{"id":115109,"date":"2025-08-11T10:00:35","date_gmt":"2025-08-11T10:00:35","guid":{"rendered":"https:\/\/wp.eastgate-software.com\/?p=115109"},"modified":"2026-04-01T15:22:49","modified_gmt":"2026-04-01T08:22:49","slug":"ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture","status":"publish","type":"post","link":"https:\/\/wp.eastgate-software.com\/de\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\/","title":{"rendered":"KI-Agenten und menschliche Risiken erfordern eine neue Cybersicherheitsarchitektur"},"content":{"rendered":"<p><span data-contrast=\"auto\">Die Cybersicherheitslandschaft entwickelt sich rasant, angetrieben durch den Anstieg KI-gest\u00fctzter Angriffe und das Erstarken hochentwickelter Bedrohungsakteure. Zudem ver\u00e4ndert KI die Vorgehensweise von Cyberkriminellen grundlegend \u2013 sie erm\u00f6glicht umfangreiche, mehrsprachige Phishing-Kampagnen und beschleunigt personalisierte Social-Engineering-Taktiken. <\/span><span data-contrast=\"auto\">Im Jahr 2024 wurden 10 Millionen Phishing-Simulations-E-Mails versendet, und der E-Mail-Betrug in Regionen wie Korea und Japan ist im Jahresvergleich um \u00fcber 301.050 gestiegen.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\"> \u00a0<\/span><span data-contrast=\"auto\">Dhawan argumentiert, dass traditionelle, toolbasierte Ans\u00e4tze f\u00fcr Cybersicherheit nicht mehr tragf\u00e4hig sind. Stattdessen m\u00fcssen Unternehmen eine plattformbasierte Strategie verfolgen, die sich auf drei Kernfunktionen konzentriert: Pr\u00e4vention, Erkennung und Reaktion sowie Secure Access Service Edge (SASE). <\/span><\/p>\n<p><span data-contrast=\"auto\">Kern dieser Architektur ist der Schutz des Menschen \u2013 das Hauptziel moderner Cyberbedrohungen. Laut dem j\u00fcngsten globalen Bericht von Verizon sind fast 751.050 Sicherheitsl\u00fccken auf menschliches Versagen oder Manipulation zur\u00fcckzuf\u00fchren.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Die wichtigsten Erkenntnisse sind:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">K\u00fcnstliche Intelligenz erm\u00f6glicht Cyberangriffe in gro\u00dfem Umfang, wobei h\u00e4ufig lokale Sprachen und digitale Identit\u00e4ten ausgenutzt werden.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Die meisten Datenpannen werden durch menschliches Verhalten verursacht, nicht durch Schadsoftware.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">Pr\u00e4ventive Ma\u00dfnahmen wie die Analyse des Nutzerverhaltens, spielerische Schulungen und der Schutz der Identit\u00e4t sind von entscheidender Bedeutung.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559683&quot;:0,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">Eine strategische, auf den Menschen ausgerichtete Cyber-Roadmap muss mehrschichtige Verteidigungsplattformen und keine voneinander getrennten Werkzeuge umfassen.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Dhawan warnt davor, sich von aufsehenerregenden Deepfakes ablenken zu lassen, und fordert CISOs auf, sich zun\u00e4chst mit grundlegenden Bedrohungen auseinanderzusetzen. Er empfiehlt die Entwicklung einer Cybersicherheitsstrategie, die Bedrohungspr\u00e4vention, Datenverlustminderung und Risikomessung in eine einheitliche Architektur integriert. Proofpoint, das im asiatisch-pazifischen Raum, unter anderem in Singapur und Australien, eigene Rechenzentren betreibt, verzeichnet ein regionales Wachstum, das 2,5- bis 3-mal so hoch ist wie der globale Durchschnitt.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Da KI-Agenten sowohl bei Angriffen als auch bei der Verteidigung eine zentrale Rolle spielen, m\u00fcssen Organisationen einheitliche Cyberplattformen und menschliche Risikoanalysen priorisieren, um in einer sich rasch ausdehnenden Bedrohungslandschaft die Nase vorn zu behalten.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Quelle:<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.itnews.asia\/news\/proofpoint-ceo-a-tool-based-approach-for-cybersecurity-is-impractical-619394\"><span data-contrast=\"none\">https:\/\/www.itnews.asia\/news\/proofpoint-ceo-a-tool-based-approach-for-cybersecurity-is-impractical-619394<\/span><\/a> <span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>The cybersecurity landscape is evolving rapidly, driven by the surge in AI-powered attacks and the rise of sophisticated threat actors. Additionally. AI is reshaping how cybercriminals operate\u2014enabling high-volume, multilingual phishing campaigns and accelerating personalized social engineering tactics. 