Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    PAK-W vs ZIM-W, 2nd ODI, Match Prediction: Who will today’s game between Pakistan Women and Zimbabwe Women?

    May 6, 2026

    Aspectos destacados de las llamadas de resultados del primer trimestre de Accel Entertainment – Celebrity Land

    May 6, 2026

    A.P.C. Names New Artistic Director Amid Flux

    May 6, 2026
    Facebook X (Twitter) Instagram
    Select Language
    Facebook X (Twitter) Instagram
    NEWS ON CLICK
    Subscribe
    Wednesday, May 6
    • Home
      • United States
      • Canada
      • Spain
      • Mexico
    • Top Countries
      • Canada
      • Mexico
      • Spain
      • United States
    • Politics
    • Business
    • Entertainment
    • Fashion
    • Health
    • Science
    • Sports
    • Travel
    NEWS ON CLICK
    Home»Business & Economy»US Business & Economy»How AI Agents Are Creating a New Kind of Security Risk
    US Business & Economy

    How AI Agents Are Creating a New Kind of Security Risk

    News DeskBy News DeskMay 5, 2026No Comments6 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email VKontakte Telegram
    How AI Agents Are Creating a New Kind of Security Risk
    Share
    Facebook Twitter Pinterest Email Copy Link

    Opinions expressed by Entrepreneur contributors are their own.

    Key Takeaways

    • Autonomous agents are expanding the attack surface in organizations, as they increasingly operate with direct access to sensitive data — often without human oversight or key security controls in place.
    • Traditional identity and access management strategies were not designed for this shift since they’re built around human users rather than autonomous systems.
    • Automated management must be prioritized in the boardroom, security teams need access to tools that can comprehend what the user is asking for, and there must be a separation of duties at the user level.

    For almost two years, a big change has been taking place when it comes to the security architecture used by most businesses. While most IT teams are still focused on vulnerabilities and fighting common types of ransomware, there has been a new type of risk that has been gradually developing called autonomous access. This risk goes by various names, such as agentic AI, automated workflows and autonomous agents, but ultimately, they all do the same thing.

    Nowadays, it is permitted to act on data without human intervention. Even when it makes transactions, it does not always need approval. It’s an automatic system with an instruction to “get things done” as efficiently as possible.

    The term that is commonly used by IT security practitioners to refer to these problems is OpenClaw. According to the SANS Institute, OpenClaw agents make up “the single greatest expansion of the attack surface since the migration to cloud infrastructure.” The organization’s 2025 State of Identity Threat Report also added that up to two-thirds of organizations are using AI agents with access to sensitive data without having key security measures in place.

    Another bit of work by the Cloud Security Alliance (CSA) identified that automated systems, including AI agents, now make up over 80% of authentication attempts in modern environments, even though they receive less than 5% of security oversight.

    Switching to write-execute access

    Over decades, data security worked according to a simple concept. You were required to protect the keys. If a human’s passwords were fiddled with, they were revoked. If a database was compromised, it was removed from the system.

    Autonomous systems are changing the game. They are being used to execute complex systems. The Cloud Security Alliance’s Complete Technical Guide on Non-Human Identity Security cites that humans with 1,000 or more employees usually maintain 10,000 non-human connections in the form of API keys, OAuth tokens, service accounts and internal secrets. These all secured a unique entry point.

    The research also identified that up to 23% of applications that are connected to Google Workspace have good access permissions (read, write, delete) and can change the sensitive data of organizations. Fifty percent of tokens that link Salesforce to third-party applications are not really used and create unused credentials.

    Through knowledge, an autonomous agent in finance could initiate transfers and adjust payment methods. A customer support agent may modify Personally Identifiable Information (PII) in order to fix an issue. An engineering agent may change repositories and make changes to the way that work is done.

    In all of these scenarios, the agent will not be a human with control but rather an API key that is able to make decisions. A potential problem is that most identity and access management (IAM) strategies were built to be used in simple service accounts.

    A Gartner Peer Community dialogue revealed that established companies face challenges due to debt through accounts that are “quite old and lack necessary metadata,” which makes it difficult for monitoring purposes across the company.

    How to limit the risk

    To reduce the risk associated with OpenClaw, you do not need to end AI adoption completely. You have to update your key qualities. For one, automated management needs to become important in the boardroom. Service accounts, API keys and account information must start to heavily outnumber human actors. Gartner claims that by 2028, close to 70% of CISOs will need Identity Visibility and Intelligence Platforms in order to reduce IAM risk. They will progress beyond human-centered identity governance to also have non-human access reviewed.

    Secondly, security teams will need access to tools that can comprehend what the user may be asking for. The Snyk AI Red Teaming tool uses this approach through testing LLM agents with prompt-based risks and thereby helping developers to include security testing in their development work. The foundation of Cloud Security Alliance’s CSAI is currently doing something like this through a focus on controlling privileged access and monitoring the behavior of users.

    Lastly, there must be a separation of duties at the user level. Automated systems should not be able to access sensitive data and do bad things with it.

    Automated systems are not something that represents a future risk. They are current systems used by companies in order to gain advantages in the AI race.

