AI agents are creating powerful new opportunities for both businesses and everyday users — from smarter customer experiences to increased efficiency. At the same time, they introduce serious cybersecurity risks, as adversaries weaponize these agents to mimic real users, maintain fake identities, and evade detection. In this interview, Frank Teruel, COO of Arkose Labs, explains the dual nature of AI agents, the shift from verifying users to verifying agents, real-world attack campaigns, and why a “Know Your AI Agent” (KYA) framework could be critical for the future.
Related Articles
All CyberDefenseMagazine →Operationalizing Cyber Resilience: A Practitioner’s Framework for Real-World Security Constraints
Table of Contents Why Traditional Security Models Fail in Constrained Environments Core Principles of an Operational Cyber Resilience Model Translating Principles Into Practice: A Practitioner…
Organizations Are Shifting Ransomware Defense Tactics, But Malware Is Still the Problem
By Trevor Hilligoss, Senior Director of Security Research at SpyCloud Ransomware attacks are a fact of life – over 72% of global businesses have been impacted by…
Keeping Pace with an Evolving Security and Trust Landscape
Table of Contents A double-edged sword Preparing for a post-quantum world Trust takes a seat at the table By Dean Coclin, Senior Director, Digital Trust…
Balancing New Technologies and Ease of Use in Infrastructure Cybersecurity Programs
The importance of cybersecurity in critical infrastructure was first recognized in the power industry with the creation of North American Electric Reliability Corporation Critical Infrastructure…
Tools for Analyzing Signature-Based Hardware Solutions for Cyber Security Systems
Abstract: When creating signature-based cybersecurity systems for network intrusion detection (NIDS), spam filtering, protection against viruses, worms, etc., developers have to use hardware devices such…
Why It’s More Important Than Ever to Align to The MITRE ATT&CK Framework
By Michael Mumcuoglu, CEO & Co-Founder, CardinalOps As we approach the second half of a year punctuated by ransomware and supply chain attacks, a top…

