
Mario Agra / Câmara dos Deputados Fernando Monteiro recomendou a aprovação do projeto, com mudanças

Pablo Valadares / Câmara dos Deputados Laura Carneiro: medida fecha lacunas na punição de práticas

Vinicius Loures/Câmara dos Deputados Ricardo Ayres, relator do projeto A Comissão de Viação e Transportes

Vinicius Loures/Câmara dos Deputados Aureo Ribeiro, relator da proposta A Comissão de Defesa do Consumidor

Em 1969, a NASA não colocou apenas um homem na Lua. Ela implantou uma frase

Seu colega de trabalho é cronicamente egoísta, não se solidariza com o restante da equipe

A rogue AI agent at Meta passed every identity check and still exposed sensitive data to unauthorized employees in March. Two weeks later, Mercor, a $10 billion AI startup, confirmed a supply-chain breach through LiteLLM. Both are traced to the same structural gap. Monitoring without enforcement, enforcement without isolation. A VentureBeat three-wave survey of 108 qualified enterprises found that the gap is not an edge case. It is the most common security architecture in production today. Gravitee’s State of AI Agent Security 2026 survey of 919 executives and practitioners quantifies the disconnect. 82% of executives say their policies protect them from unauthorized agent actions. Eighty-eight percent reported AI agent security incidents in the last twelve months. Only 21% have runtime visibility into what their agents are doing. Arkose Labs’ 2026 Agentic AI Security Report found 97% of enterprise security leaders expect a material AI-agent-driven incident within 12 months. Only 6% of security budgets address the risk. VentureBeat's survey results show that monitoring investment snapped back to 45% of security budgets in March after dropping to 24% in February, when early movers shifted dollars into runtime enforcement and sandboxing. The March wave (n=20) is directional, but the pattern is consistent with February’s larger sample (n=50): enterprises are stuck at observation while their agents already need isolation. CrowdStrike’s Falcon sensors detect more than 1,800 distinct AI applications across enterprise endpoints. The fastest recorded adversary breakout time has dropped to 27 seconds. Monitoring dashboards built for human-speed workflows cannot keep pace with machine-speed threats. The audit that follows maps three stages. Stage one is observe. Stage two is enforce, where IAM integration and cross-provider controls turn observation into action. Stage three is isolate, sandboxed execution that bounds blast radius when guardrails fail. VentureBeat Pulse data from 108 qualified enterprises ties each stage to an investment signal, an OWASP ASI threat vector, a regulatory surface, and immediate steps security leaders can take. The threat surface stage-one security cannot see The OWASP Top 10 for Agentic Applications 2026 formalized the attack surface last December. The ten risks are: goal hijack (ASI01), tool misuse (ASI02), identity and privilege abuse (ASI03), agentic supply chain vulnerabilities (ASI04), unexpected code execution (ASI05), memory poisoning (ASI06), insecure inter-agent communication (ASI07), cascading failures (ASI08), human-agent trust exploitation (ASI09), and rogue agents (ASI10). Most have no analog in traditional LLM applications. The audit below maps six of these to the stages where they are most likely to surface and the controls that address them. Invariant Labs disclosed the MCP Tool Poisoning Attack in April 2025: malicious instructions in an MCP server’s tool description cause an agent to exfiltrate files or hijack a trusted server. CyberArk extended it to Full-Schema Poisoning. The mcp-remote OAuth proxy patched CVE-2025-6514 after a command-injection flaw put 437,000 downloads at risk. Merritt Baer, CSO at Enkrypt AI and former AWS Deputy CISO, framed the gap in an exclusive VentureBeat interview: “Enterprises believe they’ve ‘approved’ AI vendors, but what they’ve actually approved is an interface, not the underlying system. The real dependencies are one or two layers deeper, and those are the ones that fail under stress.” CrowdStrike CTO Elia Zaitsev put the visibility problem in operational terms in an exclusive VentureBeat interview at RSAC 2026: “It looks indistinguishable if an agent runs your web browser versus if you run your browser.” Distinguishing the two requires walking the process tree, tracing whether Chrome was launched by a human from the desktop or spawned by an agent in the background. Most enterprise logging configurations cannot make that distinction. The regulatory clock and the identity architecture Auditability priority tells the same story in miniature. In January, 50% of respondents ranked it a top concern. By February, that dropped to 28% as teams sprinted to deploy. In March, it surged to 65% when those same teams realized they had no forensic trail for what their agents did. HIPAA’s 2026 Tier 4 willful-neglect maximum is $2.19M per violation category per year. In healthcare, Gravitee’s survey found 92.7% of organizations reported AI agent security incidents versus the 88% all-industry average. For a health system running agents that touch PHI, that ratio is the difference between a reportable breach and an uncontested finding of willful neglect. FINRA’s 2026 Oversight Report recommends explicit human checkpoints before agents that can act or transact execute, along with narrow scope, granular permissions, and complete audit trails of agent actions. Mike Riemer, Field CISO at Ivanti, quantified the speed problem in a recent VentureBeat interview: “Threat actors are reverse engineering patches within 72 hours. If a customer doesn’t patch within 72 hours of release, they’re open to exploit.” Most enterprises take weeks. Agents operating at machine speed widen that window into a permanent exposure. The identity problem is architectural. Gravitee's survey of 919 practitioners found only 21.9% of teams treat agents as identity-bearing entities, 45.6% still use shared API keys, and 25.5% of deployed agents can create and task other agents. A quarter of enterprises can spawn agents that their security team never provisioned. That is ASI08 as architecture. Guardrails alone are not a strategy A 2025 paper by Kazdan and colleagues (Stanford, ServiceNow Research, Toronto, FAR AI) showed a fine-tuning attack that bypasses model-level guardrails in 72% of attempts against Claude 3 Haiku and 57% against GPT-4o. The attack received a $2,000 bug bounty from OpenAI and was acknowledged as a vulnerability by Anthropic. Guardrails constrain what an agent is told to do, not what a compromised agent can reach. CISOs already know this. In VentureBeat's three-wave survey, prevention of unauthorized actions ranked as the top capability priority in every wave at 68% to 72%, the most stable high-conviction signal in the dataset. The demand is for permissioning, not prompting. Guardrails address the wrong control surface. Zaitsev framed the identity shift at RSAC 2026: “AI agents and non-human identities will explode across the enterprise, expanding exponentially and dwarfing human identities. Each agent will operate as a privileged super-human with OAuth tokens, API keys, and continuous access to previously