10 million phishing simulation emails were sent in 2024, and email fraud in regions like Korea and Japan [&hellip;]<\/p>","protected":false},"author":238283293,"featured_media":115111,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1584],"tags":[1564,1538],"class_list":["post-115109","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-enthusiast","tag-ai-agent","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>AI Agents and Human Risk Demand a New Cybersecurity Architecture - Eastgate Software<\/title>\n<meta name=\"description\" content=\"Proofpoint CEO warns that AI-powered cyber threats are growing rapidly, urging a shift from tool-based defense.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI Agents and Human Risk Demand a New Cybersecurity Architecture\" \/>\n<meta property=\"og:description\" content=\"Proofpoint CEO warns that AI-powered cyber threats are growing rapidly, urging a shift from tool-based defense.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wp.eastgate-software.com\/de\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\/\" \/>\n<meta property=\"og:site_name\" content=\"Eastgate Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EastgateSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-11T10:00:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T08:22:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/08\/Sen-news-website-6.webp?fit=1366%2C768&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"huongnguyen253\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:site\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"huongnguyen253\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\\\/\"},\"author\":{\"name\":\"huongnguyen253\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\"},\"headline\":\"AI Agents and Human Risk Demand a New Cybersecurity Architecture\",\"datePublished\":\"2025-08-11T10:00:35+00:00\",\"dateModified\":\"2026-04-01T08:22:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\\\/\"},\"wordCount\":287,\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Sen-news-website-6.webp?fit=1366%2C768&ssl=1\",\"keywords\":[\"AI Agent\",\"cybersecurity\"],\"articleSection\":[\"Tech Enthusiast\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\\\/\",\"name\":\"AI Agents and Human Risk Demand a New Cybersecurity Architecture - Eastgate Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Sen-news-website-6.webp?fit=1366%2C768&ssl=1\",\"datePublished\":\"2025-08-11T10:00:35+00:00\",\"dateModified\":\"2026-04-01T08:22:49+00:00\",\"description\":\"Proofpoint CEO warns that AI-powered cyber threats are growing rapidly, urging a shift from tool-based defense.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Sen-news-website-6.webp?fit=1366%2C768&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/Sen-news-website-6.webp?fit=1366%2C768&ssl=1\",\"width\":1366,\"height\":768,\"caption\":\"AI Agents and Human Risk Demand a New Cybersecurity Architecture\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI Agents and Human Risk Demand a New Cybersecurity Architecture\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"name\":\"Eastgate Software\",\"description\":\"A Global Fortune 500 Company&#039;s Strategic Partner\",\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wp.eastgate-software.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\",\"name\":\"Eastgate Software\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"contentUrl\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"width\":124,\"height\":36,\"caption\":\"Eastgate Software\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EastgateSoftware\\\/\",\"https:\\\/\\\/x.com\\\/EastgateSoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\",\"name\":\"huongnguyen253\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"caption\":\"huongnguyen253\"},\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/de\\\/author\\\/huongnguyen253\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI Agents and Human Risk Demand a New Cybersecurity Architecture - Eastgate Software","description":"Proofpoint CEO warns that AI-powered cyber threats are growing rapidly, urging a shift from tool-based defense.