News Froggy
newsfroggy
HomeTechReviewProgrammingGamesHow ToAboutContacts
newsfroggy

Your daily source for the latest technology news, startup insights, and innovation trends.

More

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

Categories

  • Tech
  • Review
  • Programming
  • Games
  • How To

© 2026 News Froggy. All rights reserved.

TwitterFacebook
Tech

industry: Enterprise MCP adoption is outpacing security controls

Enterprise MCP adoption is outpacing security controls Enterprises are rapidly integrating Model Context Protocol (MCP) and deploying autonomous AI agents, yet security frameworks are struggling to keep pace, creating a

PublishedFebruary 28, 2026
Reading Time5 min
industry: Enterprise MCP adoption is outpacing security controls

Enterprise MCP adoption is outpacing security controls

Enterprises are rapidly integrating Model Context Protocol (MCP) and deploying autonomous AI agents, yet security frameworks are struggling to keep pace, creating a significant new attack surface. This alarming trend, highlighted by industry leaders at a recent VentureBeat AI Impact Series event, suggests that existing human-centric security models are ill-equipped to govern AI systems that operate with unprecedented access and autonomy, potentially opening doors to serious data breaches.

AI Agents Introduce Unprecedented Attack Vectors

AI agents now command more access and connections within enterprise systems than any other software, making them the largest attack surface security teams have ever confronted. Spiros Xanthos, founder and CEO of Resolve AI, warned that if this new vector is exploited, it could lead to data breaches or worse. Traditional security frameworks, designed for human interactions, lack an agreed-upon construct for autonomous AI agents with their own identities and personas.

Jon Aniano, SVP of product and CRM applications at Zendesk, described the current situation as the "wild, wild West," with agentic AI advancing faster than enterprises can establish guardrails. The lack of a defined technical agent-to-agent protocol further complicates efforts to balance user expectations with platform safety.

MCP's Permissive Nature Magnifies Vulnerabilities

While MCP servers simplify integration between agents, tools, and data, they are inherently "extremely permissive," according to Aniano. He contended that MCP can be even more problematic than traditional APIs, which typically have more robust controls. As enterprises move towards potentially hundreds of agents, each with its own identity and access, managing this complex matrix becomes a daunting task.

Even as companies like Resolve AI develop autonomous agents for critical functions like site reliability engineering (SRE), Xanthos acknowledged a complete industry-wide void in frameworks for these systems. This places the burden of defining agent restrictions on builders, who must earn customer trust in their decisions. Existing security tools with fine-grained access, such as Splunk's index-level controls, offer some promise but are generally considered insufficient for the era of widespread agent deployment.

Untangling AI's Role in Authentication and Accountability

AI's increasing involvement in customer interactions, particularly within CRM platforms like Zendesk, introduces complex audit trails and accountability dilemmas. Aniano questioned who is at fault when an AI, instructed by a human, takes an incorrect action, especially in scenarios involving multiple AI components and human agents.

Of particular concern is AI's role in authentication tasks, such as processing one-time passwords (OTP) or two-step verification methods. The risk of an AI mis-authenticating or misidentifying a user could lead to sensitive data leakage or create critical entry points for attackers. While many highly regulated industries still mandate human involvement in authentication, the industry is exploring a future where specialized agents might perform human-level authentication interactions.

Enterprises Hesitate on Full Agent Autonomy

Despite the clear trajectory toward more autonomous systems, many enterprises remain cautious about granting AI agents full workflow authority without human review. This "good fear," as Xanthos described it, is a significant factor in holding back widespread standing authorization for agents.

Resolve AI is beginning to offer agents standing authorization for "generally safe" coding tasks, gradually expanding to other low-risk scenarios. However, both experts agree that highly risky situations, where AI mistakes could "mutate the state of the production system," will always necessitate stringent oversight. The rapid pace of this technological shift, likened to mobile adoption, underscores the urgent need for a collective industry response to these security challenges.

Immediate Steps for Bridging the Security Gap

While comprehensive solutions are still evolving, enterprises can take interim measures using existing tools. Xanthos pointed to capabilities like Splunk's fine-grained, index-level access controls as a way to manage agent permissions. Zendesk's approach offers a practical blueprint, utilizing declaratively designed API calls with explicitly sanctioned actions, strict access and scope limits, and mandatory human review before expanding agent authorizations.

