{"id":8079,"date":"2025-03-24T10:32:26","date_gmt":"2025-03-24T10:32:26","guid":{"rendered":"https:\/\/www.digitide.com\/?p=8079"},"modified":"2026-01-12T11:49:28","modified_gmt":"2026-01-12T06:19:28","slug":"agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/","title":{"rendered":"Agentic AI \u2013 A Boon or Threat for Enterprise Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8079\" class=\"elementor elementor-8079\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d739e3f e-flex e-con-boxed e-con e-parent\" data-id=\"d739e3f\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-443dba4 e-con-full e-flex e-con e-child\" data-id=\"443dba4\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-000697e e-con-full e-flex e-con e-child\" data-id=\"000697e\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-df01d76 elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"df01d76\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img fetchpriority=\"high\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/sanjeev.webp\" class=\"attachment-full size-full wp-image-9550\" alt=\"Sajeev Nair CTO ( Tech &amp; Digital) @ Digitide Solutions Ltd | \u201cAI-First Digital Native Value Creator\u201d\" srcset=\"https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/sanjeev.webp 400w, https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/sanjeev-300x300.webp 300w, https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/sanjeev-150x150.webp 150w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Sajeev Nair<\/h3><p class=\"elementor-image-box-description\">CTO ( Tech &amp; Digital) @ Digitide Solutions Ltd | \u201cAI-First Digital Native Value Creator\u201d<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-43afd8c elementor-widget elementor-widget-text-editor\" data-id=\"43afd8c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An interesting session with \u00a0the Chief Information Security Officer (CISO) of one of our global customers on application of new age technologies to strengthen their Cybersecurity implementations has suddenly took a turn when he has passed a query to me \u201c is Agentic AI pose a threat for my Cybersecurity initiatives? \u201d. Noting down my POV on this \u00a0interesting \u00a0,curious and at the same very relevant scenario for global enterprises.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-894bfc5 elementor-widget elementor-widget-text-editor\" data-id=\"894bfc5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Agentic AI, the latest entrant into global \u00a0AI landscape can seamlessly interact with enterprise systems for inputs which can enable \u00a0real time event correlation and subsequent decision making on the best possible course of resolution . With its \u00a0\u00a0autonomy and outcome-oriented\u00a0 approach, Agentic AI has tremendous potential to disrupt positively the enterprise \u00a0Cybersecurity landscape. Its ability to learn, adapt, and act independently makes it a powerful tool for detecting and responding to threats depending on how its implementation and Governance is done.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d761455 elementor-widget elementor-widget-text-editor\" data-id=\"d761455\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>While it has the potential to significantly enhance threat detection and response capabilities due to its autonomous decision-making, it also carries risks like potential false positives, misinterpretations, and vulnerabilities if not properly designed and monitored, requiring a careful balance between automation and human oversight.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-153c74b elementor-widget elementor-widget-text-editor\" data-id=\"153c74b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Agentic AI is designed to act as an autonomous agent capable of assessing its environment, making decisions, and acting upon so as to \u00a0achieve specific goals. In Cybersecurity, AI Agents \u00a0can analyze large datasets, identify patterns, and generate actionable insights. Traditional automation techniques are based on predefined rules that govern the behavior of a system, while AI agents run on training data and instructions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f52622 elementor-widget elementor-widget-text-editor\" data-id=\"4f52622\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Some of the highlights of Agentic AI based Cybersecurity implementations are :<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e988a1 elementor-widget elementor-widget-heading\" data-id=\"0e988a1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Rapid threat detection aiding UTM<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22760dd elementor-widget elementor-widget-text-editor\" data-id=\"22760dd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Unified threat management (UTM) is a network security system that combines multiple security features into one device or service. It helps protect networks from a variety of threats, including malware, viruses, and network attacks. Agentic AI \u00a0analyze vast amounts of data in real-time, identifying suspicious patterns and potential threats much faster than human analysts, allowing for quicker response times.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eded277 elementor-widget elementor-widget-heading\" data-id=\"eded277\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Automated Remedial Actions<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0a6c060 elementor-widget elementor-widget-text-editor\" data-id=\"0a6c060\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Agentic AI can automatically take mitigation actions like isolating compromised systems or blocking malicious traffic, reducing the time needed for human intervention. AI agents can monitor networks and systems around the clock, providing continuous protection without the need for human oversight.