{"id":564442,"date":"2026-05-21T05:42:18","date_gmt":"2026-05-21T05:42:18","guid":{"rendered":"https:\/\/www.capgemini.com\/mx-es\/?p=564442&#038;preview=true&#038;preview_id=564442"},"modified":"2026-05-21T05:42:34","modified_gmt":"2026-05-21T05:42:34","slug":"the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits","status":"publish","type":"post","link":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/","title":{"rendered":"The security stack is being rewritten for the agentic era: Your security transformation awaits"},"content":{"rendered":"\n<header class=\"wp-block-cg-blocks-hero-blogs header-hero-blogs\"><div class=\"container\"><div class=\"hero-blogs\"><div class=\"hero-blogs-content-wrapper\"><div class=\"row\"><div class=\"col-12\"><div class=\"header-title\"><h1><em>The security stack is being rewritten for the agentic era: Your security transformation awaits<\/em><\/h1><\/div><\/div><\/div><\/div><div class=\"hero-blogs-bottom\"><div class=\"header-author\"><div class=\"author-img\"><img decoding=\"async\" src=\"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/08\/Mona-Ghadiri.jpg?w=200&amp;quality=10\" alt=\"\" loading=\"lazy\"\/><\/div><div class=\"author-name-date\"><h5 class=\"author-name\">Mona Ghadiri<\/h5><h5 class=\"blog-date\">May 14, 2026<\/h5><\/div><\/div><div class=\"brand-image\"><\/div><\/div><\/div><\/div><\/header>\n\n\n\n<section class=\"wp-block-cg-blocks-group section section--article-content\"><div class=\"article-main-content\"><div class=\"container\"><div class=\"grid-container\"><div class=\"col-12 col-md-2\"><nav class=\"article-social\"><ul class=\"social-nav\"><li class=\"ip-order-fb\"><a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https:\/\/www.capgemini.com\/?p=1220196&amp;preview=true&amp;preview_id=1220196\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-fb\"><\/i><span class=\"sr-only\">Facebook<\/span><\/a><\/li><li class=\"ip-order-li\"><a href=\"https:\/\/www.linkedin.com\/shareArticle?url=https:\/\/www.capgemini.com\/?p=1220196&amp;preview=true&amp;preview_id=1220196\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"opens in a new window\"><i aria-hidden=\"true\" class=\"icon-li\"><\/i><span class=\"sr-only\">Linkedin<\/span><\/a><\/li><\/ul><\/nav><\/div><div><div class=\"article-text article-quote-text\">\n\n<h3 class=\"wp-block-heading\" id=\"h-how-ai-agents-are-reshaping-identity-endpoints-cloud-and-security-operations-and-what-leaders-must-do-next\"><strong><em>How AI agents are reshaping identity, endpoints, cloud, and security operations, and what leaders must do next<\/em><\/strong><\/h3>\n\n\n<p>AI agents are no longer experimental. They are writing code, handling service requests, querying sensitive data, and acting autonomously across enterprise systems. According to the Capgemini Research Institute,<a href=\"https:\/\/www.capgemini.com\/insights\/research-library\/ai-agents\/\">14% of organizations <\/a>have already deployed AI agents at partial or full scale, 23% are running pilots, and 61% are actively exploring adoption \u2013 a level of momentum rarely seen for an emerging technology.<\/p>\n\n\n<p>As adoption accelerates, security teams are confronting a fundamental truth: security architectures designed for humans, servers, and static software cannot govern autonomous systems. With only <a href=\"https:\/\/www.capgemini.com\/insights\/research-library\/ai-agents\/\">27% of organizations<\/a> saying they trust fully autonomous AI agents today, down from 43% just a year ago<em>,<\/em> governance and security have become gating factors for scale.<\/p>\n\n\n<p>Across identity, cloud, endpoints, and security operations, markets are shifting fast. Here are the six most important changes security leaders need to understand, and why they matter.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"h-1-agentic-identity-is-becoming-core-infrastructure\"><strong>1. Agentic identity is becoming core infrastructure<\/strong><\/h4>\n\n\n<p>Identity has officially moved beyond humans and service accounts.<\/p>\n\n\n<p>Enterprises want to greenlight AI agents, but only if they can understand <strong>at runtime <\/strong>what those agents are doing, which tools and data they touch, and which identity ultimately sits behind each action. As a result, agent governance and access control are becoming baseline requirements, not future enhancements.