Goto

Collaborating Authors

 cybersecurity industry


The Geography of Transportation Cybersecurity: Visitor Flows, Industry Clusters, and Spatial Dynamics

Wang, Yuhao, Wang, Kailai, Hu, Songhua, Yunpeng, null, Zhang, null, Lim, Gino, Zhu, Pengyu

arXiv.org Artificial Intelligence

The rapid evolution of the transportation cybersecurity ecosystem, encompassing cybersecurity, automotive, and transportation and logistics sectors, will lead to the formation of distinct spatial clusters and visitor flow patterns across the US. This study examines the spatiotemporal dynamics of visitor flows, analyzing how socioeconomic factors shape industry clustering and workforce distribution within these evolving sectors. To model and predict visitor flow patterns, we develop a BiTransGCN framework, integrating an attention-based Transformer architecture with a Graph Convolutional Network backbone. By integrating AI-enabled forecasting techniques with spatial analysis, this study improves our ability to track, interpret, and anticipate changes in industry clustering and mobility trends, thereby supporting strategic planning for a secure and resilient transportation network. It offers a data-driven foundation for economic planning, workforce development, and targeted investments in the transportation cybersecurity ecosystem.


AI Is Being Used to 'Turbocharge' Scams

WIRED

Code hidden inside PC motherboards left millions of machines vulnerable to malicious updates, researchers revealed this week. Staff at security firm Eclypsium found code within hundreds of models of motherboards created by Taiwanese manufacturer Gigabyte that allowed an updater program to download and run another piece of software. While the system was intended to keep the motherboard updated, the researchers found that the mechanism was implemented insecurely, potentially allowing attackers to hijack the backdoor and install malware. Elsewhere, Moscow-based cybersecurity firm Kaspersky revealed that its staff had been targeted by newly discovered zero-click malware impacting iPhones. Victims were sent a malicious message, including an attachment, on Apple's iMessage. The attack automatically started exploiting multiple vulnerabilities to give the attackers access to devices, before the message deleted itself.


Council Post: AI Vs. AI: The Battle Against Human-Level Cognitive Threats

#artificialintelligence

The world around us is full of arguments and evidence for the benefit of artificial intelligence (AI) in our daily lives. But the specter of AI threats looms large in today's world. While there's plenty of fear around the future of human-level AI, there's debate over whether AI today is truly working in our best interest. But what many people don't know is that AI is already being used by cybercriminals to attack them at scale with cyber threats, like cognitive attacks, that are only possible with AI. One of the greatest threats that AI represents today is how it can be abused by cybercriminals, specifically in its capability to deceive people and trick them into engaging in actions with unwanted or underestimated consequences.


How AI Is Useful -- and Not Useful -- for Cybersecurity

#artificialintelligence

Artificial intelligence has advanced greatly in the past decade. On my phone, I'm reading Apple and Google news that is well-tailored to me, thanks to AI recommendation models. Self-driving cars are already picking up passengers for rides in downtown San Francisco. The same transformation is happening in the cybersecurity world too. However, questions remain: Will AI replace security professionals?


How is Quantum Computing Impacting the Cybersecurity Industry?

#artificialintelligence

Quantum computing has a significant and game-changing impact on cybersecurity. Quantum computing holds immense promise in a range of sectors, including AI technology, health research, and weather prediction, to name a few. It does, however, pose a severe threat to cybersecurity, mandating a shift in how we protect our data. Regardless of the fact that quantum computers cannot yet crack most types of security, we must stay ahead of the curve and build quantum-proof technologies as quickly as possible. If we wait for those powerful quantum computers to breach our security, it will be too late.


What Skills Are Needed for a Career in Data-Driven Cybersecurity?

#artificialintelligence

Big data has become more important than ever in the realm of cybersecurity. You are going to have to know more about AI, data analytics and other big data tools if you want to be a cybersecurity professional. As far as computer and information technology occupations go, security awareness training is a key starting point for anyone interested in the bright future that this sector offers. The need for cybersecurity personnel, technicians, officers, developers, and trainers have never been greater. As the need for these professions grows, it also becomes more important for them to have a background in big data and other forms of technology.


Global Big Data Conference

#artificialintelligence

The cybersecurity industry is rapidly embracing the notion of "zero trust", where architectures, policies, and processes are guided by the principle that no one and nothing should be trusted. However, in the same breath, the cybersecurity industry is incorporating a growing number of AI-driven security solutions that rely on some type of trusted "ground truth" as reference point. This is not a hypothetical discussion. Organizations are introducing AI models into their security practices that impact almost every aspect of their business, and one of the most urgent questions remains whether regulators, compliance officers, security professionals, and employees will be able to trust these security models at all. Because AI models are sophisticated, obscure, automated, and oftentimes evolving, it is difficult to establish trust in an AI-dominant environment.


How cybersecurity is getting AI wrong

#artificialintelligence

The cybersecurity industry is rapidly embracing the notion of "zero trust", where architectures, policies, and processes are guided by the principle that no one and nothing should be trusted. However, in the same breath, the cybersecurity industry is incorporating a growing number of AI-driven security solutions that rely on some type of trusted "ground truth" as reference point. This is not a hypothetical discussion. Organizations are introducing AI models into their security practices that impact almost every aspect of their business, and one of the most urgent questions remains whether regulators, compliance officers, security professionals, and employees will be able to trust these security models at all. Because AI models are sophisticated, obscure, automated, and oftentimes evolving, it is difficult to establish trust in an AI-dominant environment. Yet without trust and accountability, some of these models might be considered risk-prohibitive and so could eventually be under-utilized, marginalized, or banned altogether.


How cybersecurity is getting AI wrong

#artificialintelligence

The cybersecurity industry is rapidly embracing the notion of "zero trust", where architectures, policies, and processes are guided by the principle that no one and nothing should be trusted. However, in the same breath, the cybersecurity industry is incorporating a growing number of AI-driven security solutions that rely on some type of trusted "ground truth" as reference point. This is not a hypothetical discussion. Organizations are introducing AI models into their security practices that impact almost every aspect of their business, and one of the most urgent questions remains whether regulators, compliance officers, security professionals, and employees will be able to trust these security models at all. Because AI models are sophisticated, obscure, automated, and oftentimes evolving, it is difficult to establish trust in an AI-dominant environment.


4 Top Benefits and Challenges of AI in Cybersecurity - The Next Scoop

#artificialintelligence

In this article, we're going to discuss machine learning and artificial intelligence in cybersecurity. We'll look at the benefits and challenges of AI, their role in cybersecurity, and how criminals can abuse this technology. Cyberattacks have been rising in frequency and scale for a few years now. We saw a sharp jump since the start of the notorious pandemic. With data security in more danger than ever, it's no surprise that more and more companies are turning to artificial intelligence in the hope of getting more powerful digital protection from hackers, phishers, and other cyber criminals.