Ouça o artigo 3 minutos Este áudio é gerado automaticamente. Por favor, deixe-nos saber se você tiver comentários. Resumo de mergulho: A Smashburger

As diretrizes padrão para a construção de grandes modelos de linguagem (LLMs) otimizam apenas os custos de treinamento e ignoram os custos de

Ouça o artigo 5 minutos Este áudio é gerado automaticamente. Por favor, deixe-nos saber se você tiver comentários. A Modelo está aprofundando o

Salesforce on Wednesday unveiled the most ambitious architectural transformation in its 27-year history, introducing "Headless 360" — a sweeping initiative that exposes every

Especialista que mapeou mais de 1000 jornadas de usuários internacionais explica a ciência por trás das decisões que você toma sem pensar Você
Especialista que mapeou mais de 1000 jornadas de usuários internacionais explica a ciência por trás das decisões que você toma sem pensar Você
Especialista que mapeou mais de 1000 jornadas de usuários internacionais explica a ciência por trás das decisões que você toma sem pensar Você

Ouça o artigo 4 minutos Este áudio é gerado automaticamente. Por favor, deixe-nos saber se você tiver comentários. O Publicis Groupe viu a

Mario Agra / Câmara dos Deputados Fernando Monteiro recomendou a aprovação do projeto, com mudanças A Comissão de Desenvolvimento Urbano da Câmara dos
Pokémon Pokopia pegou muita gente de surpresa de uma maneira bem positiva. Apesar de parecer um jogo bem despretencioso à primeira vista, ele

Rooftop na Faria Lima transforma o fim de semana em uma experiência de conexões, elegância e celebração da vida Em São Paulo, onde

Pablo Valadares / Câmara dos Deputados Laura Carneiro: medida fecha lacunas na punição de práticas digitais prejudiciais A Comissão de Previdência, Assistência Social,

“Grupo Momesso de Itapira-SP, sofre golpe de consultor financeiro de 12 milhões de reais.” Veja nesta entrevista, com os diretores do Grupo MOMESSO,

O evento, realizado na Unesp Câmpus de Ilha Solteira, contou com duas turmas ao longo do dia, o que ampliou o acesso do

A plataforma Steam, da Valve, recebe centenas de novos jogos semanalmente e pode ser difícil dar conta de tudo que fica disponível para

Luxo silencioso, design biofílico e experiência de vida redefinem o mercado imobiliário premium O conceito de exclusividade no mercado imobiliário de alto padrão

Abordagem individualizada se consolida como alternativa aos métodos genéricos em um cenário de excesso de informação Em um momento em que o acesso

Mariléia Martins durante a Confraria dos Palcos, onde foi reconhecida por sua participação e reforçou seu posicionamento em comunicação estratégica e autoridade profissional

Vinicius Loures/Câmara dos Deputados Ricardo Ayres, relator do projeto A Comissão de Viação e Transportes da Câmara dos Deputados aprovou projeto de lei

Das Américas à África, decisões recentes mostram como os sistemas regionais vêm redefinindo a proteção internacional dos direitos humanos Por Dra. Lívia Pelli
© 2025 Todos os direitos reservados a Handelsblatt