<\/p>\n\n\n<p>A new model is emerging, too: intent\u2011based access control for agents. Instead of standing privileges, agents receive temporary, tightly scoped permissions tied to a specific task \u2013 similar to how privileged access management (PAM) evolved for humans, but faster.<\/p>\n\n\n<p><strong>Why it matters:<\/strong><br>Identity is now the control plane for autonomy. Agents must be treated as first\u2011class identities, with auditability, runtime oversight, and fine\u2011grained controls baked in from day one in order to survive even the most basic of AI Center of Excellence (CoE) approvals.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"h-2-agentic-endpoint-security-is-a-new-battleground\"><strong>2. Agentic endpoint security is a new battleground<\/strong><\/h4>\n\n\n<p>Traditional endpoint security was designed to monitor files, processes, and binaries. AI agents are changing that equation.<\/p>\n\n\n<p>Agent skills, packages, and Model Context Protocols (MCPs) often operate entirely outside classic EDR visibility. At the same time, non\u2011technical employees can now spin up powerful, non\u2011vetted \u201csoftware\u201d simply by delegating tasks to agents.<\/p>\n\n\n<p>This has sparked a new wave of innovation: vendors focused on securing non\u2011binary software and agentic applications. In parallel, advances in hardware and edge AI are enabling always\u2011on security copilots at the endpoint, changing the attack vectors and exfiltration styles.<\/p>\n\n\n<p><strong>Why it matters:<\/strong><br>Endpoint security must evolve from controlling executables to understanding agent behavior, decision\u2011making, and intent.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"h-3-ai-native-security-markets-are-converging-then-splitting\"><strong>3. AI\u2011native security markets are converging, then splitting<\/strong><\/h4>\n\n\n<p>Last year, AI SOC platforms and managed detection and response (MDR) providers were seen as distinct markets. That distinction has collapsed.<\/p>\n\n\n<p><a href=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/02\/AI-Agents_web_160226-1.pdf\">Our research shows<\/a> organizations are struggling with skills shortages, data overload, and operational complexity, making people-plus-AI service models more attractive as autonomy grows.<\/p>\n\n\n<p>AI SOC vendors are increasingly layering in people\u2011led services, while MDR providers are embedding AI\u2011native detection, investigation, and response capabilities. The center of gravity is shifting decisively toward MDR.<\/p>\n\n\n<p>But the next phase will be divergence. Some vendors will double down on deep SecOps capabilities, while others expand into managed and advisory services \u2013 covering incident response, IR readiness, security assessments, and co\u2011managed SIEMs.<\/p>\n\n\n<p><strong>Why it matters:<\/strong><br>MDR becomes the anchor, but vendor strategies will diverge rapidly. Buyers will need to choose between depth, breadth, or a carefully balanced blend of both.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"h-4-cloud-security-must-fully-shift-to-runtime\"><strong>4. Cloud security must fully shift to runtime<\/strong><\/h4>\n\n\n<p>Static, snapshot\u2011based cloud security can\u2019t keep pace with agent\u2011driven environments.<\/p>\n\n\n<p>AI agents change infrastructure continuously, deploying resources, modifying configurations, and interacting with services in real time. In this world, visibility after the fact is no longer sufficient.<\/p>\n\n\n<p>Runtime\u2011centric cloud security platforms are becoming essential \u2013 not just for detection, but for response at machine speed. A new layer is also emerging: AI\u2011driven cloud control planes that design and enforce security controls before workloads even reach production.<\/p>\n\n\n<p><strong>Why it matters:<\/strong><br>Cloud security is moving from posture management to continuous runtime prevention and control.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"h-5-security-data-architectures-are-under-real-pressure\"><strong>5. Security data architectures are under real pressure<\/strong><\/h4>\n\n\n<p>AI agents generate enormous volumes of telemetry, logs, queries, and decision trails that dwarf traditional security workloads. Existing SIEM architectures are struggling to keep up, both technically and economically. Our research also highlights that over <a href=\"https:\/\/www.capgemini.com\/wp-content\/uploads\/2026\/02\/AI-Agents_web_160226-1.pdf\">80% of organizations lack mature AI infrastructure,<\/a> creating both scalability and cost barriers as agent-driven telemetry explodes.