Technology company IBM introduced new cybersecurity measures to help enterprises defend against AI-driven cyberattacks, as threat actors begin using advanced or “agentic” artificial intelligence (AI) to automate and scale attacks.
IBM said attackers are already using frontier AI models to speed up every stage of the attack lifecycle, from reconnaissance to exploitation. This reduces the time, cost, and technical skill needed to carry out complex cyberattacks, raising the risk of continuous disruption for businesses.
IBM said the shift to AI-driven threats marks a turning point for cybersecurity, where speed and coordination across systems will determine how well organizations can defend against increasingly automated attacks.
Enterprises, which often run large and complex IT environments, are particularly exposed. These systems can be difficult to fully map or secure, making it easier for AI-powered tools to find vulnerabilities and turn them into attack paths.
To help organizations assess their readiness, IBM Consulting is offering a new cybersecurity assessment. The service evaluates security gaps, policy weaknesses, and AI-related risks, while identifying possible exploit paths. It also provides prioritized recommendations and temporary safeguards where immediate fixes are not available.
“Frontier models are creating a new category of enterprise threat that is fast moving, systemic and increasingly autonomous,” said Mark Hughes, global managing partner of Cybersecurity Services, IBM Consulting. “Meeting that threat requires a systemic defense. AI powered offense demands AI powered defense.”
The assessment also highlights ways to improve threat detection and response through automation and better system alignment.
IBM also introduced IBM Autonomous Security, a service that uses multiple AI agents to coordinate cybersecurity tasks at machine speed. The system acts across an organization’s entire security stack, connecting tools and processes that are often siloed.
The service analyzes software vulnerabilities and live environments, enforces security policies, detects unusual activity, and responds to threats with minimal human input. It also feeds real-time insights into governance and risk systems to help companies maintain compliance and reduce exposure time.
By linking security operations with identity, risk, and governance functions, IBM said the system can improve response times, reduce operational complexity, and strengthen overall resilience.