Friday, 1 May 2026
Subscribe
logo
  • AI Compute
  • Infrastructure
  • Power & Cooling
  • Security
  • Colocation
  • Cloud Computing
  • More
    • Sustainability
    • Industry News
    • About Data Center News
    • Terms & Conditions
Font ResizerAa
Data Center NewsData Center News
Search
  • AI Compute
  • Infrastructure
  • Power & Cooling
  • Security
  • Colocation
  • Cloud Computing
  • More
    • Sustainability
    • Industry News
    • About Data Center News
    • Terms & Conditions
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > AI & Compute > Invisible, autonomous and hackable: The AI agent dilemma no one saw coming
AI & Compute

Invisible, autonomous and hackable: The AI agent dilemma no one saw coming

Last updated: February 22, 2025 8:00 am
Published February 22, 2025
Share
Invisible, autonomous and hackable: The AI agent dilemma no one saw coming
SHARE

This text is a part of VentureBeat’s particular subject, “The cyber resilience playbook: Navigating the brand new period of threats.” Learn extra from this particular subject right here.

Generative AI poses fascinating safety questions, and as enterprises transfer into the agentic world, these issues of safety enhance. 

When AI brokers enter workflows, they need to be capable of entry delicate knowledge and paperwork to do their job — making them a major danger for a lot of security-minded enterprises.

“The rising use of multi-agent programs will introduce new assault vectors and vulnerabilities that might be exploited in the event that they aren’t secured correctly from the beginning,” mentioned Nicole Carignan, VP of strategic cyber AI at Darktrace. “However the impacts and harms of these vulnerabilities might be even larger due to the rising quantity of connection factors and interfaces that multi-agent programs have.”

Why AI brokers pose such a excessive safety danger

AI brokers — or autonomous AI that executes actions on customers’ behalf — have develop into extraordinarily fashionable in simply the previous few months. Ideally, they are often plugged into tedious workflows and might carry out any job, from one thing so simple as discovering info primarily based on inside paperwork to creating suggestions for human workers to take.

However they current an fascinating downside for enterprise safety professionals: They have to achieve entry to knowledge that makes them efficient, with out by chance opening or sending non-public info to others. With brokers doing extra of the duties human workers used to do, the query of accuracy and accountability comes into play, doubtlessly changing into a headache for safety and compliance groups. 

See also  Transform 2025: Why observability is critical for AI agent ecosystems

Chris Betz, CISO of AWS, advised VentureBeat that retrieval-augmented technology (RAG) and agentic use circumstances “are an interesting and fascinating angle” in safety. 

“Organizations are going to wish to consider what default sharing of their group appears to be like like, as a result of an agent will discover via search something that may help its mission,” mentioned Betz. “And for those who overshare paperwork, it’s worthwhile to be fascinated about the default sharing coverage in your group.”

Safety professionals should then ask if brokers must be thought-about digital workers or software program. How a lot entry ought to brokers have? How ought to they be recognized?

AI agent vulnerabilities

Gen AI has made many enterprises extra conscious of potential vulnerabilities, however brokers may open them to much more points.

“Assaults that we see at the moment impacting single-agent programs, equivalent to knowledge poisoning, immediate injection or social engineering to affect agent conduct, may all be vulnerabilities inside a multi-agent system,” mentioned Carignan. 

Enterprises should take note of what brokers are capable of entry to make sure knowledge safety stays sturdy. 

Betz identified that many safety points surrounding human worker entry can prolong to brokers. Due to this fact, it “comes down to creating certain that individuals have entry to the appropriate issues and solely the appropriate issues.” He added that in the case of agentic workflows with a number of steps, “every a kind of phases is a chance” for hackers.

Give brokers an id

One reply might be issuing particular entry identities to brokers. 

See also  Opera introduces browser-integrated AI agent

A world the place fashions motive about issues over the course of days is “a world the place we must be pondering extra round recording the id of the agent in addition to the id of the human liable for that agent request all over the place in our group,” mentioned Jason Clinton, CISO of mannequin supplier Anthropic. 