<\/p>\n\n\n<p>As a result, new approaches are gaining traction:<\/p>\n\n\n<ul class=\"wp-block-list\">\n\n<li>High\u2011performance, lower\u2011cost security data lakes<\/li>\n\n\n<li>Federated querying models where data stays in place<\/li>\n\n\n<li>Agent\u2011driven detection engineering that continuously creates, tunes, and operationalizes detections and threat intelligence<\/li>\n\n<\/ul>\n\n\n<p>Security data architecture is no longer an afterthought; it\u2019s becoming a strategic design decision.<\/p>\n\n\n<p><strong>Why it matters:<\/strong><br>Without rethinking data foundations, AI\u2011driven security quickly becomes cost\u2011prohibitive or operationally brittle.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"h-6-offensive-and-defensive-security-are-collapsing-into-singular-platforms\"><strong>6. Offensive and defensive security are collapsing into singular platforms<\/strong><\/h4>\n\n\n<p>The line between red team and blue team tooling is eroding.<\/p>\n\n\n<p>Agentic penetration testing now spans both networks and applications, using the same underlying sensors. Offensive insights, once siloed, are increasingly feeding detection logic, alert tuning, and automated response workflows.<\/p>\n\n\n<p>What\u2019s emerging are unified platforms where the same telemetry powers testing, detection, and response.<\/p>\n\n\n<p><strong>Why it matters:<\/strong><br>Security programs gain speed and resilience when offense and defense reinforce each other instead of operating in isolation. Threat and exposure management is the new way forward.<\/p>\n\n\n<h4 class=\"wp-block-heading\" id=\"h-final-takeaway-security-must-become-agent-aware-adaptive-and-continuous\"><strong>Final takeaway: Security must become agent\u2011aware, adaptive, and continuous<\/strong><\/h4>\n\n\n<p>The rise of AI agents isn\u2019t just adding another tool to the stack. It is reshaping the foundations of security.<\/p>\n\n\n<p>Identity becomes intent\u2011driven. Endpoints become behavioral. Cloud security shifts to runtime. Data architectures must scale by design. And security operations converge, then specialize, around new centers of gravity. For security leaders, the mandate is clear: build programs that move at the speed of autonomy and build trust through process without sacrificing trust, visibility, or governance.<\/p>\n\n<\/div><\/div><\/div><\/div><\/div><\/section>\n\n\n\n<section class=\" section section--expert-slider wrapper-people-slider wp-block-cg-blocks-wrapper-people-slider\"><div class=\"container\"><div class=\"row\"><div class=\"content-title col-12 col-md-8\"><h2 data-maxlength=\"34\" class=\"people-heading-title\">About the expert<\/h2><\/div><\/div><\/div><div class=\"slider slider-boxed\"><div class=\"container\"><div class=\"slider-window\"><div class=\"slider-list\">\t\t<div class=\"slide\">\n\t\t\t<div class=\"box\">\n\t\t\t\t<div class=\"row\">\n\t\t\t\t\t<div class=\"col-md-6 col-lg-4 box-img-wrapper\">\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/08\/Mona-Ghadiri.jpg\" alt=\"Mona Ghadiri\"\/>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"col-md-6 col-lg-8 box-inner\">\n\t\t\t\t\t\t<div class=\"row title-social-media-header\">\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 mbl-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 box-container\">\n\t\t\t\t\t\t\t\t<div class=\"box-title\">\n\t\t\t\t\t\t\t\t\t<h3 class=\"people-profile-title\">Mona Ghadiri<\/h3>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>Vice President \u2013 Cybersecurity Portfolio, Cloud Infrastructure Services<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"col-md-12 col-lg-6 social-box-container dkt-social-icon\">\n\t\t\t\t\t\t\t\t<ul class=\"social-nav\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"people-info\">Mona is a three-time Microsoft Security MVP, recognized for expertise in SIEM, XDR, and Security Copilot. She has led development of Microsoft-based cyber services and now focuses on SOC transformation, pragmatic AI in security, and talent development. A global speaker and advocate for women in AI and cybersecurity, she serves on multiple Microsoft community boards. Mona holds a BA and MBA and brings a unique blend of product leadership, engineering, and industry recognition.