Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Android spyware campaign exploits AI platform and accessibility servic...
Emerging third-party cyber risks via agentic AI
Fraud Syndicates Now Operate Like Businesses: VIDA Urges Malaysian CIS...
Baseus Security Brings Kickstarter Success X1 Pro Smart AI Dual-Tracki...
SECOM Singapore Receives Frost & Sullivan’s 2025 Singapore C...
LOGIN REGISTER
CybersecAsia
  • Features
    • Featured

      Emerging third-party cyber risks via agentic AI

      Emerging third-party cyber risks via agentic AI

      Tuesday, February 3, 2026, 10:22 AM Asia/Singapore | Features
    • Featured

      Rethinking customer identity for financial cybersecurity

      Rethinking customer identity for financial cybersecurity

      Tuesday, January 27, 2026, 4:13 PM Asia/Singapore | Features
    • Featured

      How AI is supercharging state-sponsored threat actors in Asia Pacific

      How AI is supercharging state-sponsored threat actors in Asia Pacific

      Wednesday, January 14, 2026, 4:06 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2025
  • Directory
  • E-Learning

Select Page

Tips

AI agent autonomy risks demand guardrails and human oversight

By Tomur Ho, Director of Engineering (South Asia), UiPath | Wednesday, January 14, 2026, 7:09 AM Asia/Singapore

AI agent autonomy risks demand guardrails and human oversight

Here are some ground rules and best practices to keep autonomous AI in check.

In spite of surging interest in autonomous AI agents, unchecked agent autonomy is proving to be a major liability across industries.

Seemingly minor errors can cascade into major consequences: algorithmic mishaps in finance can wipe out billions, and missteps in healthcare can directly threaten patient safety.

Too often, enterprises treat governance as an afterthought. They only realize after deployment that it is not the Large Language Models (LLMs) that fail, but the inadequate scaffolding around them that turns autonomy into a major enterprise risk.

Hence, error handling, context management, and audit trails can no longer be treated as peripheral concerns. Real value in agentic systems lies in enforcing control, transparency, and human oversight.

Designing agents that can fail safely
By nature, LLMs behave non-deterministically. The same prompt can yield a different and potentially biased output upon every run.
Integrating non-deterministic processes directly into core business operations creates systemic exposure in areas such as accountability and security.

The path forward involves designing for safe failure:

  • Systems must be engineered to restrict agents from acting on ambiguous or unverified outputs, bounding non-deterministic behavior within safe limits.
  • Critically, organizations should avoid embedding agents within traditional frameworks unless risks are carefully assessed. Agents introduce variables such as potential escalations and nuanced error states that require handling.
  • Organizations should also rethink agent design, particularly when the algorithms produce an undesirable output. In that case, simply retrying will not guarantee a correct or improved result. The second try is just as likely to fail, wasting processing cycles without solving the underlying problem.

The focus should then shift to robust checks built directly into the agent’s logic to validate and correct ambiguous outputs. Rather than giving agents free rein over tasks, bound risk by requiring the agent to act through verified automations or APIs. This ensures the critical execution step is handled by a predictable process, preventing the agent from acting on unverified outputs.

Starting small and scaling smart

Reliable, scalable agentic systems cannot rely on a monolithic “do-everything” agent. A single, overly broad agent is inherently brittle: it requires a vast, general prompt that rapidly degrades accuracy and makes errors impossible to isolate.

Instead, multiple specialized, single-purpose agents can provide tighter control. This allows for controlled scaling, simplifies debugging by isolating failures to single components, and maximizes reuse of specialized expertise across enterprise functions.

Besides good design, organizations need to consider adopting phased deployment of AI agents to manage risk:

  • Begin with one or two medium-scale internal processes that pose little risk from financial, cybersecurity, or data privacy standpoints. This initial phase focuses on establishing baseline performance and understanding real-world variability without exposing critical systems. Only after confirming success should teams proceed to gradual integration.
  • Controlled escalation allows teams to become familiar with managing inter-agent dependencies, orchestration, and controlled failure across an expanding ecosystem.