This principle, described by Aniano as "always checking those gates and seeing how we can widen the aperture," emphasizes a cautious, validated approach to expanding agent permissions rather than granting broad standing authorization prematurely. This incremental strategy is crucial as the industry navigates the complexities of securing an increasingly agent-driven enterprise environment.

Q: Why is MCP adoption making security worse for enterprises?

A: MCP simplifies integration between AI agents, tools, and data, but its design is often "extremely permissive," meaning agents can have broad access without sufficient granular controls. This creates a larger, less manageable attack surface compared to traditional APIs with more established security protocols.

Q: What are the biggest security concerns with AI agents taking over authentication?

A: When AI agents handle tasks like sending and processing one-time passwords or other multi-factor authentication methods, there's a significant risk of mis-authentication or misidentification. This could lead to unauthorized access, sensitive data leakage, or open pathways for attackers to compromise systems.

Q: What immediate steps can security teams take to address these risks?

A: Security teams can implement fine-grained access controls where available, such as index-level access in tools like Splunk, to limit agent permissions. They should also adopt strict policies for agent interactions, ensuring API calls are declaratively designed with explicitly sanctioned actions, and maintain human oversight and review before expanding agent authorizations.

#industry#VentureBeat#Security#Orchestration#enterprise#adoptionMore

Related articles

in-depth: There’s a Secret Ingredient to Making Luxury Ice at Home
Tech
WiredApr 12

in-depth: There’s a Secret Ingredient to Making Luxury Ice at Home

The lucrative, environmentally taxing luxury ice industry, shipping ancient glaciers globally, is facing a surprising challenge. It turns out that crafting pristine, clear ice comparable to premium commercial offerings can be achieved affordably at home using a simple technique and a "secret ingredient." This DIY method bypasses the ecological costs and exorbitant prices, democratizing high-end cocktail experiences.

Riding the Rails Over a Floating Bridge: GeekWire Podcast Visits
Tech
GeekWireApr 12

Riding the Rails Over a Floating Bridge: GeekWire Podcast Visits

GeekWire's Todd Bishop and John Cook recorded a podcast on Sound Transit's new 2 Line, the world's first light rail on a floating bridge, connecting Seattle to Microsoft's Redmond campus. They discuss engineering challenges, regional cooperation, and the future of transit.

in-depth: Best Electric Cargo Bikes (2026): Urban Arrow, Lectric
Tech
WiredApr 11

in-depth: Best Electric Cargo Bikes (2026): Urban Arrow, Lectric

The electric cargo bike market is booming with updated models for 2026, offering car-free solutions for urban hauling. New recommendations include the versatile Specialized Globe Haul ST, value-packed Lectric XPedition2, child-centric Urban Arrow FamilyNext Pro, and compact JackRabbit MG Doble. These bikes emphasize power, safety, and specialized features for diverse needs.

policy: Can AI be a ‘child of God’? Inside Anthropic’s meeting with
Tech
Washington Post TechnologyApr 12

policy: Can AI be a ‘child of God’? Inside Anthropic’s meeting with

AI firm Anthropic, valued at $380 billion, recently met with Christian leaders in San Francisco for guidance on building a moral chatbot, an unprecedented move in Silicon Valley. This rare consultation highlights the complex ethical questions surrounding advanced AI, including its potential spiritual dimensions.

Artemis 2 Crew Makes Triumphant Splashdown, New Lunar Era Begins
Tech
GeekWireApr 11

Artemis 2 Crew Makes Triumphant Splashdown, New Lunar Era Begins

NASA's Artemis 2 mission successfully concluded today with a triumphant splashdown in the Pacific Ocean, marking the first crewed trip around the moon since 1972. The four-astronaut crew returned after a 10-day odyssey, setting new human distance records and validating critical hardware for future lunar landings and the establishment of a permanent base.

Artemis II Returns: Historic Moon Voyage Concludes Safely
Tech
Washington Post TechnologyApr 11

Artemis II Returns: Historic Moon Voyage Concludes Safely

NASA's Artemis II mission successfully concluded its historic voyage around the Moon, with the Orion module splashing down safely in the Pacific Ocean. This pivotal human-rated test flight delivered four astronauts back to Earth, validating critical systems and marking a significant step towards humanity's sustained return to the lunar surface.

Back to Newsroom

Stay ahead of the curve

Get the latest technology insights delivered to your inbox every morning.