Tag: FEATURED
IntroductionTrustworthy vs Responsible AITrustworthy AIAttributes of trustworthy AI1. Transparent, interpretable and explainable2. Accountable3. Reliable, resilient, safe and secure4. Fair and non-discriminatory5. Committed to privacy and data governanceTrustworthy AI SummaryResponsible AIThe fundamentals of responsible AI1. Ethical Purpose2. Fairness and Non-Discrimination3. Accountability4. Privacy and Data Protection5. Safety and Robustness6. Human-Centric Design7. Inclusivity and AccessibilityResponsible AI SummarySecure AI, Safe AI and the wicked problem of AI alignmentSecure AIThe foundations of AI securityConfidentialityIntegrityAvailabilityChallenges in Securing AIScalabilityEvolving Threat LandscapeIntegration with Existing SystemsData Privacy and GovernanceRobustness and ResilienceSkill and Knowledge GapsAdvanced Techniques and Methodologies in AI SecurityAdversarial TrainingHomomorphic EncryptionAnomaly Detection SystemsDifferential PrivacyFederated LearningSecure Multi-Party Computation...
The automotive industry has revolutionized manufacturing twice.
The first time was in 1913 when Henry Ford introduced a moving assembly line at his Highland Park plant in Michigan. The innovation changed the production process forever, dramatically increasing efficiency, reducing the time it took to build a car, and significantly lowering the cost of the Model T, thereby kickstarting the world’s love affair with cars. The success of this system not only transformed the automotive industry but also had a profound impact on manufacturing worldwide, launching the age of mass production.
The second time was about 50 years later, when General Motors...
The rapid development of AI brings both extraordinary potential and unprecedented risks. AI systems are increasingly demonstrating emergent behaviors, and in some cases, are even capable of self-improvement. This advancement, while remarkable, raises critical questions about our ability to control and understand these systems fully. In this article I aim to present my own statement on AI risk, drawing inspiration from the Statement on AI Risk from the Center for AI Safety, a statement endorsed by leading AI scientists and other notable AI figures. I will then try to explain it. I aim to dissect the reality of AI risks without veering...
Artificial Intelligence (AI) is no longer just a buzzword; it’s an integral part of our daily lives, powering everything from our search for a perfect meme to critical infrastructure. But as Spider-Man’s Uncle Ben wisely said, “With great power comes great responsibility.” The power of AI is undeniable, but if not secured properly, it could end up making every meme a Chuck Norris meme.
Imagine a world where malicious actors can manipulate AI systems to make incorrect predictions, steal sensitive data, or even control the AI’s behavior. Without robust AI security, this dystopian scenario could become our reality. Ensuring the...
With AI’s breakneck expansion, the distinctions between ‘cybersecurity’ and ‘AI security’ are becoming increasingly pronounced. While both disciplines aim to safeguard digital assets, their focus and the challenges they address diverge in significant ways. Traditional cybersecurity is primarily about defending digital infrastructures from external threats, breaches, and unauthorized access. On the other hand, AI security has to address unique challenges posed by artificial intelligence systems, ensuring not just their robustness but also their ethical and transparent operation as well as unique internal vulnerabilities intrinsic to AI models and algorithms.
Ask most people what they remember from 2016 - if they remember anything at all - and there are usually two big events that float to the front of their minds: Britain voted to leave the European Union and the United States voted Donald Trump into the White House. Together, these two episodes sent shock waves around the world. In the UK, the Brexit referendum was followed by a national decline in mental health. In the US, American college students exhibited levels of stress comparable to PTSD.
Even beyond those borders, Brexit and the Trump election became emblematic of the...
While CRQCs capable of breaking current public key encryption algorithms have not yet materialized, technological advancements are pushing us towards what is ominously dubbed 'Q-Day'—the day a CRQC becomes operational. Many experts believe that Q-Day, or Y2Q as it's sometimes called, is just around the corner, suggesting it could occur by 2030 or even sooner; some speculate it may already exist within secret government laboratories.
