Agent authorization gap: why verified agents are still a risk

https://images.ctfassets.net/jdtwqhzvc2n1/60XQz3Q8JefQQZa15ttuKe/7138d308b4d95c9d8b69146d4da3a1e7/Screenshot_2026-05-14_at_4.47.30%C3%A2__PM.png?w=800&q=75

Anthony Grieco, Cisco’s SVP and chief security and trust officer, did not hesitate when VentureBeat asked whether rogue agent incidents are reaching Cisco’s customer base.

"A hundred percent. We see them regularly," Grieco told VentureBeat in an exclusive interview at RSAC 2026. "I've heard some that I can't repeat, but they do get to the places of, you know, agents are doing things that they think are the right things to do."

The incidents Grieco described follow a consistent pattern: authentication passes, identity checks clear. The agent is exactly who it claims to be. Then it accesses data it was never scoped to touch or takes an action nobody authorized at that level of granularity. The failure is not identity; it's authorization.

"The business is saying things like, we're gonna have 500 agents per employee," Grieco told VentureBeat. "The security leaders are really focused on how to make sure that...

Copyright of this story solely belongs to venturebeat.com. To see the full text click HERE

Read more

https://www.itvoice.in/wp-content/uploads/2026/05/Copy-of-Redington-2026-05-20T130604.690.jpg

Check Point Embarks on a Mission to Transform Network Security Management with its Agentic Network Security Orchestration Platform, to Replace Decades of Rule-Based Complexity

Check Point Software Technologies Ltd, a pioneer and global leader in cyber security solutions, today launched its Agentic Network Security Orchestration Platform, a purpose-built autonomous agent architecture that executes network security operations across enterprise environments, without requiring constant human intervention. The launch continues the company’s mission to fundamentally transform