{"id":21017,"date":"2025-11-07T00:00:00","date_gmt":"2025-11-07T05:00:00","guid":{"rendered":"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/"},"modified":"2025-11-07T00:00:00","modified_gmt":"2025-11-07T05:00:00","slug":"beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity","status":"publish","type":"post","link":"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/","title":{"rendered":"Beware of double agents: How AI can fortify \u2014 or fracture \u2014 your cybersecurity"},"content":{"rendered":"<p>AI is rapidly becoming the backbone of our world, promising unprecedented productivity and innovation. But as organizations deploy AI agents to unlock new opportunities and drive growth, they also face a new breed of cybersecurity threats.<\/p>\n<p>There are a lot of\u00a0<em>Star Trek<\/em>\u00a0fans here at Microsoft, including me. One of our engineering leaders gifted me a life-size cardboard standee of\u00a0<a href=\"https:\/\/www.startrek.com\/news\/top-10-data-moments\">Data<\/a>\u00a0that lurks next to my office door. So,\u00a0as I look at that cutout, I think about the Great AI Security Dilemma:\u00a0Is\u00a0AI going to be our best friend or our worst nightmare? Drawing inspiration from the duality of the android officer\u00a0<a href=\"https:\/\/www.startrek.com\/news\/top-10-data-moments\">Data<\/a>, and his evil twin\u00a0<a href=\"https:\/\/www.startrek.com\/news\/remembering-datalore-26-years-later\">Lore<\/a>\u00a0in the\u00a0<em>Star Trek\u00a0<\/em>universe, today\u2019s AI agents can either fortify your cybersecurity defenses \u2014 or, if mismanaged \u2014 fracture them.<\/p>\n<p>The influx of agents is real. IDC research<a href=\"https:\/\/blogs.microsoft.com\/blog\/2025\/11\/05\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/#_ftn1\" name=\"_ftnref1\">[1]<\/a>\u00a0predicts there will be 1.3 billion agents in circulation by 2028. When we think about our agentic future in AI,\u00a0the duality of Data and Lore seems like\u00a0a great way\u00a0to think about what\u00a0we\u2019ll\u00a0face with AI agents and how to avoid double agents that upend control and trust. Leaders should consider three principles and tailor them to fit the specific needs of their organizations.<\/p>\n<h3><strong>1. Recognize the new attack landscape<\/strong><\/h3>\n<p>Security is not just an IT issue \u2014 it\u2019s a board-level priority. Unlike traditional software, AI agents are even more dynamic, adaptive and likely to operate autonomously. This creates unique risks.<\/p>\n<p>We must accept that AI can be abused in ways beyond what we\u2019ve experienced with traditional software. We employ AI agents to perform well-meaning tasks, but those with broad privileges can be manipulated by bad actors to misuse their access, such as leaking sensitive data via automated actions. We call this the \u201cConfused Deputy\u201d problem. AI Agents \u201cthink\u201d in terms of natural language where instructions and data are tightly intertwined, much more than in typical software we interact with. The generative models agents depend on dynamically analyze the entire soup of human (or even non-human) languages, making it hard to distinguish well-known safe operations from new instructions introduced through malicious manipulation. The risk grows even more when shadow agents \u2014 unapproved or orphaned \u2014 enter the picture. And as we saw in Bring Your Own Device (BYOD) and other tech waves, anything you cannot inventory and account for magnifies blind spots and drives risk ever upward.<\/p>\n<h3><strong>2. Practice Agentic Zero Trust<\/strong><\/h3>\n<p>AI agents may be new as productivity drivers, but they can still be managed effectively using established security principles. I\u2019ve had great conversations about this here at Microsoft with leaders like Mustafa Suleyman, cofounder of DeepMind and now Executive Vice President and CEO of Microsoft AI. Mustafa frequently shares a way to think about this, which he outlined in his book\u00a0<em>The Coming Wave,\u00a0<\/em>in terms of Containment and Alignment.<\/p>\n<p>Containment simply means we do not blindly trust our AI Agents, and we significantly box every aspect of what they do. For example, we cannot let any agent\u2019s access privileges exceed its role and purpose \u2014 it\u2019s the same security approach we take to employee accounts, software and devices, what we refer to as \u201cleast privilege.