Monday, 12 Jan 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > AI > Invisible, autonomous and hackable: The AI agent dilemma no one saw coming
AI

Invisible, autonomous and hackable: The AI agent dilemma no one saw coming

Last updated: February 22, 2025 8:00 am
Published February 22, 2025
Share
Invisible, autonomous and hackable: The AI agent dilemma no one saw coming
SHARE

This text is a part of VentureBeat’s particular subject, “The cyber resilience playbook: Navigating the brand new period of threats.” Learn extra from this particular subject right here.

Generative AI poses fascinating safety questions, and as enterprises transfer into the agentic world, these issues of safety enhance. 

When AI brokers enter workflows, they need to be capable of entry delicate knowledge and paperwork to do their job — making them a major danger for a lot of security-minded enterprises.

“The rising use of multi-agent programs will introduce new assault vectors and vulnerabilities that might be exploited in the event that they aren’t secured correctly from the beginning,” mentioned Nicole Carignan, VP of strategic cyber AI at Darktrace. “However the impacts and harms of these vulnerabilities might be even larger due to the rising quantity of connection factors and interfaces that multi-agent programs have.”

Why AI brokers pose such a excessive safety danger

AI brokers — or autonomous AI that executes actions on customers’ behalf — have develop into extraordinarily fashionable in simply the previous few months. Ideally, they are often plugged into tedious workflows and might carry out any job, from one thing so simple as discovering info primarily based on inside paperwork to creating suggestions for human workers to take.

However they current an fascinating downside for enterprise safety professionals: They have to achieve entry to knowledge that makes them efficient, with out by chance opening or sending non-public info to others. With brokers doing extra of the duties human workers used to do, the query of accuracy and accountability comes into play, doubtlessly changing into a headache for safety and compliance groups. 

See also  Experimental AI concludes as autonomous systems rise

Chris Betz, CISO of AWS, advised VentureBeat that retrieval-augmented technology (RAG) and agentic use circumstances “are an interesting and fascinating angle” in safety. 

“Organizations are going to wish to consider what default sharing of their group appears to be like like, as a result of an agent will discover via search something that may help its mission,” mentioned Betz. “And for those who overshare paperwork, it’s worthwhile to be fascinated about the default sharing coverage in your group.”

Safety professionals should then ask if brokers must be thought-about digital workers or software program. How a lot entry ought to brokers have? How ought to they be recognized?

AI agent vulnerabilities

Gen AI has made many enterprises extra conscious of potential vulnerabilities, however brokers may open them to much more points.

“Assaults that we see at the moment impacting single-agent programs, equivalent to knowledge poisoning, immediate injection or social engineering to affect agent conduct, may all be vulnerabilities inside a multi-agent system,” mentioned Carignan. 

Enterprises should take note of what brokers are capable of entry to make sure knowledge safety stays sturdy. 

Betz identified that many safety points surrounding human worker entry can prolong to brokers. Due to this fact, it “comes down to creating certain that individuals have entry to the appropriate issues and solely the appropriate issues.” He added that in the case of agentic workflows with a number of steps, “every a kind of phases is a chance” for hackers.

Give brokers an id

One reply might be issuing particular entry identities to brokers. 

See also  SK Telecom showcases autonomous robots powered by Telco Edge AI

A world the place fashions motive about issues over the course of days is “a world the place we must be pondering extra round recording the id of the agent in addition to the id of the human liable for that agent request all over the place in our group,” mentioned Jason Clinton, CISO of mannequin supplier Anthropic. 

Figuring out human workers is one thing enterprises have been doing for a really very long time. They’ve particular jobs; they’ve an e mail handle they use to signal into accounts and be tracked by IT directors; they’ve bodily laptops with accounts that may be locked. They get particular person permission to entry some knowledge.

A variation of this sort of worker entry and identification might be deployed to brokers. 

Each Betz and Clinton imagine this course of can immediate enterprise leaders to rethink how they supply info entry to customers. It may even lead organizations to overtake their workflows. 

“Utilizing an agentic workflow truly provides you a chance to certain the use circumstances for every step alongside the way in which to the information it wants as a part of the RAG, however solely the information it wants,” mentioned Betz. 

He added that agentic workflows “can assist handle a few of these considerations about oversharing,” as a result of corporations should contemplate what knowledge is being accessed to finish actions. Clinton added that in a workflow designed round a particular set of operations, “there’s no motive why the 1st step must have entry to the identical knowledge that step seven wants.”

See also  A standard, open framework for building AI agents is coming from Cisco, LangChain and Galileo

The old style audit isn’t sufficient

Enterprises also can search for agentic platforms that permit them to peek inside how brokers work. For instance, Don Schuerman, CTO of workflow automation supplier Pega, mentioned his firm helps guarantee agentic safety by telling the consumer what the agent is doing. 

“Our platform is already getting used to audit the work people are doing, so we will additionally audit each step an agent is doing,” Schuerman advised VentureBeat. 

Pega’s latest product, AgentX, permits human customers to toggle to a display outlining the steps an agent undertakes. Customers can see the place alongside the workflow timeline the agent is and get a readout of its particular actions. 

Audits, timelines and identification will not be good options to the safety points offered by AI brokers. However as enterprises discover brokers’ potential and start to deploy them, extra focused solutions may come up as AI experimentation continues. 

Source link

Contents
Why AI brokers pose such a excessive safety dangerAI agent vulnerabilitiesGive brokers an idThe old style audit isn’t sufficient
TAGGED: Agent, autonomous, coming, dilemma, hackable, invisible
Share This Article
Twitter Email Copy Link Print
Previous Article Pharos Raises $5M in Seed Funding Proximity Raises $3M in Seed Funding
Next Article Reflexivity Raises $30M in Series B Funding Capi Money Raises €17.2M in Series A Funding
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Anthropic tests AI running a real business with bizarre results

Anthropic tasked its Claude AI mannequin with working a small enterprise to check its real-world…

June 27, 2025

CenterOak Partners Closes Fund III, at $1.1 Billion

CenterOak Partners, LLC, a Dallas, TX-based non-public fairness agency, closed CenterOak Fairness Fund III, L.P.…

August 26, 2024

Top Software for Mastering Pay-Per-Call Marketing

Companies within the fast-paced advertising sector are consistently searching for contemporary approaches to draw customers…

July 12, 2024

Qwen's new Deep Research update lets you turn its reports into webpages, podcasts in seconds

Chinese language e-commerce large Alibaba’s famously prolific Qwen Workforce of AI mannequin researchers and engineers…

October 22, 2025

Agenus Receives Investment from Zynext Ventures

Agenus, a Lexington, MA-based immuno-oncology firm creating new therapeutics for high-unmet want cancers, obtained an…

June 3, 2025

You Might Also Like

Autonomy without accountability: The real AI risk
AI

Autonomy without accountability: The real AI risk

By saad
The future of personal injury law: AI and legal tech in Philadelphia
AI

The future of personal injury law: AI and legal tech in Philadelphia

By saad
How AI code reviews slash incident risk
AI

How AI code reviews slash incident risk

By saad
Aumovio turns to cloud computing to scale autonomous vehicle testing
Cloud Computing

Aumovio turns to the cloud to scale autonomous vehicle testing

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.