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1004397 elementor-widget elementor-widget-heading\" data-id=\"1004397\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Adaptive Threat Analysis:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e215427 elementor-widget elementor-widget-text-editor\" data-id=\"e215427\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Agentic AI can learn and adapt to evolving threat landscapes, constantly refining its detection algorithms to identify new attack vectors. It can also n analyze historical data and trends to predict potential vulnerabilities or attack vectors thereby bolstering defenses before an attack occurs.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75d3743 elementor-widget elementor-widget-heading\" data-id=\"75d3743\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Threat Intelligence<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-67a9bf2 elementor-widget elementor-widget-text-editor\" data-id=\"67a9bf2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Agentic AI can aggregate and analyze data from various sources to anticipate new threats and provide intelligence on emerging risks. They can \u00a0use machine learning models to understand the normal behaviour of users and devices, and flag deviations as potential threats like insider threats, compromised user accounts etc<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-985b138 elementor-widget elementor-widget-heading\" data-id=\"985b138\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Incident Investigation and Forensics<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ce17cc elementor-widget elementor-widget-text-editor\" data-id=\"0ce17cc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Agentic AI\u00a0using advanced techniques like deep learning, can reduce \u00a0false alarms by more accurately distinguishing between normal activities and actual threats. It can quickly sift through large volumes of data during an investigation, identifying key evidence and helping security teams understand the scope and impact of an attack.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-615c2b2 elementor-widget elementor-widget-heading\" data-id=\"615c2b2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Adaptive D\u00e9fense Mechanisms<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4fa7fd8 elementor-widget elementor-widget-text-editor\" data-id=\"4fa7fd8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Agentic AI can adapt to new attack strategies and tactics by learning from emerging threat data, ensuring that defenses are always evolving in response to new risks. In cases of a detected attack, AI can automatically take defensive actions reducing human efforts.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de02020 elementor-widget elementor-widget-text-editor\" data-id=\"de02020\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>While Agentic AI provide powerful tools for improving Cybersecurity, organizations must be aware of the associated risks. These include vulnerabilities to adversarial attacks, issues of bias, lack of transparency, the potential for over-reliance, privacy concerns, and the challenge of adapting AI to new and novel threats. Few of the real-life scenarios where Agentic AI can cause potential threats for enterprise Cybersecurity implementations are<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-517e640 elementor-widget elementor-widget-heading\" data-id=\"517e640\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">False Alerts<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0bd2b9c elementor-widget elementor-widget-text-editor\" data-id=\"0bd2b9c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Due to the complexity of data analysis, Agentic AI might generate false alerts or miss real threats, leading to unnecessary disruptions or missed opportunities to address critical issues<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03acc35 elementor-widget elementor-widget-heading\" data-id=\"03acc35\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Malicious attacks<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bcbf90 elementor-widget elementor-widget-text-editor\" data-id=\"2bcbf90\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Malicious actors could potentially exploit Agentic AI for sophisticated attacks by manipulating its decision-making process. In certain cases, attackers might inject malicious data into the training process, altering the AI model\u2019s behavior, making it more susceptible to exploitation<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4330d1a elementor-widget elementor-widget-heading\" data-id=\"4330d1a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Lack of transparency<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eac6ce4 elementor-widget elementor-widget-text-editor\" data-id=\"eac6ce4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The decision-making process of complex Agentic AI systems can be difficult to understand, making it challenging to debug errors or explain why certain actions were taken.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd5f039 elementor-widget elementor-widget-text-editor\" data-id=\"dd5f039\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Balancing the use of AI with human oversight, continuous monitoring, and regular updates to the system is essential for managing these risks effectively.