Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • The ICE Expansion Won’t Happen in the Dark
    • Man jailed for 301 years to life over Sacramento gambling robbery
    • Today’s NYT Connections: Sports Edition Hints, Answers for Feb. 12 #507
    • Not All RecSys Problems Are Created Equal
    • Steer-by-wire tech, Range Rover looks
    • Cut the cupcakes: how to avoid corporate takeover of International Women’s Day
    • ‘Heated Rivalry’ Is Bringing New Fans to Hockey. Does the Sport Deserve Them?
    • Viral post sparks debate over Kroger gambling machines in Georgia
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Thursday, February 12
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»AI Technology News»From guardrails to governance: A CEO’s guide for securing agentic systems
    AI Technology News

    From guardrails to governance: A CEO’s guide for securing agentic systems

    Editor Times FeaturedBy Editor Times FeaturedFebruary 4, 2026No Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link


    3. Permissions by design: Bind instruments to duties, to not fashions

    A standard anti-pattern is to provide the mannequin a long-lived credential and hope prompts hold it well mannered. SAIF and NIST argue the other: credentials and scopes needs to be sure to instruments and duties, rotated usually, and auditable. Brokers then request narrowly scoped capabilities via these instruments.

    In apply, that appears like: “finance-ops-agent could learn, however not write, sure ledgers with out CFO approval.”

    The CEO query: Can we revoke a selected functionality from an agent with out re-architecting the entire system?

    Management information and conduct

    These steps gate inputs, outputs, and constrain conduct.

    4. Inputs, reminiscence, and RAG: Deal with exterior content material as hostile till confirmed in any other case

    Most agent incidents begin with sneaky information: a poisoned internet web page, PDF, e mail, or repository that smuggles adversarial directions into the system. OWASP’s prompt-injection cheat sheet and OpenAI’s personal steerage each insist on strict separation of system directions from person content material and on treating unvetted retrieval sources as untrusted.

    Operationally, gate earlier than something enters retrieval or long-term reminiscence: new sources are reviewed, tagged, and onboarded; persistent reminiscence is disabled when untrusted context is current; provenance is hooked up to every chunk.

    The CEO query: Can we enumerate each exterior content material supply our brokers study from, and who authorised them?

    5. Output dealing with and rendering: Nothing executes “simply because the mannequin mentioned so”

    Within the Anthropic case, AI-generated exploit code and credential dumps flowed straight into motion. Any output that may trigger a aspect impact wants a validator between the agent and the true world. OWASP’s insecure output dealing with class is express on this level, as are browser safety finest practices round origin boundaries.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    Is a secure AI assistant possible?

    February 11, 2026

    Real Fight Is Business Model

    February 11, 2026

    The Foundation of Trusted Enterprise AI

    February 11, 2026

    A “QuitGPT” campaign is urging people to cancel their ChatGPT subscription

    February 10, 2026

    Pain Points, Fixes, and Best Practices

    February 10, 2026

    Why the Moltbook frenzy was like Pokémon

    February 9, 2026
    Leave A Reply Cancel Reply

    Editors Picks

    The ICE Expansion Won’t Happen in the Dark

    February 12, 2026

    Man jailed for 301 years to life over Sacramento gambling robbery

    February 12, 2026

    Today’s NYT Connections: Sports Edition Hints, Answers for Feb. 12 #507

    February 12, 2026

    Not All RecSys Problems Are Created Equal

    February 12, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    From prophet to product: How AI came back down to earth in 2025

    January 4, 2026

    Apple Buys Its First Ever Video Game Studio

    May 28, 2025

    Uber and Lyft partner with China’s Baidu to trial UK robotaxis

    December 22, 2025
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.