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"de_DE","og_type":"article","og_title":"AI Agents and Human Risk Demand a New Cybersecurity Architecture","og_description":"Proofpoint CEO warns that AI-powered cyber threats are growing rapidly, urging a shift from tool-based defense.","og_url":"https:\/\/wp.eastgate-software.com\/de\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\/","og_site_name":"Eastgate Software","article_publisher":"https:\/\/www.facebook.com\/EastgateSoftware\/","article_published_time":"2025-08-11T10:00:35+00:00","article_modified_time":"2026-04-01T08:22:49+00:00","og_image":[{"width":1366,"height":768,"url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/08\/Sen-news-website-6.webp?fit=1366%2C768&ssl=1","type":"image\/webp"}],"author":"huongnguyen253","twitter_card":"summary_large_image","twitter_creator":"@EastgateSoft","twitter_site":"@EastgateSoft","twitter_misc":{"Verfasst von":"huongnguyen253","Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wp.eastgate-software.com\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\/#article","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\/"},"author":{"name":"huongnguyen253","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a"},"headline":"AI Agents and Human Risk Demand a New Cybersecurity Architecture","datePublished":"2025-08-11T10:00:35+00:00","dateModified":"2026-04-01T08:22:49+00:00","mainEntityOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\/"},"wordCount":287,"publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/08\/Sen-news-website-6.webp?fit=1366%2C768&ssl=1","keywords":["AI Agent","cybersecurity"],"articleSection":["Tech Enthusiast"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/wp.eastgate-software.com\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\/","url":"https:\/\/wp.eastgate-software.com\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\/","name":"AI Agents and Human Risk Demand a New Cybersecurity Architecture - Eastgate Software","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\/#primaryimage"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/08\/Sen-news-website-6.webp?fit=1366%2C768&ssl=1","datePublished":"2025-08-11T10:00:35+00:00","dateModified":"2026-04-01T08:22:49+00:00","description":"Proofpoint CEO warns that AI-powered cyber threats are growing rapidly, urging a shift from tool-based defense.","breadcrumb":{"@id":"https:\/\/wp.eastgate-software.com\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wp.eastgate-software.com\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/wp.eastgate-software.com\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\/#primaryimage","url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/08\/Sen-news-website-6.webp?fit=1366%2C768&ssl=1","contentUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/08\/Sen-news-website-6.webp?fit=1366%2C768&ssl=1","width":1366,"height":768,"caption":"AI Agents and Human Risk Demand a New Cybersecurity Architecture"},{"@type":"BreadcrumbList","@id":"https:\/\/wp.eastgate-software.com\/ai-agents-and-human-risk-demand-a-new-cybersecurity-architecture\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wp.eastgate-software.com\/"},{"@type":"ListItem","position":2,"name":"AI Agents and Human Risk Demand a New Cybersecurity Architecture"}]},{"@type":"WebSite","@id":"https:\/\/wp.eastgate-software.com\/#website","url":"https:\/\/wp.eastgate-software.com\/","name":"Eastgate Software","description":"Strategischer Partner eines globalen Fortune-500-Unternehmens","publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wp.eastgate-software.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/wp.eastgate-software.com\/#organization","name":"Eastgate Software","url":"https:\/\/wp.eastgate-software.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/","url":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","contentUrl":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","width":124,"height":36,"caption":"Eastgate Software"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EastgateSoftware\/","https:\/\/x.com\/EastgateSoft"]},{"@type":"Person","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a","name":"huongnguyen253","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","caption":"huongnguyen253"},"url":"https:\/\/wp.eastgate-software.com\/de\/author\/huongnguyen253\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2025\/08\/Sen-news-website-6.webp?fit=1366%2C768&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pf8Ne8-tWB","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/115109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/users\/238283293"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/comments?post=115109"}],"version-history":[{"count":5,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/115109\/revisions"}],"predecessor-version":[{"id":119877,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/posts\/115109\/revisions\/119877"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/media\/115111"}],"wp:attachment":[{"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/media?parent=115109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/categories?post=115109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/de\/wp-json\/wp\/v2\/tags?post=115109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}