Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Cohesity Expands Strategic Alliance with HPE to Deliver Industry-Leadi...
SwitchBot Launches Lock Vision Series, the World’s First Smart D...
Zero-day vulnerability allows BitLocker encryption bypass using USB dr...
AI-generated zero day raises agentic cyber abuse concerns
Foxconn breach highlights non-human identity crisis
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Are AI-powered cyber threats evolving faster than courts and police can adapt?

      Are AI-powered cyber threats evolving faster than courts and police can adapt?

      Monday, May 11, 2026, 8:30 AM Asia/Singapore | Features
    • Featured

      The problem with CAPTCHAs – and the password perception gap

      The problem with CAPTCHAs - and the password perception gap

      Thursday, May 7, 2026, 11:14 AM Asia/Singapore | Features
    • Featured

      How AI is supercharging insider threats

      How AI is supercharging insider threats

      Wednesday, April 15, 2026, 12:29 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Directory
  • E-Learning

Select Page

Tips

AI agent autonomy risks demand guardrails and human oversight

By Tomur Ho, Director of Engineering (South Asia), UiPath | Wednesday, January 14, 2026, 7:09 AM Asia/Singapore

AI agent autonomy risks demand guardrails and human oversight

Here are some ground rules and best practices to keep autonomous AI in check.

In spite of surging interest in autonomous AI agents, unchecked agent autonomy is proving to be a major liability across industries.

Seemingly minor errors can cascade into major consequences: algorithmic mishaps in finance can wipe out billions, and missteps in healthcare can directly threaten patient safety.

Too often, enterprises treat governance as an afterthought. They only realize after deployment that it is not the Large Language Models (LLMs) that fail, but the inadequate scaffolding around them that turns autonomy into a major enterprise risk.

Hence, error handling, context management, and audit trails can no longer be treated as peripheral concerns. Real value in agentic systems lies in enforcing control, transparency, and human oversight.

Designing agents that can fail safely
By nature, LLMs behave non-deterministically. The same prompt can yield a different and potentially biased output upon every run.
Integrating non-deterministic processes directly into core business operations creates systemic exposure in areas such as accountability and security.

The path forward involves designing for safe failure:

  • Systems must be engineered to restrict agents from acting on ambiguous or unverified outputs, bounding non-deterministic behavior within safe limits.
  • Critically, organizations should avoid embedding agents within traditional frameworks unless risks are carefully assessed. Agents introduce variables such as potential escalations and nuanced error states that require handling.
  • Organizations should also rethink agent design, particularly when the algorithms produce an undesirable output. In that case, simply retrying will not guarantee a correct or improved result. The second try is just as likely to fail, wasting processing cycles without solving the underlying problem.

The focus should then shift to robust checks built directly into the agent’s logic to validate and correct ambiguous outputs. Rather than giving agents free rein over tasks, bound risk by requiring the agent to act through verified automations or APIs. This ensures the critical execution step is handled by a predictable process, preventing the agent from acting on unverified outputs.

Starting small and scaling smart

Reliable, scalable agentic systems cannot rely on a monolithic “do-everything” agent. A single, overly broad agent is inherently brittle: it requires a vast, general prompt that rapidly degrades accuracy and makes errors impossible to isolate.

Instead, multiple specialized, single-purpose agents can provide tighter control. This allows for controlled scaling, simplifies debugging by isolating failures to single components, and maximizes reuse of specialized expertise across enterprise functions.

Besides good design, organizations need to consider adopting phased deployment of AI agents to manage risk:

  • Begin with one or two medium-scale internal processes that pose little risk from financial, cybersecurity, or data privacy standpoints. This initial phase focuses on establishing baseline performance and understanding real-world variability without exposing critical systems. Only after confirming success should teams proceed to gradual integration.
  • Controlled escalation allows teams to become familiar with managing inter-agent dependencies, orchestration, and controlled failure across an expanding ecosystem.

The key to controlled autonomy
Achieving the right balance between autonomy and control is an ongoing challenge, as parameters may shift frequently. Organizations must calibrate agency carefully, granting greater autonomy only when agents demonstrate consistent accuracy and reliability.

The necessary course of action is to keep humans in the loop (HITL). Agents must be restricted from high-stakes actions such as approving complex financial transactions without human supervision. Escalations for human review also feed into agent memory, improving performance in future runs. The controlled-agency model ensures workflows remain trustworthy within defined guardrails that preserve security, predictability, and performance.

Execution can be delegated to specialized agents, but governance requires a centralized control plane that provides visibility, auditing, and management of non-deterministic processes. This approach keeps agents reliable, accountable, and integrated as stable components of the digital workforce, with humans firmly in the driver’s seat.

By combining focused, single-purpose agents with deliberate human oversight and centralized governance, organizations can build scalable, dependable agentic systems while maintaining accountability at every step.

Share:

PreviousBlack Box Names Sameer Batra as Chief Business Officer to accelerate International Markets Growth
NextCyber fraud tops ransomware in WEF cybersecurity outlook

Related Posts

Are traditional cyber IR plans applicable to cloud incidents as well?

Are traditional cyber IR plans applicable to cloud incidents as well?

Friday, September 29, 2023

6 things to look for in a messaging app

6 things to look for in a messaging app

Thursday, October 13, 2022

April’s most malicious malware: an updated Agent Tesla RAT

April’s most malicious malware: an updated Agent Tesla RAT

Wednesday, May 13, 2020

Confusion, skepticism reign as India scraps a personal data protection bill

Confusion, skepticism reign as India scraps a personal data protection bill

Monday, September 5, 2022

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • Cyber protection for medical clinics in Singapore

    Cyber protection for medical clinics in Singapore

    As Singapore’s healthcare sector becomes increasingly digital and interconnected, clinics are facing heightened cyber risks, …Read more
  • India’s WazirX strengthens governance and digital asset security

    India’s WazirX strengthens governance and digital asset security

    Revamping its custody infrastructure using multi‑party computation tools has improved operational resilience and institutional‑grade safeguardsRead more
  • Bangladesh LGED modernizes communication while addressing data security concerns

    Bangladesh LGED modernizes communication while addressing data security concerns

    To meet emerging data localization/privacy regulations, the government engineering agency deploys a secure, unified digital …Read more
  • What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    This case study examines how many anti-fraud professionals reported feeling underprepared to counter rising AI-driven …Read more

Bottom sidebar

Other News

  • Cohesity Expands Strategic Alliance with HPE to Deliver Industry-Leading Cyber Resilience, Data Protection, and Hybrid Cloud Solutions

    Saturday, May 16, 2026
    SINGAPORE, May 15, 2026 /PRNewswire/ …Read More »
  • SwitchBot Launches Lock Vision Series, the World’s First Smart Deadbolt Locks with 3D Structured-Light Facial Recognition

    Friday, May 15, 2026
    TOKYO, May 15, 2026 /PRNewswire/ …Read More »
  • SU Group Announces Pricing of $6 Million Public Offering

    Tuesday, May 12, 2026
    HONG KONG, May 12, 2026 …Read More »
  • VIVOTEK AI Solutions Enhance Efficiency at Traffic Hubs in Norway

    Wednesday, May 6, 2026
    TAIPEI, May 6, 2026 /PRNewswire/ …Read More »
  • Taoping Reports Fiscal Year 2025 Results

    Thursday, April 30, 2026
    Strategic Transformation Drives Platform Expansion, …Read More »
  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2026 CybersecAsia All Rights Reserved.