The key to controlled autonomy
Achieving the right balance between autonomy and control is an ongoing challenge, as parameters may shift frequently. Organizations must calibrate agency carefully, granting greater autonomy only when agents demonstrate consistent accuracy and reliability.

The necessary course of action is to keep humans in the loop (HITL). Agents must be restricted from high-stakes actions such as approving complex financial transactions without human supervision. Escalations for human review also feed into agent memory, improving performance in future runs. The controlled-agency model ensures workflows remain trustworthy within defined guardrails that preserve security, predictability, and performance.

Execution can be delegated to specialized agents, but governance requires a centralized control plane that provides visibility, auditing, and management of non-deterministic processes. This approach keeps agents reliable, accountable, and integrated as stable components of the digital workforce, with humans firmly in the driver’s seat.

By combining focused, single-purpose agents with deliberate human oversight and centralized governance, organizations can build scalable, dependable agentic systems while maintaining accountability at every step.

Share:

PreviousBlack Box Names Sameer Batra as Chief Business Officer to accelerate International Markets Growth
NextCyber fraud tops ransomware in WEF cybersecurity outlook

Related Posts

Latest Patch Tuesday rings alarm bells for 240m or more Windows users

Latest Patch Tuesday rings alarm bells for 240m or more Windows users

Friday, March 14, 2025

New scam tricks on the block: targeted links

New scam tricks on the block: targeted links

Tuesday, January 11, 2022

Security layers in MS 365 and Google Workspace “too thin”: survey

Security layers in MS 365 and Google Workspace “too thin”: survey

Monday, March 6, 2023

Bridging the divide between developer and security teams in Zero Trust planning

Bridging the divide between developer and security teams in Zero Trust planning

Tuesday, August 30, 2022

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Closing the Gap in Email Security:How To Stop The 7 Most SinisterAI-Powered Phishing Threats

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • India’s WazirX strengthens governance and digital asset security

    India’s WazirX strengthens governance and digital asset security

    Revamping its custody infrastructure using multi‑party computation tools has improved operational resilience and institutional‑grade safeguardsRead more
  • Bangladesh LGED modernizes communication while addressing data security concerns

    Bangladesh LGED modernizes communication while addressing data security concerns

    To meet emerging data localization/privacy regulations, the government engineering agency deploys a secure, unified digital …Read more
  • What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    What AI worries keep members of the Association of Certified Fraud Examiners sleepless?

    This case study examines how many anti-fraud professionals reported feeling underprepared to counter rising AI-driven …Read more
  • Meeting the business resilience challenges of digital transformation

    Meeting the business resilience challenges of digital transformation

    Data proves to be key to driving secure and sustainable digital transformation in Southeast Asia.Read more

Bottom sidebar

Other News

  • Fraud Syndicates Now Operate Like Businesses: VIDA Urges Malaysian CISOs to Rethink AI-Era Defense

    Tuesday, February 3, 2026
    KUALA LUMPUR, Malaysia, Feb. 2, …Read More »
  • Baseus Security Brings Kickstarter Success X1 Pro Smart AI Dual-Tracking Security Camera to Amazon

    Tuesday, February 3, 2026
    SHENZHEN, China, Feb. 3, 2026 …Read More »
  • SECOM Singapore Receives Frost & Sullivan’s 2025 Singapore Customer Value Leadership Recognition in the Integrated Security Services Industry

    Monday, February 2, 2026
    The company is recognized for …Read More »
  • BIGO Ads Enhances IAA Traffic Quality and Transparency Through Deepened Partnership with Pixalate

    Friday, January 30, 2026
    SINGAPORE, Jan. 30, 2026 /PRNewswire/ …Read More »
  • Hikvision earns ISO/IEC 29147 and ISO/IEC 30111 certification for vulnerability management

    Friday, January 30, 2026
    HANGZHOU, China, Jan. 30, 2026 …Read More »
  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2026 CybersecAsia All Rights Reserved.