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5718881 elementor-widget elementor-widget-heading\" data-id=\"5718881\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data Privacy Concerns<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e0efea7 elementor-widget elementor-widget-text-editor\" data-id=\"e0efea7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p id=\"ember77\" class=\"ember-view reader-text-block__paragraph\">Agentic AI in cybersecurity often require access to sensitive data to identify threats. Improper handling of this data or a data breach involving an AI-driven security system could lead to significant privacy violations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0127abc elementor-widget elementor-widget-heading\" data-id=\"0127abc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Design considerations for Agentic AI in Cybersecurity <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1d94eb elementor-widget elementor-widget-text-editor\" data-id=\"c1d94eb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p id=\"ember77\" class=\"ember-view reader-text-block__paragraph\">Agentic AI has the potential to be a significant asset for enterprise Cybersecurity, but it is crucial to implement it responsibly with adequate safeguards and human oversight to mitigate potential risks and maximize its benefits .Below are some critical design considerations while employing Agentic AI in \u00a0enterprise class cyber implementations<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ac897b0 elementor-widget elementor-widget-heading\" data-id=\"ac897b0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Human-in-the-loop (HITL) approach<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f0fb32 elementor-widget elementor-widget-text-editor\" data-id=\"1f0fb32\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p id=\"ember77\" class=\"ember-view reader-text-block__paragraph\">Always ensure that human operators can review and validate critical security decisions made by Agentic AI systems. AI agents should be designed to work alongside human security experts, not replace them. The system should alert, support, and provide recommendations to human analysts, allowing them to make final decisions, especially in complex or ambiguous situations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-793f4f3 elementor-widget elementor-widget-heading\" data-id=\"793f4f3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">User Feedback loop<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f1e338 elementor-widget elementor-widget-text-editor\" data-id=\"4f1e338\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p id=\"ember77\" class=\"ember-view reader-text-block__paragraph\">Design the system to learn from human feedback on the decisions it makes. This creates a continuous feedback loop where both AI and human expertise contribute to improving the system&#8217;s accuracy and effectiveness.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ad189b elementor-widget elementor-widget-heading\" data-id=\"2ad189b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data Privacy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-077fae4 elementor-widget elementor-widget-text-editor\" data-id=\"077fae4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p id=\"ember77\" class=\"ember-view reader-text-block__paragraph\">For handling sensitive data, such as personally identifiable information (PII) or proprietary business data, need to ensure that the system follows data privacy regulations \u00a0and employs encryption, anonymization, or other privacy-preserving techniques when processing data.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ff032a elementor-widget elementor-widget-heading\" data-id=\"9ff032a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Scalability and Performance<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-09d5a97 elementor-widget elementor-widget-text-editor\" data-id=\"09d5a97\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p id=\"ember77\" class=\"ember-view reader-text-block__paragraph\">Agentic AI must be scalable to handle large volumes of data, especially for organizations with massive networks and systems. This involves choosing suitable AI models and architectures that can scale with the increasing complexity and volume of cybersecurity data. Also, it should be capable of processing data and responding to threats in near real time<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f795d8e elementor-widget elementor-widget-heading\" data-id=\"f795d8e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Regular monitoring and evaluation<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f5698c elementor-widget elementor-widget-text-editor\" data-id=\"8f5698c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p id=\"ember77\" class=\"ember-view reader-text-block__paragraph\">Continuously monitor the performance of Agentic AI systems and make adjustments as needed to maintain effectiveness.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f426f6d elementor-widget elementor-widget-text-editor\" data-id=\"f426f6d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p id=\"ember77\" class=\"ember-view reader-text-block__paragraph\">Designing Agentic AI for Cybersecurity requires a multifaceted approach to ensure that they are effective, secure, and adaptable in the face of evolving cyber threats. These considerations highlight the importance of data quality, system performance, transparency, adaptability, and integration with human and organizational processes. By addressing these factors, organizations can build AI-driven Cybersecurity systems that are not only powerful but also resilient and trustworthy.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5587375 elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"5587375\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img fetchpriority=\"high\" decoding=\"async\" width=\"400\" height=\"400\" src=\"https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/sanjeev.webp\" class=\"attachment-full size-full wp-image-9550\" alt=\"Sajeev Nair CTO ( Tech &amp; Digital) @ Digitide Solutions Ltd | \u201cAI-First Digital Native Value Creator\u201d\" srcset=\"https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/sanjeev.webp 400w, https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/sanjeev-300x300.webp 300w, https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/sanjeev-150x150.webp 150w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Sajeev Nair<\/h3><p class=\"elementor-image-box-description\">CTO ( Tech &amp; Digital) @ Digitide Solutions Ltd | \u201cAI-First Digital Native Value Creator\u201d<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Sajeev Nair CTO ( Tech &amp; Digital) @ Digitide Solutions Ltd | \u201cAI-First Digital Native Value Creator\u201d An interesting session with \u00a0the Chief Information Security Officer (CISO) of one of our global customers on application of new age technologies to strengthen their Cybersecurity implementations has suddenly took a turn when he has passed a query [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":14643,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[1],"tags":[],"class_list":["post-8079","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digitide - A Boon or Threat for Enterprise Cybersecurity - Agentic AI<\/title>\n<meta name=\"description\" content=\"Digitide explores whether Agentic AI strengthens enterprise cybersecurity or introduces new threats, offering expert insights into AI&#039;s dual impact.