like any other powerful player in your environment. They can make good calls, bad ones, or get pushed into doing something harmful. That’s why it’s critical to validate non-human identities, protect internal knowledge flows, and track every action they take.

The hype is real, but so are the risks. If agents are going to run our systems, they need to follow our rules.

KEYWORDS: artificial intelligence (AI) Artificial Intelligence (AI) Security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Elad schulman headshot

Elad Schulman is the CEO & Co Founder of Lasso. Image courtesy of Schulman

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Monitors with keyboard

    Mitigating the hidden risks of AI in security and SOCs

    See More
  • Laptop keyboard with pink and red lights

    78% of organizations are tracking AI risks

    See More
  • cctv-geefac66e5_1920.jpg

    Why AI CCTV is the future of security and surveillance in public spaces

    See More

Related Products

See More Products
  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!