Close Menu
  • Homepage
  • Local News
  • India
  • World
  • Politics
  • Sports
  • Finance
  • Entertainment
  • Business
  • Technology
  • Health
  • Lifestyle
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
Facebook X (Twitter) Instagram Pinterest
JHB NewsJHB News
  • Local
  • India
  • World
  • Politics
  • Sports
  • Finance
  • Entertainment
Let’s Fight Corruption
JHB NewsJHB News
Home»Technology»Invisible, autonomous and hackable: The AI agent dilemma no one saw coming
Technology

Invisible, autonomous and hackable: The AI agent dilemma no one saw coming

February 21, 2025No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Invisible, autonomous and hackable: The AI agent dilemma no one saw coming
Share
Facebook Twitter LinkedIn Pinterest Email

This text is a part of VentureBeat’s particular problem, “The cyber resilience playbook: Navigating the brand new period of threats.” Learn extra from this particular problem right here.

Generative AI poses attention-grabbing safety questions, and as enterprises transfer into the agentic world, these questions of safety improve. 

When AI brokers enter workflows, they have to be capable to entry delicate knowledge and paperwork to do their job — making them a major danger for a lot of security-minded enterprises.

“The rising use of multi-agent programs will introduce new assault vectors and vulnerabilities that may very well be exploited in the event that they aren’t secured correctly from the beginning,” mentioned Nicole Carignan, VP of strategic cyber AI at Darktrace. “However the impacts and harms of these vulnerabilities may very well be even greater due to the growing quantity of connection factors and interfaces that multi-agent programs have.”

Why AI brokers pose such a excessive safety danger

AI brokers — or autonomous AI that executes actions on customers’ behalf — have grow to be extraordinarily standard in simply the previous few months. Ideally, they are often plugged into tedious workflows and might carry out any process, from one thing so simple as discovering data based mostly on inner paperwork to creating suggestions for human staff to take.

However they current an attention-grabbing drawback for enterprise safety professionals: They have to achieve entry to knowledge that makes them efficient, with out unintentionally opening or sending non-public data to others. With brokers doing extra of the duties human staff used to do, the query of accuracy and accountability comes into play, probably turning into a headache for safety and compliance groups. 

Chris Betz, CISO of AWS, advised VentureBeat that retrieval-augmented era (RAG) and agentic use instances “are an enchanting and attention-grabbing angle” in safety. 

“Organizations are going to wish to consider what default sharing of their group appears to be like like, as a result of an agent will discover by means of search something that may assist its mission,” mentioned Betz. “And should you overshare paperwork, you should be fascinated with the default sharing coverage in your group.”

Safety professionals should then ask if brokers must be thought-about digital staff or software program. How a lot entry ought to brokers have? How ought to they be recognized?

AI agent vulnerabilities

Gen AI has made many enterprises extra conscious of potential vulnerabilities, however brokers might open them to much more points.

“Assaults that we see at this time impacting single-agent programs, equivalent to knowledge poisoning, immediate injection or social engineering to affect agent conduct, might all be vulnerabilities inside a multi-agent system,” mentioned Carignan. 

Enterprises should take note of what brokers are capable of entry to make sure knowledge safety stays sturdy. 

Betz identified that many safety points surrounding human worker entry can prolong to brokers. Subsequently, it “comes down to creating certain that folks have entry to the precise issues and solely the precise issues.” He added that in the case of agentic workflows with a number of steps, “every a type of phases is a chance” for hackers.

Give brokers an identification

One reply may very well be issuing particular entry identities to brokers. 

A world the place fashions purpose about issues over the course of days is “a world the place we have to be pondering extra round recording the identification of the agent in addition to the identification of the human chargeable for that agent request all over the place in our group,” mentioned Jason Clinton, CISO of mannequin supplier Anthropic. 

Figuring out human staff is one thing enterprises have been doing for a really very long time. They’ve particular jobs; they’ve an e mail handle they use to signal into accounts and be tracked by IT directors; they’ve bodily laptops with accounts that may be locked. They get particular person permission to entry some knowledge.

A variation of this sort of worker entry and identification may very well be deployed to brokers. 

Each Betz and Clinton consider this course of can immediate enterprise leaders to rethink how they supply data entry to customers. It might even lead organizations to overtake their workflows. 

“Utilizing an agentic workflow truly affords you a chance to certain the use instances for every step alongside the way in which to the information it wants as a part of the RAG, however solely the information it wants,” mentioned Betz. 

He added that agentic workflows “will help handle a few of these issues about oversharing,” as a result of firms should take into account what knowledge is being accessed to finish actions. Clinton added that in a workflow designed round a selected set of operations, “there’s no purpose why the 1st step must have entry to the identical knowledge that step seven wants.”

The old school audit isn’t sufficient

Enterprises may search for agentic platforms that permit them to peek inside how brokers work. For instance, Don Schuerman, CTO of workflow automation supplier Pega, mentioned his firm helps guarantee agentic safety by telling the person what the agent is doing. 

“Our platform is already getting used to audit the work people are doing, so we will additionally audit each step an agent is doing,” Schuerman advised VentureBeat. 

Pega’s latest product, AgentX, permits human customers to toggle to a display screen outlining the steps an agent undertakes. Customers can see the place alongside the workflow timeline the agent is and get a readout of its particular actions. 

Audits, timelines and identification should not good options to the safety points offered by AI brokers. However as enterprises discover brokers’ potential and start to deploy them, extra focused solutions might come up as AI experimentation continues. 

Source link

Agent autonomous coming dilemma Hackable invisible
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

The quiet rise of technofeudalism

June 3, 2025

OpenAI building search index to power ChatGPT super assistant, reveals leaked internal document | Technology News

June 3, 2025

AI threat to entry-level jobs sparks fierce debate after Anthropic CEO’s warning | Technology News

June 2, 2025

Doctor Who’s Finale Spectacularly Failed These Two Characters

June 2, 2025
Add A Comment
Leave A Reply Cancel Reply

Editors Picks

The quiet rise of technofeudalism

June 3, 2025

Australian job ads fall for second month in May, ANZ-Indeed data shows

June 3, 2025

Assam man says mother detained, Supreme Court to hear plea | India News

June 3, 2025

Your teeth are connected to your heart health

June 3, 2025
Popular Post

First-half miscues doom CU Buffs men’s basketball at UCLA – JHB

International Booker Prize 2024: German win for Kairos

Apple’s Vision Pro starts deliveries at a higher price in China than in the U.S.

Subscribe to Updates

Get the latest news from JHB News about Bangalore, Worlds, Entertainment and more.

JHB News
Facebook X (Twitter) Instagram Pinterest
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
© 2025 Jhb.news - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.