\u201d Similarly, we contain by never implicitly trusting what an agent does or how it communicates \u2014 everything must be monitored \u2014 and when this isn\u2019t possible, agents simply are not permitted to operate in our environment.<\/p>\n<p>Alignment is all about infusing positive control of an AI agent\u2019s intended purpose, through its prompts and the models it uses. We must only use AI agents trained to resist attempts at corruption, with standard and\u00a0<em>mission-specific\u00a0<\/em>safety protections built into both the model itself and the prompts used to invoke the model. AI agents must resist attempts to divert them from their approved uses. They must execute in a Containment environment that watches closely for deviation from their intended purpose. All this requires strong AI agent identity and clear accountable ownership within the organization. As part of AI governance, every agent must have an identity, and we must know who in the organization is accountable for its\u00a0<em>aligned\u00a0<\/em>behavior.<\/p>\n<p>Containment (least privilege) and Alignment will sound familiar to enterprise security teams, because they align with some of the basic principles of\u00a0<a href=\"https:\/\/learn.microsoft.com\/en-us\/security\/zero-trust\/zero-trust-overview\">Zero Trust<\/a>. Agentic Zero Trust includes \u201cassuming breach,\u201d or never implicitly trusting anything, making humans, devices and agents verify who they are explicitly before they gain access and limiting their access to only what\u2019s needed to perform a task. While Agentic Zero Trust ultimately includes deeper security capabilities, discussing Containment and Alignment is a good shorthand in security-in-AI strategy conversations with senior stakeholders to keep everyone grounded in managing the new risk. Agents will keep joining and adapting at work \u2014 some may become double agents. With proper controls, we can protect ourselves.<\/p>\n<h3><strong>3. Foster a culture of secure innovation<\/strong><\/h3>\n<p>Technology alone won\u2019t solve AI security. Culture is the real superpower in managing cyber risk \u2014 and leaders have the unique ability to shape it. Start with open dialogue: make AI risks and responsible use part of everyday conversations. Keep it cross-functional: legal, compliance, HR and others should have a seat at the table. Invest in continuous education: train teams on AI security fundamentals and clarify policies to cut through noise. Finally, embrace safe experimentation: give people approved spaces to learn and innovate without creating risk.<\/p>\n<p>Organizations that thrive will treat AI as a teammate, not a threat \u2014 building trust through communication, learning and continuous improvement.<\/p>\n<h3><strong>The path forward: What every company should do<\/strong><\/h3>\n<p>AI isn\u2019t just another chapter \u2014 it\u2019s a plot twist that changes everything. The opportunities are huge, but so are the risks. The rise of AI requires ambient security, which executives create by making cybersecurity a daily priority. This means blending robust technical measures with ongoing education and clear leadership so that security awareness influences every choice made. Organizations maintain ambient security when they:<\/p>\n<ul>\n<li>Make AI security a strategic priority.<\/li>\n<li>Insist on Containment and Alignment for every agent.<\/li>\n<li>Mandate identity, ownership and data governance.<\/li>\n<li>Build a culture that champions secure innovation.<\/li>\n<\/ul>\n<p><strong>And it will be important to take a set of practical steps:<\/strong><\/p>\n<ul>\n<li>Assign every AI agent an ID and owner \u2014 just like employees need badges. This ensures traceability and control.<\/li>\n<li>Document each agent\u2019s intent and scope.<\/li>\n<li>Monitor actions, inputs and outputs. Map data flows early to set compliance benchmarks.<\/li>\n<li>Keep agents in secure, sanctioned environments \u2014 no rogue \u201cagent factories.\u201d<\/li>\n<\/ul>\n<p><strong>The call to action for every business is:<\/strong>\u00a0Review your AI governance framework now. Demand clarity, accountability and continuous improvement. The future of cybersecurity is human plus machine \u2014 lead with purpose and make AI your strongest ally.