No Result
View All Result
SUBMIT YOUR ARTICLES
  • Login
Thursday, October 30, 2025
TheAdviserMagazine.com
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
No Result
View All Result
TheAdviserMagazine.com
No Result
View All Result
Home Market Research Market Analysis

Many Critical Problems for CISOs in Agentic AI Security

by TheAdviserMagazine
3 months ago
in Market Analysis
Reading Time: 5 mins read
A A
Many Critical Problems for CISOs in Agentic AI Security
Share on FacebookShare on TwitterShare on LInkedIn


A2A and MCP: What They Are

The emerging agentic AI market is experiencing its infrastructure inflection point. Enterprise builders are already getting exhausted by the prospect of hard-coding all of the tools and data an agent needs to use. This hard coding creates fragile systems that can be challenging to make secure and flexible.  Today we are seeing communication and interoperability standards emerge at two foundational layers: intra-agent with the Model Context Protocol (MCP) and inter-agent with Agent-to-Agent (A2A) protocols.

MCP controls how agents manage and share structured memory, task state, and environmental assumptions across sessions and models. A2A protocols specify the rules for inter-agent communication, including negotiation, delegation, and task synchronization. Though MCP and A2A can enable enterprise agent interoperability, they also create new vulnerabilities and challenges in security, performance, and governance.

What They Aren’t

Knowing what A2A and MCP are is just as important to clarify what these protocols aren’t. Some security pros have misinterpreted these each of these protocols to be:

A control plane
A policy engine

These protocols don’t orchestrate agents, they enable interoperation. Think of A2A like RPC or Kafka in a microservices architecture it’s a transport and serialization layer, not a scheduler or a source of truth.

Similarly, MCP isn’t a governance layer. It’s more like a distributed cache or a shared memory abstraction, akin to how systems like Apache Ignite or Memcached provide fast, ephemeral access to state, but don’t enforce business logic or access policy.

If you treat MCP like a control plane, you’ll end up with brittle coupling and security blind spots. One common joke that already exists is that the “S” in MCP stands for security. Hat tip to our colleague Carlos Casanova for the title based on his comment that MCP should stand for “Many Critical Problems.”

The real control plane for agents (when one exists) will likely emerge as a higher-order construct. It will be layered on top of these protocols, with its own lifecycle, observability, and trust models.

As Always, Security Forces Tradeoffs

Security is never free. Security taxes performance, flexibility, and (sometimes) reliability. The same is true for agentic architectures. Modifying the output of an LLM to meet a new security standard might result in significantly higher token use because of a prompt change. In A2A systems, introducing authentication and authorization mirrors adding TLS to microservices. You gain confidentiality and trust at the expense of latency and overhead related to certificate management.

MCP faces similar constraints. Imagine it as a distributed cache or shared state layer used by agents to store and retrieve context. If that context must be signed, versioned, and verified for integrity then suddenly, this resembles a blockchain-light architecture. You gain tamper resistance, but you pay in throughput and latency. Stale or poisoned context can propagate errors across the agent mesh unless strong validation and rollback mechanisms exist.

In scenarios where two agents operate within separate execution environments and collaborate on a task without a shared trust anchor or federated identity, they typically need to 1) negotiate credentials, 2) validate scopes, and 3) establish secure channels. This process is similar to service mesh architectures such as Istio, in which mutual TLS (mTLS) secures communication between pods but introduces additional complexity for routing, observability, and debugging.

MCP Security Flaws Identified

The Model Context Protocol (MCP) is rapidly becoming a standard and critical layer in agentic systems but it’s also emerging as a surface for exploitation. Several CVE’s discovered recently showcase this. In addition,  Trend Micro discovered 492 and Knostic.AI found over 1800 MCP servers exposed to the internet, reminding security leaders of unsecured S3 buckets in AWS in the not so distant past.

Because MCP governs how agents share and retrieve context, it becomes a prime target for context poisoning, impersonation, and unauthorized inference. If an agent can inject misleading or malicious context into the shared memory, it can manipulate downstream behavior similar to how poisoned DNS entries or corrupted configuration maps can destabilize distributed systems.

Worse, many current MCP implementations lack strong guarantees around context provenance. Without cryptographic signatures or verifiable lineage, agents have no way to determine whether a piece of context is authentic, recent, or relevant. This is the equivalent of a distributed system relying on unsigned messages in a gossip protocol. Fast, but far too trusting.

And because MCP often operates beneath the application layer, these flaws are hard to detect and even harder to remediate. There’s no 1) centralized audit trail, 2) no rollback mechanism, and 3) no standard for revocation. In effect, we’re building shared memory for autonomous systems without the isolation or integrity guarantees we take for granted in container orchestration or distributed databases.

