Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity Education & Training

Agentic AI Is Everywhere — So Are the Security Risks

By Elad Schulman
Abstract rendered coding blocks

Steve Johnson via Unsplash

May 15, 2025

2025 is shaping up as the year of AI agents. No longer just prompt responders, autonomous AI agents now plan, act, and coordinate across systems — booking meetings, writing code, buying tickets, and increasingly making decisions on our behalf. This rapid shift is being driven in part by the Model Context Protocol (MCP), a new standard that allows agents to interact with tools and data across platforms. With startups and tech giants racing to release agent-powered products, agents have moved from lab demos to enterprise workflows in a matter of months.

Companies are enabling large-scale agent deployments, PwC is building collaborative infrastructure, and some companies are selling personal AI agents by subscription. But faster rollout means faster exposure. These systems now operate with minimal oversight, unclear governance, and rapidly expanding attack surfaces — and that’s creating a new class of threats that security teams aren’t ready for.

A New Class of Threats

The risks introduced by agentic AI aren’t just technical — they’re systemic. These are systems that make decisions, carry out actions and learn from experience. When something goes wrong, it’s very hard to tell until the damage is done.

According to the OWASP Top 10 for LLM Applications (2025), agents can be tricked into abusing tools or storing bad information that corrupts future decisions — a process known as memory poisoning. Some fall into cascading hallucinations, generating plausible but false outputs that reinforce themselves over time. Others escalate privileges, impersonate users, or veer off course entirely, ignoring constraints to pursue misaligned goals. Some even use deception to bypass safeguards.

Agents can also be overwhelmed — intentionally or not — with too many tasks, draining memory, computing, or API resources. And when agent interfaces are built on frameworks like MCP, without logging, authentication, or third-party validation, it becomes nearly impossible to trace what happened — or who’s really in control.

Why Oversight Isn’t Scaling

Agentic AI is growing fast, but the ability to manage it isn’t. NVIDIA CEO Jensen Huang envisions a future where companies comprise 50,000 employees overseeing 100 million or more AI agents. This ratio spotlights the problem perfectly: human governance cannot possibly scale linearly with AI agent adoption. 

One clear and present oversight danger lies in “shadow agents” — autonomous systems launched under the radar by developers or embedded in SaaS platforms without a formal security review. These agents often operate without visibility, authentication, or logging — making it nearly impossible to track what they’re doing or how they’re behaving.

And even when oversight exists, it’s fragile. Agents can overwhelm human-in-the-loop processes with constant alerts or requests, creating decision fatigue — a tactic attackers may intentionally exploit. As agentic workflows grow more complex, the traditional governance model is breaking down, leaving organizations exposed to risks they can’t see, and can’t easily stop.

The Regulatory Gap

For all their autonomy, agents actually do not exist in a regulatory vacuum. Yet in most cases, compliance frameworks haven’t caught up with the realities of agentic AI. There’s little guidance on how to audit decision chains, assign accountability or verify that outputs meet policy standards.

Basic controls are often missing. Many MCP-based agents lack encryption, identity validation, or consistent logging — making it hard to detect tampering or unauthorized access. And as agents increasingly rely on Retrieval-Augmented Generation (RAG) to access internal knowledge sources, the risk of sensitive data exposure grows.

What’s more, traditional Identity and Access Management (IAM) systems are designed to handle human users — not autonomous agents. As a result, they can’t fail to validate or monitor non-human identities (NHIs) effectively. Without continuous identity verification and behavioral anomaly detection, spoofed or malicious agents can operate undetected within critical systems.

What Needs to Change

Agentic AI doesn’t just need new security compliance frameworks — it needs a fundamentally different operational model. Securing these systems means treating agents like any other powerful actor in the environment — subject to rigorous validation, real-time monitoring, and enforceable policies. To do that effectively, organizations must: 

Control Non-Human Identities

Use strong identity validation, continuous behavioral profiling, and anomaly detection to catch impersonation or spoofing attempts before they cause damage.

Secure RAG Systems at the Source

Enforce strict access control over knowledge sources, monitor embedding spaces for adversarial patterns, and evaluate similarity scoring for data leakage risks.

Run Automated Red Teaming — Continuously

Conduct adversarial simulations before, during, and after deployment to surface novel agent behaviors, misalignments, or configuration gaps.

Establish Governance for GenAI

Define custom policies for agent behavior, enforce them at runtime, and implement full-lifecycle logging, auditability, and permission reviews.

The Bottom Line

Agentic AI isn’t just another tech upgrade, it’s fundamentally changing the way decisions are made and who (or what) makes them. The problem is that it’s moving faster than security teams can possibly accomplish. And without real oversight, clear lines of responsibility, and the right controls in place, agents won’t just boost productivity, they’ll open the door to serious risk.

Securing them means treating AI agents like any other powerful player in your environment. They can make good calls, bad ones, or get pushed into doing something harmful. That’s why it’s critical to validate non-human identities, protect internal knowledge flows, and track every action they take.

The hype is real, but so are the risks. If agents are going to run our systems, they need to follow our rules.

KEYWORDS: artificial intelligence (AI) Artificial Intelligence (AI) Security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Elad schulman headshot

Elad Schulman is the CEO & Co Founder of Lasso. Image courtesy of Schulman

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Monitors with keyboard

    Mitigating the hidden risks of AI in security and SOCs

    See More
  • Laptop keyboard with pink and red lights

    78% of organizations are tracking AI risks

    See More
  • Handshake

    The AI arms race in cybersecurity: Why trust is the ultimate defense

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • databasehacker

    The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • December 12, 2024

    AI-Powered Security: Empowering Teams and Protecting Your Future

    ON DEMAND: Discover how artificial intelligence is revolutionizing modern security practices in this webinar “AI-Powered Security: Empowering Your Team, Protecting Your Future.”
  • November 14, 2024

    Best Practices for Integrating AI Responsibly

    ON DEMAND: Discover how artificial intelligence is reshaping the business landscape. AI holds immense potential to revolutionize industries, but with it comes complex questions about its risks and rewards.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing