AI Security Crisis: Jailbreaks, Prompt Injection & How to Protect Your Agents

Agentic AI Institute · Intermediate ·📰 AI News & Updates ·2mo ago
Sign up to get my learning resources: https://forms.gle/sRNjXnsurNxNAUQW7 2026 was predicted to be the year of agentic AI moving into enterprise production. But there’s one problem: - AI agents are failing publicly. - Jailbreaks are succeeding. - Prompt injection is real. - Trust is eroding. In this session, we break down the real AI security crisis and what product managers, founders, and builders must do before shipping agents. You’ll learn: • Why jailbreaking is an arms race • What prompt injection really is (and why it’s dangerous) • DeepSeek’s 100% jailbreak success case • Devon AI security failures • OpenClaw risks and credential takeover paths • Why LLM security is structurally hard • Why guardrails alone don’t work • The OWASP #1 LLM threat in 2025 • 3 practical remedies: Architecture, Red Teaming, AI SecOps • How to attack your own AI agent using Azure + Pirate • How to run real red team simulations This session is essential for: • AI Product Managers • Agent builders • Security engineers • Startup founders • Anyone shipping AI into production Security is not a feature you bolt on later. If you’re building AI agents without red teaming them, you’re gambling with trust. 00:00 – 2026: The year of agentic AI… but trust is breaking 03:20 – Why AI security failures are costing real money 06:10 – Jailbreaking explained (DAN attack & DeepSeek case) 11:30 – Why performance ≠ security 14:00 – Prompt injection explained (and why it’s worse) 18:30 – Devon AI security failure case study 23:40 – OpenClaw risks and real exploit paths 28:20 – Why AI security is structurally hard 33:00 – Why probabilistic guardrails fail 37:10 – The 3 remedies: Architecture, Red Teaming, AI SecOps 40:00 – KEL architecture (Dual LLM separation model) 46:30 – Red teaming tools (Microsoft, Nvidia, DeepTeam) 49:30 – AI SecOps: Monitoring, lifecycle, governance 54:00 – Live demo: Attacking an AI agent using Azure 59:30 – How jailbreak prompts bypass guardrails 01:04:00 – Reviewing atta
Watch on YouTube ↗ (saves to browser)
Sign in to unlock AI tutor explanation · ⚡30

Related AI Lessons

AI Might Not Bring On A Job Crisis, But A Workforce ‘Mismatch’ Could
AI may not cause a job crisis, but a workforce mismatch could lead to 8% unemployment, emphasizing the need for adaptation in various fields
Forbes Innovation
Grok’s federal stall is undercutting SpaceX’s IPO growth story
SpaceX's IPO growth story is threatened by Grok's declining performance, including decreased downloads and stalled federal deals
The Next Web AI
Taiwan moves to detain three over alleged illegal high-end AI server exports to China
Taiwan investigates alleged illegal exports of high-end AI servers to China, highlighting the importance of semiconductor export controls
The Next Web AI
Top 10 AI Development Companies in Leicester UK (2026)
Discover top AI development companies in Leicester, UK, and learn how they're transforming businesses
Medium · AI

Chapters (16)

2026: The year of agentic AI… but trust is breaking
3:20 Why AI security failures are costing real money
6:10 Jailbreaking explained (DAN attack & DeepSeek case)
11:30 Why performance ≠ security
14:00 Prompt injection explained (and why it’s worse)
18:30 Devon AI security failure case study
23:40 OpenClaw risks and real exploit paths
28:20 Why AI security is structurally hard
33:00 Why probabilistic guardrails fail
37:10 The 3 remedies: Architecture, Red Teaming, AI SecOps
40:00 KEL architecture (Dual LLM separation model)
46:30 Red teaming tools (Microsoft, Nvidia, DeepTeam)
49:30 AI SecOps: Monitoring, lifecycle, governance
54:00 Live demo: Attacking an AI agent using Azure
59:30 How jailbreak prompts bypass guardrails
1:04:00 Reviewing atta
Up next
Brutally Honest AI Advice
Tina Huang
Watch →