Static Security Models Don’t Fit The Needs Of Ephemeral Autonomous Agents

Securing agentic systems will require a redesign of 1) trust 2) identity, and 3) control.  It requires dynamic trust that enables temporary, scoped identities, context-aware permissions, and cryptographically verifiable provenance. Some potential approaches include:

Agentic AI should use just-in-time credentials with clear constraints on use, duration, and scope that are easy to issue, revoke, and fully auditable.
Agentic AI should use root-cause analysis across agentic supply chains including distributed tracing on actions, decisions, and reasoning.

In Agentic Systems Failure Isn’t A Crash…It’s A Cascade

One agent misinterprets context, another acts on flawed assumptions, and a third amplifies the error. By the time a human notices, the trail is cold. That’s why we need a new kind of root cause analysis (RCA) that’s designed for autonomous, distributed decisions.

The system must include full traceability for every agent interaction. Not just the WHAT, but the WHY and HOW. Each decision could carry a cryptographic breadcrumb: a signed reference to the context it used, the agent that provided it, and the logic path it followed.

The Securing Agents And Agentic Gold Rush: Picks And Shovels

Every emerging technology has its infrastructure moment. For the cloud era it was containers, observability, and CI/CD pipelines. For this instance of the AI era, it’s GPUs, vector databases, and fine-tuning frameworks. For agentic systems, the next frontier isn’t just smarter agents, it’s the tooling that makes them secure, testable, and trustworthy.

This is the “picks-and-shovels” phase of the agent economy. The real opportunity lies in building the scaffolding: agent debuggers, context validators, permission brokers, simulation environments, and trust observability layers.

Performance and Capability: Why Testing Comes First

To understand agentic systems, we have to test and trust them (and their supply chains). And that testing must possess the same characteristics of agentic systems. So testing will need the following characteristics: 1) relentless 2) systematic and 3) scalability.

Examples of testing include:

Benchmarking context fidelity
Measuring decision latency
Stress-testing permission boundaries

Making Good Choices Now Sets Us Up For The Future

We’re standing at the edge of a new human hybrid computing paradigm. Agents will do more than execute code. They will make decisions, collaborate, and evolve. The protocols, tests, and security measures we design today will shape how these agents interact, how they’re trusted, and how they’re held accountable.

With that in mind, we need to make a trust a first-class primitive for AI Agents and Agentic AI.

Let’s Connect

Forrester clients who have questions implementing or securing AI agents and Agentic AI can request an inquiry or guidance session with either of us.

See Jeff and Rowan at Technology & Innovation Summit, taking place in Austin, TX from November 2-5 and at Security & Risk Summit, taking place from November 5-7.



Source link

Tags: agenticCISOsCriticalproblemsSecurity
ShareTweetShare
Previous Post

JPMorgan Clients Could Get Crypto-Backed Loans By 2026

Next Post

Israeli institutional investors bet on Teva

Related Posts

edit post
2026 Retail Predictions: A Flight To Profitability 

2026 Retail Predictions: A Flight To Profitability 

by TheAdviserMagazine
October 29, 2025
0

The retail landscape is entering a period of profound transformation, where profitability will no longer be optional but instead essential...

edit post
Why Advertising Coop Programs Still Matter for Manufacturers

Why Advertising Coop Programs Still Matter for Manufacturers

by TheAdviserMagazine
October 29, 2025
0

Computer Market Research (CMR): The Ultimate Channel Management Compendium PART 1 Table of Contents for Part 1 Introduction to Channel...

edit post
Meta Earnings Preview: All Eyes on AI Monetization, Capex Ahead of Key Report

Meta Earnings Preview: All Eyes on AI Monetization, Capex Ahead of Key Report

by TheAdviserMagazine
October 29, 2025
0

Meta’s stock has gained after every quarterly report this year, boosting investor confidence. Strong ad revenue growth and rising AI...

edit post
Why PartnerPortal Beats Excel for Co-Op/MDF Program Management

Why PartnerPortal Beats Excel for Co-Op/MDF Program Management

by TheAdviserMagazine
October 28, 2025
0

Computer Market Research (CMR): The Ultimate Channel Management Compendium PART 1 Table of Contents for Part 1 Introduction to Channel...

edit post
Risks, Shifts & Strategic Design

Risks, Shifts & Strategic Design

by TheAdviserMagazine
October 28, 2025
0

In times of calm, but especially in times of chaos, risk management strategies and their execution must be dictated by...

edit post
Voice Biomarker Market to Witness Significant Growth by 2035

Voice Biomarker Market to Witness Significant Growth by 2035

by TheAdviserMagazine
October 28, 2025
0

The voice/vocal biomarker market is emerging as a revolutionary segment in digital health, leveraging advanced algorithms to detect subtle vocal...

