#agentic-ai-security

[ follow ]
fromTechzine Global
6 days ago

AI agents are the perfect insider

AI on the dark side has done three things particularly well: speed, scale, and sophistication. As a result, the time between a successful intrusion and the actual theft of data has decreased significantly over the past three years. Whereas three years ago the average period was nine days, it is now one day. The fastest case documented by Palo Alto Networks was even 72 minutes.
Information security
fromArs Technica
2 weeks ago

Perplexity announces "Computer," an AI agent that assigns work to other AI agents

Given the right permissions and with the proper plugins, it could create, modify, or delete the user's files and otherwise change things far beyond what most users could achieve with existing models and MCP. Users would use files like USER.MD, MEMORY.MD, SOUL.MD, or HEARTBEAT.MD to give the tool context about its goals and how to work toward them independently, sometimes running for long stretches without direct user input.
Artificial intelligence
Artificial intelligence
fromZDNET
2 weeks ago

AI agents are fast, loose, and out of control, MIT study finds

Agentic AI systems lack transparency and security protocols, with developers failing to disclose risks adequately, creating significant security vulnerabilities and operational uncertainties.
Information security
fromThe Hacker News
2 months ago

[Webinar] Securing Agentic AI: From MCPs and Tool Access to Shadow API Key Sprawl

Agentic AI that can execute code expands attack surface through Machine Control Protocols; securing MCPs, APIs, and shadow keys is essential to prevent automation-driven breaches.
fromComputerWeekly.com
3 months ago

Strategic shift pays off as Okta bids to ease agentic AI risk | Computer Weekly

Coming out of last year we had an important shift in strategy. We'd realised that going out to Q4 [1 November 2024 - 31 January 2025] our product innovation had accelerated to the point where it was putting a burden on our sales organisation to have to sell all products to all people.
Information security
[ Load more ]