In most security teams in organizations of some complexity, the validation of the defence seems to be a series of stagnant compartments. There is an attack simulation tool (BAS) on the one hand, vulnerability scanners and attack surface management platforms on the other, and point assessments - manual or automated - that run in parallel. Each product provides a portion of the truth, but there is rarely an integrated and actionable vision that answers the main question: are we really protected against how adversaries attack today?
The problem is not just operational inefficiency: it is a structural blindness. The attackers don't understand silos. A sophisticated incident typically links an exposed identity, a bad cloud configuration, a failure in detection and unpatched vulnerability in a single maneuver. To anticipate and validate resistance to such attack chains we need more than isolated simulations: we need a discipline that understands the organization as an interconnected system.

So far, much of the security validation has been conceived as the repetition of simulated attacks: deploying agents, running scenarios and receiving a report that says what was blocked and what was not. This practice has value, but is insufficient in the face of threats that combine multiple vectors and exploit identity units, configuration and detection controls. To close this gap simultaneously, we have to incorporate three complementary looks: the one that seeks how an attacker can enter, the one that measures if our controls can stop it, and the one that prioritizes which risks really matter depending on the impact and the compensation of the environment.
The first look, the adversarial, tries to discover real path of attack towards critical assets, something that frameworks like MITRE ATT & CK help to model and understand. The second looks at the defensive controls - firewalls, EDR, IMS rules, WAFs - and evaluates empirical evidence of their effectiveness in the face of real attacks. The third approach introduces: not all vulnerabilities identified in an inventory are a priority exploitation if there are no plausible routes leading to sensitive assets or if there are already effective risk mitigation controls.
The convergence of these perspectives is what is needed for credible validation. And this is where two elements that radically alter the status quo emerge: the autonomous agents based on IA (what some call "agenic AI") and a data architecture that continuously represents the reality of the organization.
Today we see many products that "use IA" to summarize findings or generate texts. That brings productivity, but it does not transform the operating flow. Self-employed actors are different because they do not merely consult a model and return a response; are responsible for the complete process: they think about what should be done, execute the necessary actions, analyze results and adapt the sequence without a human having to direct step by step. In safety this may mean analyzing a critical warning, automatically mapping it to the relevant assets, launching specific validations, assessing whether the controls block the operation and prioritizing remedies with real evidence in minutes rather than days or weeks.
However, the staff member's capacity is not the only thing that matters: the real limitation is in the data. An autonomous agent that is based on a generic model will produce generic conclusions. For your decisions to be operationally useful, you need an integrated and always up-to-date security database: a "Security Data Fabric" that combines asset inventory, exposure telemetry and control effectiveness measurements. Without this layer of context, automation is left in impressive but not applicable to production.
This unified layer must capture, on the one hand, the intelligence of assets - who are the servers, users, applications and how they relate -; on the other, the intelligence of exposure - vulnerabilities, misconfigurations, identity risks; and, finally, the empirical evidence of whether the deployed defenses actually block concrete exploits. Technological companies explain the value of data architectures that unify heterogeneity for continuous analysis, and "data fabric" concepts applied to security are increasingly common in technical and business literature ( IBM on manufacturing data).
When that data mesh exists, the agent stops running "one-size-fits-all" tests and can customize its validations to the real topology, the assets that really matter and the real set of controls. It is not the same to say that "a CVE is critical" that can be stated with evidence: "that CVE is exploitable on this server, our controls do not stop it and there is a validated path to a critical business system." This difference transforms prioritization and accelerates mitigation decisions.
The horizon towards which security validation is carried out is transparent: periodic tests will be carried out on a continuous basis, manual intervention will give way to autonomous operations, specific products will be combined into unified platforms and reports will become levers for specific decisions. Self-contained actors are the catalyst, but their usefulness depends on governance, data quality and clear human monitoring mechanisms. NIST and other institutions begin to articulate frameworks for responsible use of IA that are relevant when these capabilities are applied to safety ( NIST in IA).

Not all are promises: autonomous automation requires robust controls on data sources, traceability of decisions, audit and evidence against false positive or unwanted actions. In addition, confidence in automated results must be built with reproducible evidence and clear mechanisms for human intervention when the situation so requires. Technology can accelerate and enrich validation, but not replace shared responsibility between human systems and equipment.
The market is already beginning to reflect this transition. Sectoral reports show how some companies integrate agentic capabilities with native architectures of continuous validation; for example, the analysis of automated validation providers of 2026 has recognized the innovation that brings convergence between self-employed actors and a data model focused on controls and exposures ( Frost & Sullivan Frost Radar 2026).
In short, if your security team wants to move from partial observations to an organizational response that reflects how they really attack the adversaries, the recipe combines three ingredients: an integrated and real-time view of the environment, validations that measure the real effectiveness of controls and self-contained agents that coordinate and accelerate these validations within clear governance frameworks. Only then will validation cease to be a set of disconnected tests and become the continuous evidence that security decisions need.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...