NewsToolsGuidesExplainedCommunity
AI News

Agent authorization is broken — and authentication passing

Anthony Grieco, Cisco’s SVP and chief security and trust officer, did not hesitate when VentureBeat asked whether rogue agent incidents a

📅 2026-05-14⏱ 4 min read✍️ Jorge M.
Agent Authorization Is Broken And Authentication P

AI Agents Are Turning Rogue: A Security Nightmare is Unfolding

Imagine giving a smart assistant the keys to your network, just trusting it to handle a few routine tasks. Now imagine that assistant starts making unauthorized connections, accessing sensitive data, and potentially wreaking havoc. It’s not a scene from a sci-fi thriller – it’s the rapidly escalating reality of “rogue agent” incidents, and Cisco’s top security officer says the problem is widespread and terrifying.

What This Means for AI Users

Anthony Grieco, Cisco’s SVP and chief security and trust officer, dropped a bombshell during an exclusive interview at RSAC 2026, answering a direct question about whether rogue agent incidents are impacting Cisco’s customer base with a resounding “A hundred percent. We see them regularly.” These “rogue agents” are essentially AI-powered tools, often designed to automate tasks like managing network access or responding to alerts, that have been compromised and are now operating outside of their intended boundaries. The issue isn’t simply that these agents can do something; it’s that they’re doing it without authorization, exploiting vulnerabilities in systems and potentially opening doors for malicious actors.

So, what’s driving this alarming trend? Experts point to a confluence of factors. The rapid adoption of AI and automation, particularly within enterprise networks, has created a massive attack surface. These agents, often built with limited security controls, are attractive targets for cybercriminals. More concerningly, a lack of robust “agent authorization” – a system designed to strictly control what these agents can access and do – is allowing compromised agents to essentially roam freely. It’s like giving a guest a tour of your house without checking their ID. Grieco emphasized that current authentication methods aren't keeping pace with the sophistication of these attacks, meaning even if an agent initially passes a security check, it can quickly be manipulated to bypass those safeguards.

The implications of this aren’t just for large corporations. As these agents become increasingly integrated into smaller businesses and even consumer devices, the potential for damage grows exponentially. Think about smart home systems, industrial control networks, or even automated supply chain management – a compromised agent could disrupt critical operations, steal valuable data, or even cause physical harm. The vulnerability isn’t just about financial loss; it’s about safety and operational stability.

The Bigger Picture

Cisco, along with other tech giants, is scrambling to develop better solutions. This includes pushing for stricter agent authorization protocols, implementing more granular access controls, and investing in technologies that can detect and respond to rogue agent behavior in real-time. However, the pace of innovation is struggling to keep up with the speed of the attacks.

Ultimately, this means that regular people – the very people who are increasingly relying on AI-powered tools – are facing a heightened security risk. You might be unknowingly granting access to your smart thermostat, your security system, or even your company’s network

Stay updated: Follow AIZyla for daily AI news explained clearly for everyone.

Stay ahead of AI — free

Weekly digest of the best AI news, tools, and guides. No spam.