    SC Media stated, “NHI’s are the fastest-growing, least-governed and most exploited attack vector in the enterprise. The organizations that act now to prioritize their protection will be the ones resilient enough to withstand the next generation of cyber threats, safeguarding their systems, customers, reputation and bottom line.”

    The companies that win this competition will be the ones that realize that delegating software duties to AI requires more intensive human oversight, not less.

    Key Takeaways

    • Autonomous agents are expanding the attack surface in organizations, as they increasingly operate with direct access to sensitive data — often without human oversight or key security controls in place.
    • Traditional identity and access management strategies were not designed for this shift since they’re built around human users rather than autonomous systems.
    • Automated management must be prioritized in the boardroom, security teams need access to tools that can comprehend what the user is asking for, and there must be a separation of duties at the user level.

    For almost two years, a big change has been taking place when it comes to the security architecture used by most businesses. While most IT teams are still focused on vulnerabilities and fighting common types of ransomware, there has been a new type of risk that has been gradually developing called autonomous access. This risk goes by various names, such as agentic AI, automated workflows and autonomous agents, but ultimately, they all do the same thing.

    Nowadays, it is permitted to act on data without human intervention. Even when it makes transactions, it does not always need approval. It’s an automatic system with an instruction to “get things done” as efficiently as possible.

    The term that is commonly used by IT security practitioners to refer to these problems is OpenClaw. According to the SANS Institute, OpenClaw agents make up “the single greatest expansion of the attack surface since the migration to cloud infrastructure.” The organization’s 2025 State of Identity Threat Report also added that up to two-thirds of organizations are using AI agents with access to sensitive data without having key security measures in place.

    Artificial Intelligence Cyber Attacks Cybercrime Cybersecurity Entrepreneurs Technology
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Telegram Copy Link
    News Desk
    • Website

    News Desk is the dedicated editorial force behind News On Click. Comprised of experienced journalists, writers, and editors, our team is united by a shared passion for delivering high-quality, credible news to a global audience.

    Related Posts

    US Business & Economy

    This 20-minute digital spring cleaning checklist saves time and money

    May 6, 2026
    US Business & Economy

    California gubernatorial debate tonight: Candidates, what’s at stake, and how to stream the event live

    May 5, 2026
    US Business & Economy

    Kids with fake mustaches can fool high-tech age verification systems

    May 5, 2026
    US Business & Economy

    Delta cuts snacks and drinks from hundreds of daily flights as social media gripes over bare-bones air travel

    May 5, 2026
    US Business & Economy

    The 3 Questions I Use to Audit My Leadership — and Keep My Team Moving Forward

    May 5, 2026
    US Business & Economy

    The artist behind Emma Chamberlain’s Met Gala gown on why it took 40 hours to paint

    May 5, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Don't Miss

    PAK-W vs ZIM-W, 2nd ODI, Match Prediction: Who will today’s game between Pakistan Women and Zimbabwe Women?

    News DeskMay 6, 20260

    Pakistan enter the second encounter with significant momentum after a clinical 168-run victory in the…

    Aspectos destacados de las llamadas de resultados del primer trimestre de Accel Entertainment – Celebrity Land

    May 6, 2026

    A.P.C. Names New Artistic Director Amid Flux

    May 6, 2026

    This 20-minute digital spring cleaning checklist saves time and money

    May 6, 2026
    Tech news by Newsonclick.com
    Top Posts

    Orioles contact-less lineup tries for better results vs. Guardians

    April 19, 2026

    Missouri town fires half its city council over data center deal

    April 13, 2026

    Barcelona Events, Festivals, Exhibitions, and Concerts

    December 7, 2025

    Avatar de Cerati recrea el espíritu de Soda Stereo

    April 14, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Editors Picks

    PAK-W vs ZIM-W, 2nd ODI, Match Prediction: Who will today’s game between Pakistan Women and Zimbabwe Women?

    May 6, 2026

    Aspectos destacados de las llamadas de resultados del primer trimestre de Accel Entertainment – Celebrity Land

    May 6, 2026

    A.P.C. Names New Artistic Director Amid Flux

    May 6, 2026

    This 20-minute digital spring cleaning checklist saves time and money

    May 6, 2026
    About Us

    NewsOnClick.com is your reliable source for timely and accurate news. We are committed to delivering unbiased reporting across politics, sports, entertainment, technology, and more. Our mission is to keep you informed with credible, fact-checked content you can trust.

    We're social. Connect with us:

    Facebook X (Twitter) Instagram Pinterest YouTube
    Latest Posts

    PAK-W vs ZIM-W, 2nd ODI, Match Prediction: Who will today’s game between Pakistan Women and Zimbabwe Women?

    May 6, 2026

    Aspectos destacados de las llamadas de resultados del primer trimestre de Accel Entertainment – Celebrity Land

    May 6, 2026

    A.P.C. Names New Artistic Director Amid Flux

    May 6, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Editorial Policy
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    • Advertise
    • Contact Us
    © 2026 Newsonclick.com || Designed & Powered by ❤️ Trustmomentum.com.

    Type above and press Enter to search. Press Esc to cancel.