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digitide - A Boon or Threat for Enterprise Cybersecurity - Agentic AI\" \/>\n<meta property=\"og:description\" content=\"Digitide explores whether Agentic AI strengthens enterprise cybersecurity or introduces new threats, offering expert insights into AI&#039;s dual impact.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Digitide | AI First Digital Native Value Creator\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/Digitide\/61569106965465\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-24T10:32:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-12T06:19:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/Agentic-AI.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"668\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"digi_admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Digitide_sol\" \/>\n<meta name=\"twitter:site\" content=\"@Digitide_sol\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"digi_admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/\"},\"author\":{\"name\":\"digi_admin\",\"@id\":\"https:\/\/www.digitide.com\/#\/schema\/person\/f10822de4e45d76b1cedc38152cfee05\"},\"headline\":\"Agentic AI \u2013 A Boon or Threat for Enterprise Cybersecurity\",\"datePublished\":\"2025-03-24T10:32:26+00:00\",\"dateModified\":\"2026-01-12T06:19:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/\"},\"wordCount\":1160,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.digitide.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/Agentic-AI.webp\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/\",\"url\":\"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/\",\"name\":\"Digitide - A Boon or Threat for Enterprise Cybersecurity - Agentic AI\",\"isPartOf\":{\"@id\":\"https:\/\/www.digitide.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/Agentic-AI.webp\",\"datePublished\":\"2025-03-24T10:32:26+00:00\",\"dateModified\":\"2026-01-12T06:19:28+00:00\",\"description\":\"Digitide explores whether Agentic AI strengthens enterprise cybersecurity or introduces new threats, offering expert insights into AI's dual impact.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/Agentic-AI.webp\",\"contentUrl\":\"https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/Agentic-AI.webp\",\"width\":1000,\"height\":668,\"caption\":\"Agentic AI \u2013 A Boon or Threat for Enterprise Cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.digitide.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Agentic AI \u2013 A Boon or Threat for Enterprise Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.digitide.com\/#website\",\"url\":\"https:\/\/www.digitide.com\/\",\"name\":\"Digitide Solutions Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.digitide.com\/#organization\"},\"alternateName\":\"Digitide Solutions Limited\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.digitide.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.digitide.com\/#organization\",\"name\":\"Digitide Solutions Limited\",\"alternateName\":\"Digitide Solutions Limited\",\"url\":\"https:\/\/www.digitide.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.digitide.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/02\/footer-logo.svg\",\"contentUrl\":\"https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/02\/footer-logo.svg\",\"width\":206,\"height\":54,\"caption\":\"Digitide Solutions Limited\"},\"image\":{\"@id\":\"https:\/\/www.digitide.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/people\/Digitide\/61569106965465\/\",\"https:\/\/x.com\/Digitide_sol\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.digitide.com\/#\/schema\/person\/f10822de4e45d76b1cedc38152cfee05\",\"name\":\"digi_admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.digitide.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/62af75c66f5ac2e1dadfcad6eea3bfff7ff89ab93bd6df4700de9bf5f5be1765?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/62af75c66f5ac2e1dadfcad6eea3bfff7ff89ab93bd6df4700de9bf5f5be1765?s=96&d=mm&r=g\",\"caption\":\"digi_admin\"},\"sameAs\":[\"https:\/\/bunjydigital.co\/digitide\"],\"url\":\"https:\/\/www.digitide.com\/author\/digi_admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digitide - A Boon or Threat for Enterprise Cybersecurity - Agentic AI","description":"Digitide explores whether Agentic AI strengthens enterprise cybersecurity or introduces new threats, offering expert insights into AI's dual impact.