AI agents: Your next insider threat?

Robert Joyce • August 11, 2025

This is a subtitle for your new post

Autonomous AI agents are no longer theoretical. 79% of senior executives say AI agents are already being adopted in their companies. They are already shaping the cybersecurity landscape in profound ways, and I had the opportunity to contribute to PwC’s latest publication on this subject: "The Rise of Autonomous AI in Cybersecurity." In the report, we examine the emergence of AI agents that act independently, making decisions and taking action in complex environments without direct human oversight. My contribution focused on a particularly urgent dimension:  AI as an insider threat. These agents are often granted extensive permissions and access to sensitive infrastructure, yet they operate without the human intuition that typically governs trust and judgment. If misaligned, misconfigured, or compromised, they could become the ultimate insider threat. Unlike human insiders, they do not tire, they do not hesitate, and they do not break protocol because they were never designed to question it. They can operate across systems with perfect recall, adapt in real time, and escalate damage with machine speed. Their ability to persist silently inside networks makes them a uniquely challenging risk class. Organizations that have matured their programs to handle traditional insider risk must now expand their thinking to include autonomous systems that could, by design or by breach, turn inward. The report provides guidance for boards, CISOs, and technology leaders on implementing AI agents with appropriate constraints, monitoring, and contingency controls. As these technologies scale, managing their potential as both protector and threat becomes central to cyber resilience.


Read the document here:

https://explore.pwc.com/autonomous-ai-in-cyber/ai-ai-agents


By Robert Joyce August 25, 2025
Adding detail to the concepts of the Cyber Safety Review Board
By Robert Joyce August 23, 2025
Plan for security in your sprint to deploy.
By Robert Joyce August 16, 2025
This is a subtitle for your new post
By Robert Joyce June 6, 2025
China is embedding vulnerabilities into the very technologies Americans depend on.
By Rob Joyce March 14, 2025
The AI Productivity Revolution: How I Built a Custom App in 30 Minutes
By Rob Joyce March 7, 2025
China’s Cyber Threats to Critical Infrastructure & TP-Link Router Risk
By Robert Joyce June 20, 2024
My OpEd for the Hill
By Robert Joyce April 14, 2024
It takes a hacker to defeat a hacker.
By Robert Joyce April 6, 2024
Report on the Microsoft Online Exchange Incident from Summer 2023.
By Robert Joyce September 6, 2023
Criminal threats to industry are significant and continue to grow