Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity Education & Training

Agentic AI Security Is Complicated, and the Hyper-Scalers Know It

By John Peluso
Illustrated ladder
Hammam Fuad همَّام via Unsplash
January 2, 2026

Microsoft admitted that AI agents are a security risk with the launch of Agent 365, a unified control plane for AI agents that promises governance through familiar tools like Entra and Purview.  

This is a necessary first step for securing AI agents, but it’s not the finish line. In fact, Gartner predicts that 40% of organizations will soon abandon their agentic AI projects due to these exact security concerns. Microsoft is attempting to stem the bleeding with Agent365, but it’s complicated: even with Entra IDs assigned to every agent, discovery and lifecycle management remain partial solutions. 

Instead of relying solely on the hyper-scalers, organizations should follow these three best practices to lay the groundwork for secure and efficient adoption and use.  

1. Implement Comprehensive, Holistic Data Governance 

According to research, only 30% of AI-adopting organizations classify and protect data effectively, and IBM has found that 63% of AI-adopting organizations lack an AI governance framework entirely, leading to widespread AI-related breaches across regions and industries. 

True governance requires a framework that manages your entire data estate — from creation to deletion — regardless of the cloud platform your agents are built on. To prevent risks, you need automated data classification and access controls that protect the data itself, not just the agents accessing it. These measures require upfront investment but are still more effective and less costly than the reactive solutions that the hyper-scalers are scrambling to provide. The benefits of holistic data governance also extend beyond agentic AI. With better organized and regulated data, you’ll limit risks, reduce storage costs, and increase efficiency across your entire organization.  

2. Train Your Teams on Agentic AI Governance and Security Best Practices  

AI security and governance frameworks won’t be truly effective until they’ve been socialized throughout an organization, which is why enablement programs are a crucial step to secure agentic AI adoption. This is true of all AI products, but it’s particularly true of agentic AI tools, since agentic AI’s autonomy and decision-making authority create new and novel risks.  

Your first line of defense is an educated workforce that knows your organization’s policies. That’s why organizations should conduct targeted training on technical and ethical risks of agentic AI, organize cross-functional incident response exercises, and provide regular updates on regulations. Ongoing education and hands-on experience make it easier to identify threats and adapt quickly to new compliance requirements, which limits risks in unique and important ways.  

3. Integrate Additional Agent Oversight 

“Native” security often means “locked-in” security. Relying solely on platform-native controls leaves you blind to the fact that most teams are using tools across clouds. With agnostic oversight from a third-party, you ensure your security posture isn’t dictated by a single vendor’s roadmap, allowing you to govern agents consistently whether they live in Azure, AWS, GCP or anywhere else. 

These solutions can often integrate seamlessly with existing security infrastructure and provide transparent reporting, which helps organizations quickly identify and mitigate anomalous agent activities. Unlike the reactive fixes from big vendors, which often lack flexibility and comprehensive coverage, third-party tools can provide more independence and allow you to maintain a consistent, organization-specific security posture across all AI deployments. It’s also critical to establish guardrails for unmanaged agents — not just agents your organization is deliberately publishing — which third-party providers often excel at.  

While the hyper-scalers are used to “moving fast and breaking things” (as Mark Zuckerberg once said) or creating a culture where “everyone is a maker” (as they say at Microsoft), other providers are used to managing the risk that these innovations inadvertently create. That’s another reason why it’s important to integrate additional agent oversight for both managed and unmanaged agents alike. 

Before Turning to a Reactive Solution, Lay the Groundwork for Success 

At the end of the day, agentic AI vendors and organizations that use agentic AI both want the technology to work safely and effectively, but that doesn’t mean that organizations can or should rely on big vendors to fix the problems they’ve created. Instead of rushing to plug gaps with reactive solutions, organizations need to first focus on implementing basic, fundamental controls that limit agentic AI risks.  

KEYWORDS: artificial intelligence (AI) best practices data protection

Share This Story

John peluso headshot

John Peluso is Chief Technology Officer at AvePoint. Image courtesy of Peluso 

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Padlock opened with computer keys

630M Passwords Stolen, FBI Reveals: What This Says About Credential Value

Calendar with pins

The Most Dangerous 6 Weeks of the Year

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing