{"id":3408,"date":"2025-06-20T06:00:00","date_gmt":"2025-06-20T13:00:00","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/perspectives\/?p=3408"},"modified":"2025-06-20T11:31:08","modified_gmt":"2025-06-20T18:31:08","slug":"securing-ai-agents-building-the-landing-gear-while-flying-the-plane","status":"publish","type":"post","link":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/","title":{"rendered":"Securing AI Agents: Building the Landing Gear While Flying the Plane"},"content":{"rendered":"\n<p>When I began working on autonomous cyber agents in 2020, the timeline for real-world deployment was still measured in decades. At the time, these systems were seen as long-range bets \u2014 interesting but still mostly niche improvements for any near-term application.<\/p>\n\n\n\n<p>Then, something changed.&nbsp;<\/p>\n\n\n\n<p>While generative AI (GenAI) wasn\u2019t one, singular event, it unleashed an ongoing cascade of advances that are, to this day, causing development timelines to collapse at a continuously accelerating rate. This isn\u2019t just a case of moving the goal; the GenAI-driven wave is relentlessly bulldozing old benchmarks and redefining the frontier of what\u2019s possible, faster than we\u2019ve ever experienced before. Capabilities once reserved for long-term research are now being integrated into live environments with astonishing speed.&nbsp;<\/p>\n\n\n\n<p>Startlingly, but not surprisingly, agentic systems are being embedded in countless locations \u2014 company workflows, decision-making pipelines and even critical infrastructure \u2014 often before we\u2019ve established how to govern or secure them. The year 2020 seems a lifetime ago considering we\u2019re no longer preparing for the arrival of agentic AI but responding to its continued and rapid evolution.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Paper for a Moving Target<\/h2>\n\n\n\n<p>The workshop report I\u2019ve co-authored, <em><a href=\"https:\/\/www.schmidtsciences.org\/wp-content\/uploads\/2025\/06\/Achieving_a_Secure_AI_Agent_Ecosystem-3.pdf\">Achieving a Secure AI Agent Ecosystem<\/a><\/em>, is the product of a cross-institutional effort to make sense of this acceleration. Developed in partnership with <a href=\"https:\/\/www.rand.org\/\">RAND<\/a>, <a href=\"https:\/\/www.schmidtsciences.org\/\">Schmidt Sciences<\/a>, and leading minds in agentic AI from across industry, academia, and government, the paper doesn\u2019t offer silver bullets but rather a different way to think about and approach agentic AI.\u00a0<\/p>\n\n\n\n<p>The crux of the paper outlines three foundational security pillars for AI agents and suggests where our current assumptions \u2014 and infrastructure \u2014 might falter as these systems evolve. Beyond simply acknowledging current realities, this argues for a profound mindset shift: We must recognize that the age of agentic systems is already upon us. Consequently, securing these systems is not a problem for tomorrow. It\u2019s an urgent challenge today that\u2019s intensified by the relentless pace of innovation, expanding scale, uneven risks for early adopters and the stark asymmetry between attack capabilities and defense goals.<\/p>\n\n\n\n<p>One of the challenges in securing AI agents is that these systems don\u2019t look or behave like traditional software. They are dynamic, evolving and increasingly capable of executing decisions with minimal oversight. Some are purpose-built to automate tasks like scheduling or sorting email; others are inching toward fully autonomous action in high-stakes environments. In either case, the frameworks we use to secure traditional applications aren\u2019t enough. We are encountering problems that aren\u2019t merely variations on known vulnerabilities but are fundamentally new. The attack surface has shifted.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Three Pillars for AI Agent Security<\/h2>\n\n\n\n<p>This mindset shift is why the security landscape has been organized around three core concerns:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Protecting AI agents from third-party compromise:<\/strong> How to safeguard the AI agents themselves from being taken over or manipulated by external attackers.<\/li>\n\n\n\n<li><strong>Protecting users and organizations from the agents themselves:<\/strong> How to ensure that the AI agents, even when operating as intended or if they malfunction, do not harm their users or the organizations they serve.<\/li>\n\n\n\n<li><strong>Protecting critical systems from malicious agents:<\/strong> How to defend essential infrastructure and systems against AI agents that are intentionally designed and deployed to cause harm.<\/li>\n<\/ul>\n\n\n\n<p>These categories are not static \u2014 they are points along a spectrum of capability and threat maturity. Today, most organizations that deploy agents are dealing with the first two concerns. But the third \u2014 malicious, autonomous adversaries \u2014 looms large. Nation-states were among the first to invest in autonomous cyber agents.<sup>1<\/sup> They may not be alone for long.&nbsp;<\/p>\n\n\n\n<p>Navigating this new era of potent, widespread autonomous threats, therefore, demands far more than incremental refinements to existing defenses. It requires a foundational shift in how our expert communities must collaborate and innovate on security.<\/p>\n\n\n\n<p>Historically, AI researchers and cybersecurity professionals often operated on parallel tracks, holding different assumptions about risk and architecture. Yet, the complex frontier of agentic AI security demands their unified effort, as neither community can tackle these immense challenges in isolation \u2014 making deep, sustained collaboration paramount. And while universal protocols and comprehensive best practices for this entire field are still maturing, the notion that effective turnkey products for securing agents are scarce is, frankly, becoming outdated. <a href=\"https:\/\/www.paloaltonetworks.com\/prisma\/prisma-ai-runtime-security\">Sophisticated, deployable solutions<\/a> are now offering vital, specialized protection for critical agentic systems, signaling tangible progress. This further underscores the urgent need for adaptive, multilayered security strategies \u2014 spanning model provenance, robust containment and resilient human-in-the-loop controls \u2014 all evolving as rapidly as the agents themselves.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Interventions Within Reach<\/h2>\n\n\n\n<p>While robust and evolving product solutions are increasingly crucial in mitigating the immediate operational risks posed by agentic AI, achieving comprehensive, long-term security also necessitates dedicated industry-wide investment in foundational capabilities and shared understanding. Several such key directions, complementing product innovation, are well within our collective reach and warrant-focused effort.&nbsp;<\/p>\n\n\n\n<p>For instance, a kind of \u201cagent bill of materials,\u201d modeled after the \u201csoftware bill of materials,\u201d is envisioned to provide visibility into an agent\u2019s components like its model, training data, tools and memory. However, its functional viability currently faces hurdles, such as the lack of a common system for model identifiers, which is crucial for such transparency.&nbsp;<\/p>\n\n\n\n<p>Additionally, standardized, predeployment test beds could allow for scalable, scenario-based evaluations before agents are released into production environments. And communication protocols like MCP (Model Context Protocol) and A2A (Agent-to-Agent) are emerging, but few have <a href=\"https:\/\/unit42.paloaltonetworks.com\/agentic-ai-threats\/\">security baked in from the start<\/a>. However, even when security measures are integrated from the outset, the prevalence of \u201cunknown unknowns\u201d in these novel agentic systems means these protocols will require rigorous and continuous assessment to maintain their integrity and safety.&nbsp;<\/p>\n\n\n\n<p>One approach our paper attempts to navigate is the critical challenge that an agent\u2019s memory, while essential for it to learn, improve, and crucially avoid repeating past mistakes, is also a significant vulnerability that can be targeted for malicious tampering. The strategy involves using \u201cclone-on-launch\u201d or task-specific agent instances. In this model, agents designed for particular operational duties or limited-duration interactions treat their <em>active working memory<\/em> as ephemeral. Once their specific task or session is complete, these instances can be retired, with new operations handled by fresh instances that are initialized from a secure, trusted baseline.&nbsp;<\/p>\n\n\n\n<p>This practice aims to significantly reduce the risk of <em>persistent<\/em> memory corruption or the lingering effects of tampering that might occur within a single session. It is paramount, however, that such a system is meticulously architected to ensure an agent\u2019s core foundational knowledge and long-term learned lessons are securely maintained, protected against tampering, and effectively and safely accessible to inform these more transient operational instances. While managing operational states in this manner is not a comprehensive solution to all memory-related threats, it represents the kind of creative, systems-level thinking required for advancing agent security and robust containment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Call for Shared Commitment<\/h2>\n\n\n\n<p>Ultimately, securing agentic AI will not come from any single breakthrough but from a sustained, multistakeholder effort. These include researchers, policymakers, practitioners and industry leaders working together across disciplines. The threats are both technological and foundational. We are trying to secure systems that we do not yet fully understand. But if there\u2019s one thing the last few years have made clear, it\u2019s this: Waiting to act until the picture is complete means acting too late.<\/p>\n\n\n\n<p>The evolution of agentic AI means our industry is developing critical safeguards concurrently with its widespread adoption. This simultaneous development isn\u2019t inherently a crisis, but a clear call for collective responsibility. Our success in this endeavor hinges on a shared industry commitment to building these foundational elements with transparency, rigorous standards and a unified vision for a trustworthy AI ecosystem.<\/p>\n\n\n\n<p>Read the full paper: <em><a href=\"https:\/\/www.schmidtsciences.org\/wp-content\/uploads\/2025\/06\/Achieving_a_Secure_AI_Agent_Ecosystem-3.pdf\">Achieving a Secure AI Agent Ecosystem<\/a><\/em>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-small-font-size\"><sup>1<\/sup><a href=\"https:\/\/cetas.turing.ac.uk\/publications\/autonomous-cyber-defence-autonomous-agents\"><em>Autonomous Cyber Defence Phase II<\/em><\/a>, Centre for Emerging Technology and Security, May 3, 2024.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Defining the new security blueprint for the age of agentic AI.<\/p>\n","protected":false},"author":1,"featured_media":3409,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16,20,15],"tags":[],"coauthors":[180],"class_list":["post-3408","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-business-transformation","category-staying-ahead-of-evolving-threats"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing AI Agents: Building the Landing Gear While Flying the Plane - Perspectives<\/title>\n<meta name=\"description\" content=\"Defining the new security blueprint for the age of agentic AI.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing AI Agents: Building the Landing Gear While Flying the Plane - Perspectives\" \/>\n<meta property=\"og:description\" content=\"Defining the new security blueprint for the age of agentic AI.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/\" \/>\n<meta property=\"og:site_name\" content=\"Perspectives\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-20T13:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-20T18:31:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/06\/securing-ai-agents-featured.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"840\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dr. Nicole Nichols\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\"},\"headline\":\"Securing AI Agents: Building the Landing Gear While Flying the Plane\",\"datePublished\":\"2025-06-20T13:00:00+00:00\",\"dateModified\":\"2025-06-20T18:31:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/\"},\"wordCount\":1307,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/06\/securing-ai-agents-featured.jpg\",\"articleSection\":[\"AI\",\"Business Transformation\",\"Staying Ahead of Evolving Threats\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/\",\"name\":\"Securing AI Agents: Building the Landing Gear While Flying the Plane - Perspectives\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/06\/securing-ai-agents-featured.jpg\",\"datePublished\":\"2025-06-20T13:00:00+00:00\",\"dateModified\":\"2025-06-20T18:31:08+00:00\",\"author\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\"},\"description\":\"Defining the new security blueprint for the age of agentic AI.\",\"breadcrumb\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/#primaryimage\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/06\/securing-ai-agents-featured.jpg\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/06\/securing-ai-agents-featured.jpg\",\"width\":1920,\"height\":840},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing AI Agents: Building the Landing Gear While Flying the Plane\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/\",\"name\":\"Perspectives\",\"description\":\"What\u2019s next for business and technology innovators.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/image\/99030a116fee62042a76fe088b31faa9\",\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/localhost\/wordpress\"],\"url\":\"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing AI Agents: Building the Landing Gear While Flying the Plane - Perspectives","description":"Defining the new security blueprint for the age of agentic AI.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/","og_locale":"en_US","og_type":"article","og_title":"Securing AI Agents: Building the Landing Gear While Flying the Plane - Perspectives","og_description":"Defining the new security blueprint for the age of agentic AI.","og_url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/","og_site_name":"Perspectives","article_published_time":"2025-06-20T13:00:00+00:00","article_modified_time":"2025-06-20T18:31:08+00:00","og_image":[{"width":1920,"height":840,"url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/06\/securing-ai-agents-featured.jpg","type":"image\/jpeg"}],"author":"Dr. Nicole Nichols","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/#article","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/"},"author":{"name":"admin","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977"},"headline":"Securing AI Agents: Building the Landing Gear While Flying the Plane","datePublished":"2025-06-20T13:00:00+00:00","dateModified":"2025-06-20T18:31:08+00:00","mainEntityOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/"},"wordCount":1307,"commentCount":0,"image":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/06\/securing-ai-agents-featured.jpg","articleSection":["AI","Business Transformation","Staying Ahead of Evolving Threats"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/","name":"Securing AI Agents: Building the Landing Gear While Flying the Plane - Perspectives","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website"},"primaryImageOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/#primaryimage"},"image":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/06\/securing-ai-agents-featured.jpg","datePublished":"2025-06-20T13:00:00+00:00","dateModified":"2025-06-20T18:31:08+00:00","author":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977"},"description":"Defining the new security blueprint for the age of agentic AI.","breadcrumb":{"@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/#primaryimage","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/06\/securing-ai-agents-featured.jpg","contentUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/06\/securing-ai-agents-featured.jpg","width":1920,"height":840},{"@type":"BreadcrumbList","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/securing-ai-agents-building-the-landing-gear-while-flying-the-plane\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/"},{"@type":"ListItem","position":2,"name":"Securing AI Agents: Building the Landing Gear While Flying the Plane"}]},{"@type":"WebSite","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#website","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/","name":"Perspectives","description":"What\u2019s next for business and technology innovators.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/#\/schema\/person\/image\/99030a116fee62042a76fe088b31faa9","url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","contentUrl":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","caption":"admin"},"sameAs":["http:\/\/localhost\/wordpress"],"url":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/3408","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/comments?post=3408"}],"version-history":[{"count":5,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/3408\/revisions"}],"predecessor-version":[{"id":3478,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/posts\/3408\/revisions\/3478"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/media\/3409"}],"wp:attachment":[{"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/media?parent=3408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/categories?post=3408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/tags?post=3408"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.in\/perspectives\/wp-json\/wp\/v2\/coauthors?post=3408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}