Amazon has revealed Invincible has been renewed for a fifth season.
The announcement, which was made on the adult animated show's social media channels yesterday (July 17), confirms Invincible season 4 won't be its final entry. Considering how popular the critically-acclaimed Prime Video series is, that's no great surprise, but it's nonetheless pleasing to hear that Mark Grayson's story will continue on one of the world's best streaming services.
Season 5, Mark... this is GOOD NEWS pic.twitter.com/Kft2aTuS5SJuly 17, 2025
Interestingly, Amazon also revealed that the show's cast had already completed recording their lines for its fifth season.
It's likely, then, that Invincible season 5 could be ready to go in 2027 and maintain Prime Video's recently established plan to release new seasons annually: Invincible season 2 part 1 aired in late 2023, Invincible season 2 part 2 launched in early 2025, and its third and most recent season released earlier this year. Season 4 is set to arrive in 2026, too, so there's no reason to suspect the show's fifth installment won't arrive a year after that.
Which character might be voiced by Matthew Rhys in Invincible season 4?Welsh actor Matthew Rhys has joined the cast for Invincible's fourth season (Image credit: Michael Loccisano)Invincible's latest renewal and the completion of voice work on season 5 weren't the only announcements made in the above video. Indeed, Amazon also revealed that Matthew Rhys (The Americans, Perry Mason) had joined the voice cast for one of the best Prime Video shows' fourth chapter.
Understandably, Rhys' role is being kept under wraps, but that doesn't mean we can't guess which character he'll portray. After all, there are plenty of candidates in the series' graphic novel namesake who've yet to show up in its animated adaptation.
So, who could Rhys be voicing? Grand Regent Thragg is a possibility but, as much as I like Rhys as an actor, I'm not sure he has the gravitas to play the Viltrum Empire's commander-in-chief. J.K. Simmons, who plays Omni-Man, and Jeffrey Dean Morgan, who voices Conquest, have proven that actors with deeper voices are best suited to portray Viltrumites, so I don't think Rhys is the right fit for Thragg.
If he plays a villain, he might be better hamming it up as someone like Dinosaurus – real name David Anders – who's something of an superhuman eco-terrorist and, as his name implies, a formidable shape-shifting humanoid reptile when he's in his dino-form. Dinosaurus is a dangerous albeit silly character, so Rhys might be the perfect fit to play him.
On the more heroic front, Rhys may be the ideal actor for someone like Space Racer or Tech Jacket. We've briefly seen these superpowered beings in past seasons of Invincible, but neither character has uttered a word yet. It's possible, then, that Rhys has been tapped to voice one of them.
I guess we'll find out for sure when Invincible season 4 is eventually released. In the meantime, read the section below for more coverage on the series' latest season.
You might also likeAgents – software systems capable of decision making or performing tasks autonomously - are no longer experimental. Today, these agents are operational, distributed and actively making decisions across the enterprise. From writing code to scheduling tasks, agents are starting to permeate every facet of business. The reason is clear: agents promise significant productivity gains.
Some will be deeply embedded, making them difficult to detect or monitor. Others will operate autonomously, continuously learning and adapting in real time. Many may have broad access privileges in the name of efficiency. This introduces significant potential for both positive impact and risk.
And as adoption grows, many organizations will face a new challenge: securing agents at scale. Businesses will need to ensure that innovation doesn’t outpace security and governance. The stakes are too high; one single misalignment, vulnerability or unintended behavior can lead to a runaway effect of unethical or harmful actions.
We’ve already seen real-world examples of AI failures – sometimes exposing sensitive data or making critical errors. One AI assistant notoriously advised users to eat rocks, and in another case a customer service chatbot deployed by a logistics company began issuing aggressive responses. Both examples show the risk of poor training data – AI agents don’t just learn facts, they learn behaviors, and bad input leads to bad output.
Cloud Déjà vu, Now with AgentsWithout consistent oversight, agents can act outside their intended use and damage brand reputation. That’s why it’s important that security is baked in at the start. Like salt and pepper, you can always sprinkle more on later, but if you forget to add it while cooking, the flavor – and in this case the protection – just won’t be the same. Security must be integrated from the outset, waiting until after deployment to retrofit security is a recipe for vulnerabilities.
Just consider what happened during the mass migration to cloud computing technologies. Adoption led to serious security missteps, data silos and visibility gaps. Gaps that have been and continue to be exploited by attackers today.
Now with agents it’s like a bad case of déjà vu. Once again, innovation is outpacing security. In many cases, these autonomous tools are being integrated into critical systems with limited oversight and lacking proper security and controls.
If we don’t apply the hard lessons learned from the cloud era we risk repeating the same mistakes, but this time with far more unpredictable systems. That’s why security must be at the core of agents.
Securing Every Agent TouchpointBut securing agents requires an expanded approach, one that accounts for autonomous behaviors, including those ongoing interactions with data, systems and users. Agents need a strong trust layer, where every interaction, from API calls to sensitive data handling, must be mapped, protected and governed in real time.
A core part of this trust layer is securing the data agents interact with—inputs, outputs and everything in between. Data is the fuel of agents, and without foundational security that fuel becomes a major risk. Enterprises must focus on the fundamentals like data discovery and classification, encryption and key management.
Access and Identity Management strategies must also evolve as agents take on more advanced roles in the enterprise. Like humans, every agent will require its own unique credentials, roles and permissions to ensure that every interaction is authorized and verified.
Agent credentials should be stored in a secure, automated credential vault, with policies enforcing regular rotation, access logging, and immediate revocation if misuse is detected. Organizations must be able to distinguish between agents using managed or unmanaged credentials.
And once agent credentials are brought under management, it's crucial to protect and enforce proper lifecycle management and governance. By provisioning, rotating, auditing, protecting and decommissioning credentials organizations can reduce the risk of credential misuse and theft.
Without strong identity oversight, businesses risk losing visibility of both human and agent identities and control over autonomous actions.
Decentralized Agents Need Centralized SecurityHowever, at scale, managing agents and especially autonomous ones, will require additional control to monitor behavior, interactions and deviations from policy. Consider a type of agent “security manager” that brings agents and humans on the loop to build trust in how agents operate.
This should be more than a dashboard, rather intelligence capable of understanding what agents are doing, why they’re doing it and whether their behavior aligns with policies and risk thresholds on a constant basis. It flags anomalies, enforces constraints and enables human review, when needed.
That last part is particularly important. Human oversight remains essential, especially when scaling agents. This control layer becomes the security conscience of your agent fleet: always watching, interpreting and enabling distributed and trusted autonomy.
As agents continue to proliferate, the ability to deploy them responsibly will define who can scale securely and who introduces unnecessary risk. To secure agent ecosystems, organizations should integrate security from the start of deployment, continuously monitor behavior and access, maintain strong human oversight, and regularly audit and update security policies.
Enterprises that get this right will unlock significant productivity and resilience; not by slowing down agents, but by giving them the security and governance they need to operate safely and responsibly.
We list the best IT Automation software.
This article was produced as part of TechRadarPro's Expert Insights channel where we feature the best and brightest minds in the technology industry today. The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc. If you are interested in contributing find out more here: https://www.techradar.com/news/submit-your-story-to-techradar-pro