<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div><\/div><\/div><div class=\"slider-nav\"><button class=\"slider-prev inactive\" aria-label=\"Slider-previous\" tabindex=\"-1\"><\/button><ul class=\"slider-paginator\"><\/ul><button class=\"slider-next\" aria-label=\"Slider-next\"><\/button><\/div><\/div><\/section>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AI agents are no longer experimental. They are writing code, handling service requests, querying sensitive data, and acting autonomously across enterprise systems. <\/p>\n","protected":false},"author":12549,"featured_media":564443,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cg_dt_proposed_to":[],"cg_seo_hreflang_relations":"[]","cg_seo_canonical_relation":"","cg_seo_hreflang_x_default_relation":"","cg_dt_approved_content":true,"cg_dt_mandatory_content":false,"cg_dt_notes":"","cg_dg_source_changed":false,"cg_dt_link_disabled":false,"_yoast_wpseo_primary_brand":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","featured_focal_points":""},"categories":[1],"tags":[],"brand":[],"service":[101],"industry":[],"partners":[],"blog-topic":[48],"content-group":[],"class_list":["post-564442","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","service-cybersecurity","blog-topic-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The security stack is being rewritten for the agentic era: Your security transformation awaits - Capgemini Mexico<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The security stack is being rewritten for the agentic era: Your security transformation awaits\" \/>\n<meta property=\"og:description\" content=\"AI agents are no longer experimental. They are writing code, handling service requests, querying sensitive data, and acting autonomously across enterprise systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/\" \/>\n<meta property=\"og:site_name\" content=\"Capgemini Mexico\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-21T05:42:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-21T05:42:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/10\/New-Web-preview-global.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mona Ghadiri\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tanujadey\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/\"},\"author\":{\"name\":\"tanujadey\",\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/#\/schema\/person\/14c4f55893c68c201e6b3f82558198b7\"},\"headline\":\"The security stack is being rewritten for the agentic era: Your security transformation awaits\",\"datePublished\":\"2026-05-21T05:42:18+00:00\",\"dateModified\":\"2026-05-21T05:42:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/\"},\"wordCount\":1014,\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2026\/05\/web-banners-2025.jpg\",\"inLanguage\":\"es-MX\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/\",\"url\":\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/\",\"name\":\"The security stack is being rewritten for the agentic era: Your security transformation awaits - Capgemini Mexico\",\"isPartOf\":{\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2026\/05\/web-banners-2025.jpg\",\"datePublished\":\"2026-05-21T05:42:18+00:00\",\"dateModified\":\"2026-05-21T05:42:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/#breadcrumb\"},\"inLanguage\":\"es-MX\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-MX\",\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/#primaryimage\",\"url\":\"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2026\/05\/web-banners-2025.jpg\",\"contentUrl\":\"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2026\/05\/web-banners-2025.jpg\",\"width\":2880,\"height\":1800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.capgemini.com\/mx-es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The security stack is being rewritten for the agentic era: Your security transformation awaits\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/#website\",\"url\":\"https:\/\/www.capgemini.com\/mx-es\/\",\"name\":\"Capgemini Mexico\",\"description\":\"Capgemini\",\"publisher\":{\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.capgemini.com\/mx-es\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es-MX\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/#organization\",\"name\":\"Capgemini