<\/p>\n<p>At Microsoft, we know we have a huge role to play in empowering our customers in this new era. In May, we introduced\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/05\/19\/microsoft-extends-zero-trust-to-secure-the-agentic-workforce\/\">Microsoft Entra Agent ID<\/a>\u00a0as a way to help customers place unique identities to agents from the moment they are created in Microsoft Copilot Studio and Azure AI Foundry. We leverage AI in Defender and Security Copilot, combined with the massive security signals we collect, to\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/09\/24\/ai-vs-ai-detecting-an-ai-obfuscated-phishing-campaign\/\">expose and defeat phishing campaigns<\/a>\u00a0and other attacks that cybercriminals may use as entry points to compromise AI agents. We\u2019ve also been committed to a platform approach with AI agents, to help customers safely use both Microsoft and third-party agents on their journey, avoiding complexity and risk that come from needing to juggle excessive dashboards and management consoles.<\/p>\n<p>I\u2019m excited by several other innovations we will be sharing at\u00a0<a href=\"https:\/\/ignite.microsoft.com\/en-US\/home\">Microsoft Ignite<\/a>\u00a0later this month, alongside customers and partners.<\/p>\n<p>We may not be conversing with Data on the bridge of the\u00a0<a href=\"https:\/\/www.startrek.com\/news\/enterprise-starfleets-finest-flagships\">USS Enterprise<\/a>\u00a0quite yet, but as a technologist, it\u2019s never been more exciting than watching this stage of AI\u2019s trajectory in our workplaces and lives. As leaders, understanding the core opportunities and risks helps create a safer world for humans and agents working together.<\/p>\n<p><em><span class=\"TextRun SCXW133738894 BCX8\" lang=\"EN-US\" xml_lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW133738894 BCX8\">Charlie Bell is executive vice president of Microsoft Security, leading teams advancing cybersecurity, compliance,\u00a0<\/span><span class=\"NormalTextRun SCXW133738894 BCX8\">identity<\/span><span class=\"NormalTextRun SCXW133738894 BCX8\">\u00a0and management. With more than 40 years in technology,\u00a0<\/span><span class=\"NormalTextRun SCXW133738894 BCX8\">he\u2019s<\/span><span class=\"NormalTextRun SCXW133738894 BCX8\">\u00a0held leadership roles at Oracle, founded Server Technologies Group and unified engineering at AWS before joining Microsoft, driving innovation and protection for global digital systems<\/span><span class=\"NormalTextRun SCXW133738894 BCX8\">.<\/span><\/span><\/em><\/p>\n<p>Taken from: <a href=\"https:\/\/blogs.microsoft.com\/blog\/2025\/11\/05\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/\">https:\/\/blogs.microsoft.com\/blog\/2025\/11\/05\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AI is rapidly becoming the backbone of our world, promising unprecedented productivity and innovation. But as organizations deploy AI agents to unlock new opportunities and drive growth, they also face a new breed of cybersecurity threats. There are a lot of\u00a0Star Trek\u00a0fans here at Microsoft, including me. One of our engineering leaders gifted me a<\/p>\n","protected":false},"author":1,"featured_media":17425,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[562],"tags":[],"class_list":{"0":"post-21017","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-trend-setters"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Beware of double agents: How AI can fortify \u2014 or fracture \u2014 your cybersecurity - Tomilli<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beware of double agents: How AI can fortify \u2014 or fracture \u2014 your cybersecurity - Tomilli\" \/>\n<meta property=\"og:description\" content=\"AI is rapidly becoming the backbone of our world, promising unprecedented productivity and innovation. But as organizations deploy AI agents to unlock new opportunities and drive growth, they also face a new breed of cybersecurity threats. There are a lot of\u00a0Star Trek\u00a0fans here at Microsoft, including me. One of our engineering leaders gifted me a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Tomilli\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-07T05:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tomilli.com\/en\/wp-content\/uploads\/2026\/02\/OMB-Security-11-5-Hero_Final.