Self-help authors and politicians seem to agree on at least one thing: mindset matters. The shelves of bookstores worldwide are awash with motivational books by evangelical writers hoping to convert readers to their gospel of optimism. The central thesis is simple: success depends on approaching life, especially its challenges, with a positive outlook.
Politicians and leaders have always appreciated the power of mindset, though less of the positive kind, as attested to by a history of propaganda that dates back to at least 500 BC. More recently, as Covid-19 spread across the globe, language in public discourse showed itself to...
The journey towards quantum resistance is not merely about staying ahead of a theoretical threat but about evolving our cybersecurity practices in line with technological advancements. Starting preparations now ensures that organizations are not caught off guard when the landscape shifts. It’s about being informed, vigilant, and proactive—qualities essential to navigating any future technological shifts.
A term first coined by the Japanese government, “Society 5.0” describes "A human-centered society that balances economic advancement with the resolution of social problems by a system that highly integrates cyberspace and physical space." The fifth evolution of the society, enabled by the fifth generation of cellular networking and cyber-physical systems, imagines technology, things and humans converging to address some of the biggest societal challenges. The concept encompasses Industry 4.0, Fourth Industrial Revolution, Smart-Everything World and other buzzwords of the moment.
In the society of the future the more the cyber and physical worlds are combined, the greater the benefits...
Neil Harbisson calls himself a cyborg. Without the antenna implanted in his skull, he would not be able to see colour of any kind. Born with achromatopsia, a condition of total colourblindness that affects 1 in every 30 000 people, Harbisson's physical faculties are augmented by cyber technology to grant him access to a life of greater meaning and satisfaction.
As technological evolution leads to concomitant advances in medical science, we are seeing more and more examples of humans who are integrating devices and sensors into their biological makeup. For some, like those part of the growing "transhumanist" movement, this...
The interest in 5G and mIoT is exploding. It's exciting to see so many IT and cybersecurity professionals in my network trying to learn more about 5G and related technologies.
In addition to my usual articles about the societal impacts of these innovations, I'll start a series of articles introducing key 5G and mIoT technology concepts. Before we move on to technical aspects of 5G security.
Let's get started with reviewing the 5G core service-based architecture and learning the first few dozen acronyms, out of approximately a gazillion. The cellular industry loves acronyms. Even more than the cybersecurity industry.
5G architecture is...
In their outstanding book, Wicked and Wise, Alan Watkins and Ken Wilber look at some of the most pressing ‘wicked problems’ facing the human race. ‘Wicked problems,’ they suggest, are difficult to define, but they are essentially unsolvable in the usual scientific sense.
The authors go on: wicked problems, such as climate change, are multi-dimensional, have multiple causes, multiple stakeholders, multiple symptoms and multiple solutions. They are by definition complex and difficult to process.
Crucially, they are created or exacerbated by people.
Our species has proved capable of producing challenges of unfathomable difficulty. We may, however, also prove capable of developing the...
The human will to innovate is seemingly relentless. The history of our species is one of continual development, with the last 350 years, in particular, representing staggering technological progress.
The first industrial revolution mechanized production using natural elements like water. The second revolution used electricity to enable mass production; the third used electronics and information technology to automate production. The fourth industrial revolution unfolding all around us is characterized by an exponential growth in data production and the merging of the physical and digital.
Cyber-physical systems (CSPs) like the internet of things (IoT) and industrial control systems (ICS) are capable of...
The secret sauce of quantum computing, which even Einstein called "spooky," is the ability to generate and manipulate quantum bits of data or qubits. Certain computational tasks can be executed exponentially faster on a quantum processor using qubits, than on a classical computer with 1s and 0s. A qubit can attain a third state of superimposition of 1s and 0s simultaneously, encode data into quantum mechanical properties by "entangling" pairs of qubits, manipulate that data and perform huge complex calculations very quickly.