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Digitide - A Boon or Threat for Enterprise Cybersecurity - Agentic AI","og_description":"Digitide explores whether Agentic AI strengthens enterprise cybersecurity or introduces new threats, offering expert insights into AI's dual impact.","og_url":"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/","og_site_name":"Digitide | AI First Digital Native Value Creator","article_publisher":"https:\/\/www.facebook.com\/people\/Digitide\/61569106965465\/","article_published_time":"2025-03-24T10:32:26+00:00","article_modified_time":"2026-01-12T06:19:28+00:00","og_image":[{"width":1000,"height":668,"url":"https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/Agentic-AI.webp","type":"image\/webp"}],"author":"digi_admin","twitter_card":"summary_large_image","twitter_creator":"@Digitide_sol","twitter_site":"@Digitide_sol","twitter_misc":{"Written by":"digi_admin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/"},"author":{"name":"digi_admin","@id":"https:\/\/www.digitide.com\/#\/schema\/person\/f10822de4e45d76b1cedc38152cfee05"},"headline":"Agentic AI \u2013 A Boon or Threat for Enterprise Cybersecurity","datePublished":"2025-03-24T10:32:26+00:00","dateModified":"2026-01-12T06:19:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/"},"wordCount":1160,"commentCount":0,"publisher":{"@id":"https:\/\/www.digitide.com\/#organization"},"image":{"@id":"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/Agentic-AI.webp","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/","url":"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/","name":"Digitide - A Boon or Threat for Enterprise Cybersecurity - Agentic AI","isPartOf":{"@id":"https:\/\/www.digitide.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/Agentic-AI.webp","datePublished":"2025-03-24T10:32:26+00:00","dateModified":"2026-01-12T06:19:28+00:00","description":"Digitide explores whether Agentic AI strengthens enterprise cybersecurity or introduces new threats, offering expert insights into AI's dual impact.","breadcrumb":{"@id":"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/#primaryimage","url":"https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/Agentic-AI.webp","contentUrl":"https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/Agentic-AI.webp","width":1000,"height":668,"caption":"Agentic AI \u2013 A Boon or Threat for Enterprise Cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitide.com\/resources\/blogs-and-whitepapers\/agentic-ai-a-boon-or-threat-for-enterprise-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.digitide.com\/"},{"@type":"ListItem","position":2,"name":"Agentic AI \u2013 A Boon or Threat for Enterprise Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.digitide.com\/#website","url":"https:\/\/www.digitide.com\/","name":"Digitide Solutions Limited","description":"","publisher":{"@id":"https:\/\/www.digitide.com\/#organization"},"alternateName":"Digitide Solutions Limited","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitide.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitide.com\/#organization","name":"Digitide Solutions Limited","alternateName":"Digitide Solutions Limited","url":"https:\/\/www.digitide.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitide.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/02\/footer-logo.svg","contentUrl":"https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/02\/footer-logo.svg","width":206,"height":54,"caption":"Digitide Solutions Limited"},"image":{"@id":"https:\/\/www.digitide.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/Digitide\/61569106965465\/","https:\/\/x.com\/Digitide_sol"]},{"@type":"Person","@id":"https:\/\/www.digitide.com\/#\/schema\/person\/f10822de4e45d76b1cedc38152cfee05","name":"digi_admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitide.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/62af75c66f5ac2e1dadfcad6eea3bfff7ff89ab93bd6df4700de9bf5f5be1765?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/62af75c66f5ac2e1dadfcad6eea3bfff7ff89ab93bd6df4700de9bf5f5be1765?s=96&d=mm&r=g","caption":"digi_admin"},"sameAs":["https:\/\/bunjydigital.co\/digitide"],"url":"https:\/\/www.digitide.com\/author\/digi_admin\/"}]}},"rttpg_featured_image_url":{"full":["https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/Agentic-AI.webp",1000,668,false],"landscape":["https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/Agentic-AI.webp",1000,668,false],"portraits":["https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/Agentic-AI.webp",1000,668,false],"thumbnail":["https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/Agentic-AI-150x150.webp",150,150,true],"medium":["https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/Agentic-AI-300x200.webp",300,200,true],"large":["https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/Agentic-AI.webp",800,534,false],"1536x1536":["https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/Agentic-AI.webp",1000,668,false],"2048x2048":["https:\/\/www.digitide.com\/wp-content\/uploads\/2025\/03\/Agentic-AI.webp",1000,668,false]},"rttpg_author":{"display_name":"digi_admin","author_link":"https:\/\/www.digitide.com\/author\/digi_admin\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/www.digitide.com\/category\/blog\/\" rel=\"category tag\">Blog<\/a>","rttpg_excerpt":"Sajeev Nair CTO ( Tech &amp; Digital) @ Digitide Solutions Ltd | \u201cAI-First Digital Native Value Creator\u201d An interesting session with \u00a0the Chief Information Security Officer (CISO) of one of our global customers on application of new age technologies to strengthen their Cybersecurity implementations has suddenly took a turn when he has passed a query&hellip;","_links":{"self":[{"href":"https:\/\/www.digitide.com\/wp-json\/wp\/v2\/posts\/8079","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitide.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitide.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitide.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitide.com\/wp-json\/wp\/v2\/comments?post=8079"}],"version-history":[{"count":1,"href":"https:\/\/www.digitide.com\/wp-json\/wp\/v2\/posts\/8079\/revisions"}],"predecessor-version":[{"id":25169,"href":"https:\/\/www.digitide.com\/wp-json\/wp\/v2\/posts\/8079\/revisions\/25169"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitide.com\/wp-json\/wp\/v2\/media\/14643"}],"wp:attachment":[{"href":"https:\/\/www.digitide.com\/wp-json\/wp\/v2\/media?parent=8079"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitide.com\/wp-json\/wp\/v2\/categories?post=8079"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitide.com\/wp-json\/wp\/v2\/tags?post=8079"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}