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1068\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tomilli Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tomilli Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/\"},\"author\":{\"name\":\"Tomilli Team\",\"@id\":\"https:\/\/tomilli.com\/en\/#\/schema\/person\/a45b60f44cae37b99e5b16e3270a07af\"},\"headline\":\"Beware of double agents: How AI can fortify \u2014 or fracture \u2014 your cybersecurity\",\"datePublished\":\"2025-11-07T05:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/\"},\"wordCount\":1385,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/tomilli.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tomilli.com\/en\/wp-content\/uploads\/2026\/02\/OMB-Security-11-5-Hero_Final.jpg\",\"articleSection\":[\"Trend setters\"],\"inLanguage\":\"es-CO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/\",\"url\":\"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/\",\"name\":\"Beware of double agents: How AI can fortify \u2014 or fracture \u2014 your cybersecurity - Tomilli\",\"isPartOf\":{\"@id\":\"https:\/\/tomilli.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tomilli.com\/en\/wp-content\/uploads\/2026\/02\/OMB-Security-11-5-Hero_Final.jpg\",\"datePublished\":\"2025-11-07T05:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"es-CO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/tomilli.com\/en\/wp-content\/uploads\/2026\/02\/OMB-Security-11-5-Hero_Final.jpg\",\"contentUrl\":\"https:\/\/tomilli.com\/en\/wp-content\/uploads\/2026\/02\/OMB-Security-11-5-Hero_Final.jpg\",\"width\":1600,\"height\":1068},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/tomilli.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Beware of double agents: How AI can fortify \u2014 or fracture \u2014 your cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tomilli.com\/en\/#website\",\"url\":\"https:\/\/tomilli.com\/en\/\",\"name\":\"Tomilli\",\"description\":\"Tomilli.com features a global ecosystem of content about innovation and communications trends, headlining issues related to creativity, business, marketing, and culture.\",\"publisher\":{\"@id\":\"https:\/\/tomilli.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tomilli.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-CO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/tomilli.com\/en\/#organization\",\"name\":\"Tomilli\",\"url\":\"https:\/\/tomilli.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\/\/tomilli.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/tomilli.com\/en\/wp-content\/uploads\/2026\/01\/tomilli-logo_v2.jpg\",\"contentUrl\":\"https:\/\/tomilli.com\/en\/wp-content\/uploads\/2026\/01\/tomilli-logo_v2.jpg\",\"width\":792,\"height\":228,\"caption\":\"Tomilli\"},\"image\":{\"@id\":\"https:\/\/tomilli.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/tomilli.com\/en\/#\/schema\/person\/a45b60f44cae37b99e5b16e3270a07af\",\"name\":\"Tomilli Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-CO\",\"@id\":\"https:\/\/tomilli.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4cc127c34ab37694ead2fa1f1563e9f57887487628bd058236b7854c2daac1c0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4cc127c34ab37694ead2fa1f1563e9f57887487628bd058236b7854c2daac1c0?s=96&d=mm&r=g\",\"caption\":\"Tomilli Team\"},\"sameAs\":[\"https:\/\/tomilli.com\/en\"],\"url\":\"https:\/\/tomilli.com\/en\/author\/2026_es1tomilli\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beware of double agents: How AI can fortify \u2014 or fracture \u2014 your cybersecurity - Tomilli","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/","og_locale":"es_ES","og_type":"article","og_title":"Beware of double agents: How AI can fortify \u2014 or fracture \u2014 your cybersecurity - Tomilli","og_description":"AI is rapidly becoming the backbone of our world, promising unprecedented productivity and innovation. But as organizations deploy AI agents to unlock new opportunities and drive growth, they also face a new breed of cybersecurity threats. There are a lot of\u00a0Star Trek\u00a0fans here at Microsoft, including me. One of our engineering leaders gifted me a","og_url":"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/","og_site_name":"Tomilli","article_published_time":"2025-11-07T05:00:00+00:00","og_image":[{"width":1600,"height":1068,"url":"https:\/\/tomilli.com\/en\/wp-content\/uploads\/2026\/02\/OMB-Security-11-5-Hero_Final.jpg","type":"image\/jpeg"}],"author":"Tomilli Team","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Tomilli