Figuring out human workers is one thing enterprises have been doing for a really very long time. They’ve particular jobs; they’ve an e mail handle they use to signal into accounts and be tracked by IT directors; they’ve bodily laptops with accounts that may be locked. They get particular person permission to entry some knowledge.

A variation of this sort of worker entry and identification might be deployed to brokers. 

Each Betz and Clinton imagine this course of can immediate enterprise leaders to rethink how they supply info entry to customers. It may even lead organizations to overtake their workflows. 

“Utilizing an agentic workflow truly provides you a chance to certain the use circumstances for every step alongside the way in which to the information it wants as a part of the RAG, however solely the information it wants,” mentioned Betz. 

He added that agentic workflows “can assist handle a few of these considerations about oversharing,” as a result of corporations should contemplate what knowledge is being accessed to finish actions. Clinton added that in a workflow designed round a particular set of operations, “there’s no motive why the 1st step must have entry to the identical knowledge that step seven wants.”

See also  Black Forest Labs launches Flux.2 AI image models to challenge Nano Banana Pro and Midjourney

The old style audit isn’t sufficient

Enterprises also can search for agentic platforms that permit them to peek inside how brokers work. For instance, Don Schuerman, CTO of workflow automation supplier Pega, mentioned his firm helps guarantee agentic safety by telling the consumer what the agent is doing. 

“Our platform is already getting used to audit the work people are doing, so we will additionally audit each step an agent is doing,” Schuerman advised VentureBeat. 

Pega’s latest product, AgentX, permits human customers to toggle to a display outlining the steps an agent undertakes. Customers can see the place alongside the workflow timeline the agent is and get a readout of its particular actions. 

Audits, timelines and identification will not be good options to the safety points offered by AI brokers. However as enterprises discover brokers’ potential and start to deploy them, extra focused solutions may come up as AI experimentation continues. 

Source link

Contents
Why AI brokers pose such a excessive safety dangerAI agent vulnerabilitiesGive brokers an idThe old style audit isn’t sufficient
TAGGED: Agent, autonomous, coming, dilemma, hackable, invisible
Share This Article
Twitter Email Copy Link Print
Previous Article ‘World’s Largest AI Data Center’ Planned for South Korea ‘World’s Largest AI Data Center’ Planned for South Korea
Next Article How Cisco’s AI Defense aims to stop cyber threats you never see How Cisco’s AI Defense aims to stop cyber threats you never see
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

How configuration management can become an asset for enterprises

Configuration has develop into an invisible but dramatic danger for right this moment’s enterprises rolling-out…

November 1, 2025

Switzerland releases its own fully open AI model

A bunch of Swiss establishments has launched a brand new open AI mannequin, designed to…

September 4, 2025

Intel Shares Surge the Most Since 2023 on Breakup Speculation

(Bloomberg) -- Intel Company gained as a lot as 11% on hypothesis that the long-lasting…

February 18, 2025

Meta revises AI chatbot policies amid child safety concerns

Meta is revising how its AI chatbots work together with customers after a sequence of…

September 3, 2025

DeepSeek’s success shows why motivation is key to AI innovation

Be a part of our each day and weekly newsletters for the newest updates and…

April 26, 2025

You Might Also Like

STL launches Neuralis data centre connectivity suite in the U.S.
AI & Compute

STL launches Neuralis data centre connectivity suite in the U.S.

By saad
What is optical interconnect and why Lightelligence's $10B debut says it matters for AI
AI & Compute

What is optical interconnect and why Lightelligence’s $10B debut says it matters for AI

By saad
IBM launches AI platform Bob to regulate SDLC costs
AI & Compute

IBM launches AI platform Bob to regulate SDLC costs

By saad
The evolution of encoders: From simple models to multimodal AI
AI & Compute

The evolution of encoders: From simple models to multimodal AI

By saad

About Us

Data Center News is your dedicated source for data center infrastructure, AI compute, cloud, and industry news.

Top Categories

  • AI & Compute
  • Cloud Computing
  • Power & Cooling
  • Colocation
  • Security
  • Infrastructure
  • Sustainability
  • Industry News

Useful Links

  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

Find Us on Socials

© 2026 Data Center News. All Rights Reserved.

© 2026 Data Center News. All Rights Reserved.
Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.