By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: How to protect AI agents
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Mobile > How to protect AI agents
Mobile

How to protect AI agents

News Room
Last updated: 2025/11/16 at 12:15 AM
News Room Published 16 November 2025
Share
How to protect AI agents
SHARE

Protecting AI agents will be one of the most important tasks in the cybersecurity industry. And as organizations rapidly adopt AI agents to automate tasks and boost efficiency, these autonomous entities are establishing themselves as an new and powerful kind of identity and with such advanced privileges how to “represent” humans.

AI agents introduce new risksincluding agent hallucinations, misuse, and possible control by cybercriminals. These risks are intensified when agents require elevated privileges. CyberArk, the firm specializing in identity security, has announced the general availability of CyberArk Secure AI Agentsone of the first solutions to include privilege controls to protect AI agents.

CyberArk Secure AI Agents address the challenges by applying the appropriate level of privilege controls, helping to ensure that AI agents have only the necessary access, when they need it and nothing more. This approach reduces risk, helps prevent unauthorized access, and enables organizations to confidently scale their AI-based initiatives.

“As organizations adopt AI agents, we must understand how identity-centric risks evolve when agents require elevated privileges”explains Matt Cohen, CEO of CyberArk. “Without robust discovery, robust privilege controls, and comprehensive lifecycle management, organizations risk losing visibility and opening the door to catastrophic agent attacks. CyberArk uniquely protects the full spectrum of identities—human, machine, and AI agents—by applying the right level of privilege controls, enabling innovation while maintaining security and compliance.”.

And it seems necessary since a study by this company on CISOs predicts that the adoption of AI agents will reach 76% of companies in the next three years. However, less than 10% of organizations have adequate security and privilege controls in place.

Protect AI agents

AI agents act with autonomy, reasoning, and access to sensitive systems, often requiring privileged permissions to execute their functions. Without proper supervision, These privileges can be abused or violatedcausing serious business and regulatory consequences.

CyberArk’s Identity Security platform offers comprehensive privilege controls for the entire spectrum of identities: human, machine and AI. The extension to autonomous AI agents will apply the same principles of just-in-time access, least privilege and continuous session monitoring.

This unified, privilege-based approach ensures that each identity is governed, protected and monitored with the same rigor, enabling innovation without compromising security or compliance, offering capabilities such as:

  • Comprehensive agent detection– Automatic detection of AI agents in SaaS, cloud, and development environments, with rich profiles including ownership, roles, and access rights.
  • Secure agent access– Strong authentication and least privilege access, no sticky privileges, and auditing of agent activity.
  • Real-time threat detection– Continuous monitoring of anomalies and unauthorized access, activating automated alerts and rapid response.
  • Lifecycle management and regulatory compliance– Governance of the AI ​​agent from creation to deactivation, supporting evolving regulatory requirements and audit readiness.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Comparing the 2026 Phone Lineups From Apple, Samsung, Google and Everyone Else Comparing the 2026 Phone Lineups From Apple, Samsung, Google and Everyone Else
Next Article PSA: Here’s why your Pixel 6 and Pixel 7 didn’t get Google’s monthly update this November PSA: Here’s why your Pixel 6 and Pixel 7 didn’t get Google’s monthly update this November
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Indie App Spotlight: ‘Dimewise’ is a minimal budgeting app for iPhone, with Liquid Glass – 9to5Mac
Indie App Spotlight: ‘Dimewise’ is a minimal budgeting app for iPhone, with Liquid Glass – 9to5Mac
News
Celebrating the Power of Innovation: The 2025 PCMag Technical Excellence Awards
Celebrating the Power of Innovation: The 2025 PCMag Technical Excellence Awards
News
You Can Use OpenAI’s Sora 2 On Your iPhone Right Now – Here’s How – BGR
You Can Use OpenAI’s Sora 2 On Your iPhone Right Now – Here’s How – BGR
News
Is Cryptocurrency Tron Still a Smart Investment in 2025?
Is Cryptocurrency Tron Still a Smart Investment in 2025?
Gadget

You Might also Like

Discover These 2025 Camera Phones That Deliver Stunning Professional-Level Shots
Mobile

Discover These 2025 Camera Phones That Deliver Stunning Professional-Level Shots

1 Min Read
The longest train in history was born in 2001 and since then no one has surpassed it
Mobile

The longest train in history was born in 2001 and since then no one has surpassed it

6 Min Read
a supercomputer’s brutal warning about the future of the Earth
Mobile

a supercomputer’s brutal warning about the future of the Earth

3 Min Read
The debate over the 6 GHz band in Europe
Mobile

The debate over the 6 GHz band in Europe

5 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?