Team","Tiempo de lectura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/"},"author":{"name":"Tomilli Team","@id":"https:\/\/tomilli.com\/en\/#\/schema\/person\/a45b60f44cae37b99e5b16e3270a07af"},"headline":"Beware of double agents: How AI can fortify \u2014 or fracture \u2014 your cybersecurity","datePublished":"2025-11-07T05:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/"},"wordCount":1385,"commentCount":0,"publisher":{"@id":"https:\/\/tomilli.com\/en\/#organization"},"image":{"@id":"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/tomilli.com\/en\/wp-content\/uploads\/2026\/02\/OMB-Security-11-5-Hero_Final.jpg","articleSection":["Trend setters"],"inLanguage":"es-CO"},{"@type":"WebPage","@id":"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/","url":"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/","name":"Beware of double agents: How AI can fortify \u2014 or fracture \u2014 your cybersecurity - Tomilli","isPartOf":{"@id":"https:\/\/tomilli.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/tomilli.com\/en\/wp-content\/uploads\/2026\/02\/OMB-Security-11-5-Hero_Final.jpg","datePublished":"2025-11-07T05:00:00+00:00","breadcrumb":{"@id":"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/#breadcrumb"},"inLanguage":"es-CO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/#primaryimage","url":"https:\/\/tomilli.com\/en\/wp-content\/uploads\/2026\/02\/OMB-Security-11-5-Hero_Final.jpg","contentUrl":"https:\/\/tomilli.com\/en\/wp-content\/uploads\/2026\/02\/OMB-Security-11-5-Hero_Final.jpg","width":1600,"height":1068},{"@type":"BreadcrumbList","@id":"https:\/\/tomilli.com\/en\/beware-of-double-agents-how-ai-can-fortify-or-fracture-your-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/tomilli.com\/en\/"},{"@type":"ListItem","position":2,"name":"Beware of double agents: How AI can fortify \u2014 or fracture \u2014 your cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/tomilli.com\/en\/#website","url":"https:\/\/tomilli.com\/en\/","name":"Tomilli","description":"Tomilli.com features a global ecosystem of content about innovation and communications trends, headlining issues related to creativity, business, marketing, and culture.","publisher":{"@id":"https:\/\/tomilli.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tomilli.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-CO"},{"@type":"Organization","@id":"https:\/\/tomilli.com\/en\/#organization","name":"Tomilli","url":"https:\/\/tomilli.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/tomilli.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/tomilli.com\/en\/wp-content\/uploads\/2026\/01\/tomilli-logo_v2.jpg","contentUrl":"https:\/\/tomilli.com\/en\/wp-content\/uploads\/2026\/01\/tomilli-logo_v2.jpg","width":792,"height":228,"caption":"Tomilli"},"image":{"@id":"https:\/\/tomilli.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/tomilli.com\/en\/#\/schema\/person\/a45b60f44cae37b99e5b16e3270a07af","name":"Tomilli Team","image":{"@type":"ImageObject","inLanguage":"es-CO","@id":"https:\/\/tomilli.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4cc127c34ab37694ead2fa1f1563e9f57887487628bd058236b7854c2daac1c0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4cc127c34ab37694ead2fa1f1563e9f57887487628bd058236b7854c2daac1c0?s=96&d=mm&r=g","caption":"Tomilli Team"},"sameAs":["https:\/\/tomilli.com\/en"],"url":"https:\/\/tomilli.com\/en\/author\/2026_es1tomilli\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/tomilli.com\/en\/wp-json\/wp\/v2\/posts\/21017","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tomilli.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tomilli.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tomilli.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tomilli.com\/en\/wp-json\/wp\/v2\/comments?post=21017"}],"version-history":[{"count":0,"href":"https:\/\/tomilli.com\/en\/wp-json\/wp\/v2\/posts\/21017\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tomilli.com\/en\/wp-json\/wp\/v2\/media\/17425"}],"wp:attachment":[{"href":"https:\/\/tomilli.com\/en\/wp-json\/wp\/v2\/media?parent=21017"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tomilli.com\/en\/wp-json\/wp\/v2\/categories?post=21017"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tomilli.com\/en\/wp-json\/wp\/v2\/tags?post=21017"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}