Mexico\",\"url\":\"https:\/\/www.capgemini.com\/mx-es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-MX\",\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/07\/linkedin_mwo0q6.png\",\"contentUrl\":\"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/07\/linkedin_mwo0q6.png\",\"width\":800,\"height\":800,\"caption\":\"Capgemini Mexico\"},\"image\":{\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.capgemini.com\/mx-es\/#\/schema\/person\/14c4f55893c68c201e6b3f82558198b7\",\"name\":\"tanujadey\",\"url\":\"https:\/\/www.capgemini.com\/mx-es\/author\/tanujadey\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The security stack is being rewritten for the agentic era: Your security transformation awaits - Capgemini Mexico","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/","og_locale":"es_MX","og_type":"article","og_title":"The security stack is being rewritten for the agentic era: Your security transformation awaits","og_description":"AI agents are no longer experimental. They are writing code, handling service requests, querying sensitive data, and acting autonomously across enterprise systems.","og_url":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/","og_site_name":"Capgemini Mexico","article_published_time":"2026-05-21T05:42:18+00:00","article_modified_time":"2026-05-21T05:42:34+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/10\/New-Web-preview-global.jpg","type":"image\/jpeg"}],"author":"Mona Ghadiri","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tanujadey","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/#article","isPartOf":{"@id":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/"},"author":{"name":"tanujadey","@id":"https:\/\/www.capgemini.com\/mx-es\/#\/schema\/person\/14c4f55893c68c201e6b3f82558198b7"},"headline":"The security stack is being rewritten for the agentic era: Your security transformation awaits","datePublished":"2026-05-21T05:42:18+00:00","dateModified":"2026-05-21T05:42:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/"},"wordCount":1014,"publisher":{"@id":"https:\/\/www.capgemini.com\/mx-es\/#organization"},"image":{"@id":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2026\/05\/web-banners-2025.jpg","inLanguage":"es-MX"},{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/","url":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/","name":"The security stack is being rewritten for the agentic era: Your security transformation awaits - Capgemini Mexico","isPartOf":{"@id":"https:\/\/www.capgemini.com\/mx-es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/#primaryimage"},"image":{"@id":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/#primaryimage"},"thumbnailUrl":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2026\/05\/web-banners-2025.jpg","datePublished":"2026-05-21T05:42:18+00:00","dateModified":"2026-05-21T05:42:34+00:00","breadcrumb":{"@id":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/#breadcrumb"},"inLanguage":"es-MX","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/"]}]},{"@type":"ImageObject","inLanguage":"es-MX","@id":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/#primaryimage","url":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2026\/05\/web-banners-2025.jpg","contentUrl":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2026\/05\/web-banners-2025.jpg","width":2880,"height":1800},{"@type":"BreadcrumbList","@id":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.capgemini.com\/mx-es\/"},{"@type":"ListItem","position":2,"name":"The security stack is being rewritten for the agentic era: Your security transformation awaits"}]},{"@type":"WebSite","@id":"https:\/\/www.capgemini.com\/mx-es\/#website","url":"https:\/\/www.capgemini.com\/mx-es\/","name":"Capgemini Mexico","description":"Capgemini","publisher":{"@id":"https:\/\/www.capgemini.com\/mx-es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.capgemini.com\/mx-es\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es-MX"},{"@type":"Organization","@id":"https:\/\/www.capgemini.com\/mx-es\/#organization","name":"Capgemini