Next Post
edit post
Israeli institutional investors bet on Teva

Israeli institutional investors bet on Teva

edit post
How I Stopped Wasting Hours Hunting For Real Estate Leads

How I Stopped Wasting Hours Hunting For Real Estate Leads

  • Trending
  • Comments
  • Latest
edit post
77-year-old popular furniture retailer closes store locations

77-year-old popular furniture retailer closes store locations

October 18, 2025
edit post
Pennsylvania House of Representatives Rejects Update to Child Custody Laws

Pennsylvania House of Representatives Rejects Update to Child Custody Laws

October 7, 2025
edit post
What to Do When a Loved One Dies in North Carolina

What to Do When a Loved One Dies in North Carolina

October 8, 2025
edit post
Another Violent Outburst – Democrats Inciting Civil Unrest

Another Violent Outburst – Democrats Inciting Civil Unrest

October 24, 2025
edit post
Probate vs. Non-Probate Assets: What’s the Difference?

Probate vs. Non-Probate Assets: What’s the Difference?

October 17, 2025
edit post
California Attorney Pleads Guilty For Role In 2M Ponzi Scheme

California Attorney Pleads Guilty For Role In $912M Ponzi Scheme

October 15, 2025
edit post
The Difference Between a Tax Levy and a Tax Lien 

The Difference Between a Tax Levy and a Tax Lien 

0
edit post
Wed: Chip cos lead big TASE gains

Wed: Chip cos lead big TASE gains

0
edit post
Reducing This Type of Cholesterol May Lower Dementia Risk by 80%. Have You Even Heard of It?

Reducing This Type of Cholesterol May Lower Dementia Risk by 80%. Have You Even Heard of It?

0
edit post
Xi strikes conciliatory tone as he meets Trump in South Korea

Xi strikes conciliatory tone as he meets Trump in South Korea

0
edit post
Elite Ferrari clientele to bid on Le Mans race car with digital tokens

Elite Ferrari clientele to bid on Le Mans race car with digital tokens

0
edit post
10 Hidden Truths About Donated Clothing That Thrift Stores Keep Hush-Hush

10 Hidden Truths About Donated Clothing That Thrift Stores Keep Hush-Hush

0
edit post
Xi strikes conciliatory tone as he meets Trump in South Korea

Xi strikes conciliatory tone as he meets Trump in South Korea

October 29, 2025
edit post
Groww announces IPO dates as regulatory uncertainty looms over stock brokers

Groww announces IPO dates as regulatory uncertainty looms over stock brokers

October 29, 2025
edit post
Boot Barn outlines .2B sales target and 1,200-store expansion amid raised TAM to B (NYSE:BOOT)

Boot Barn outlines $2.2B sales target and 1,200-store expansion amid raised TAM to $58B (NYSE:BOOT)

October 29, 2025
edit post
Reducing This Type of Cholesterol May Lower Dementia Risk by 80%. Have You Even Heard of It?

Reducing This Type of Cholesterol May Lower Dementia Risk by 80%. Have You Even Heard of It?

October 29, 2025
edit post
The CEOs of Apple, Airbnb, and PepsiCo agree on one thing: life as a business leader is incredibly lonely

The CEOs of Apple, Airbnb, and PepsiCo agree on one thing: life as a business leader is incredibly lonely

October 29, 2025
edit post
How to keep your AI use from violating industry rules

How to keep your AI use from violating industry rules

October 29, 2025
The Adviser Magazine

The first and only national digital and print magazine that connects individuals, families, and businesses to Fee-Only financial advisers, accountants, attorneys and college guidance counselors.

CATEGORIES

  • 401k Plans
  • Business
  • College
  • Cryptocurrency
  • Economy
  • Estate Plans
  • Financial Planning
  • Investing
  • IRS & Taxes
  • Legal
  • Market Analysis
  • Markets
  • Medicare
  • Money
  • Personal Finance
  • Social Security
  • Startups
  • Stock Market
  • Trading

LATEST UPDATES

  • Xi strikes conciliatory tone as he meets Trump in South Korea
  • Groww announces IPO dates as regulatory uncertainty looms over stock brokers
  • Boot Barn outlines $2.2B sales target and 1,200-store expansion amid raised TAM to $58B (NYSE:BOOT)
  • Our Great Privacy Policy
  • Terms of Use, Legal Notices & Disclosures
  • Contact us
  • About Us

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.