Mexico","url":"https:\/\/www.capgemini.com\/mx-es\/","logo":{"@type":"ImageObject","inLanguage":"es-MX","@id":"https:\/\/www.capgemini.com\/mx-es\/#\/schema\/logo\/image\/","url":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/07\/linkedin_mwo0q6.png","contentUrl":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/07\/linkedin_mwo0q6.png","width":800,"height":800,"caption":"Capgemini Mexico"},"image":{"@id":"https:\/\/www.capgemini.com\/mx-es\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.capgemini.com\/mx-es\/#\/schema\/person\/14c4f55893c68c201e6b3f82558198b7","name":"tanujadey","url":"https:\/\/www.capgemini.com\/mx-es\/author\/tanujadey\/"}]}},"blog_topic_info":[{"id":48,"name":"Cybersecurity"}],"taxonomy_info":{"category":[{"id":1,"name":"Uncategorized","slug":"uncategorized"}],"service":[{"id":101,"name":"Cybersecurity","slug":"cybersecurity"}],"blog-topic":[{"id":48,"name":"Cybersecurity","slug":"cybersecurity"}],"following_users":[{"id":683,"name":"tanujadey","slug":"tanujadey"},{"id":224,"name":"vikramjanugade","slug":"vikramjanugade"}]},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"The security stack is being rewritten for the agentic era: Your security transformation awaits","url":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/"},"thumbnailUrl":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2026\/05\/web-banners-2025.jpg?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2026\/05\/web-banners-2025.jpg"},"articleSection":"Uncategorized","author":[],"creator":[],"publisher":{"@type":"Organization","name":"Capgemini Mexico","logo":""},"keywords":[],"dateCreated":"2026-05-21T05:42:18Z","datePublished":"2026-05-21T05:42:18Z","dateModified":"2026-05-21T05:42:34Z"},"rendered":"<meta name=\"parsely-title\" content=\"The security stack is being rewritten for the agentic era: Your security transformation awaits\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/www.capgemini.com\/mx-es\/insights\/expert-perspectives\/the-security-stack-is-being-rewritten-for-the-agentic-era-your-security-transformation-awaits\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2026\/05\/web-banners-2025.jpg?w=150&amp;h=150&amp;crop=1\" \/>\n<meta name=\"parsely-pub-date\" content=\"2026-05-21T05:42:18Z\" \/>\n<meta name=\"parsely-section\" content=\"Uncategorized\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/capgemini.com\/p.js"},"jetpack_featured_media_url":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2026\/05\/web-banners-2025.jpg","archive_status":false,"featured_image_src":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2026\/05\/web-banners-2025.jpg","featured_image_alt":"","jetpack_sharing_enabled":true,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Capgemini Mexico","distributor_original_site_url":"https:\/\/www.capgemini.com\/mx-es","push-errors":false,"featured_image_url":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2026\/05\/web-banners-2025.jpg","author_title":"Mona Ghadiri","author_thumbnail_url":"https:\/\/www.capgemini.com\/mx-es\/wp-content\/uploads\/sites\/28\/2025\/08\/Mona-Ghadiri.jpg?w=544","author_thumbnail_alt":"","_links":{"self":[{"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/posts\/564442","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/users\/12549"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/comments?post=564442"}],"version-history":[{"count":1,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/posts\/564442\/revisions"}],"predecessor-version":[{"id":564447,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/posts\/564442\/revisions\/564447"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/media\/564443"}],"wp:attachment":[{"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/media?parent=564442"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/categories?post=564442"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/tags?post=564442"},{"taxonomy":"brand","embeddable":true,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/brand?post=564442"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/service?post=564442"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/industry?post=564442"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/partners?post=564442"},{"taxonomy":"blog-topic","embeddable":true,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/blog-topic?post=564442"},{"taxonomy":"content-group","embeddable":true,"href":"https:\/\/www.capgemini.com\/mx-es\/wp-json\/wp\/v2\/content-group?post=564442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}