The AI Arms Race: Understanding Modern Cybersecurity Threats and Defenses

October 28, 2025 Thomas Edison State University

Episode 17 of the Edison Sound Stage Podcast

Listen as Dr. Henry Collier reveals how artificial intelligence is revolutionizing both cyberattacks and cybersecurity defenses.

Artificial intelligence is revolutionizing everything from healthcare to creative arts — but it's also fundamentally transforming the cybersecurity landscape. In this special Cybersecurity Awareness Month episode, we explore the digital arms race between AI-powered attacks and AI-enhanced defenses with Dr. Henry Collier, dean of the School of Science and Technology and internationally recognized expert in the human firewall, artificial intelligence and networking.

Listen to Episode 17


Available on: Apple Podcasts | Podbean | YouTube

Episode Length: 48 minutes | Perfect for: Your commute, workout or lunch break

What You'll Discover in This Episode


The New Face of Cyber Threats

Collier paints a sobering picture of today's threat environment. What he reveals in this episode will change how you think about online security forever.

AI-powered attacks can now adapt in real time, create convincing deepfakes and probe for vulnerabilities at machine speed — all while becoming increasingly difficult to detect. In our wide-ranging conversation, Collier breaks down exactly what these threats look like and, more importantly, what you can do about them.

When Technology Exploits Human Nature

One of the most compelling parts of the conversation centers on social engineering — cyberattacks that target human psychology rather than technical vulnerabilities. Collier, whose research focuses on the cultural factors that influence susceptibility to cybercrime, shared how AI has supercharged these attacks.

Originally we talked about AI as being a great way to defend a network... while at the same point we're realizing that the threat actors would be able to use it to attack us in a much more effective and efficient manner."
Dr. Henry Collier

Consider the "grandparent scam," where fraudsters call elderly victims pretending to be grandchildren in trouble. Historically, these attacks were easier to detect due to obvious signs like thick accents or voice inconsistencies. Now, with just a 10-second clip from a TikTok video, AI can clone a voice so convincingly that even family members can't tell the difference.

"I can use AI to clone that voice. And I can sit on my keyboard, which is connected to my phone, and I can type in my conversation and guess what? I am your grandchild," Collier demonstrated. "For all intents and purposes, I am your grandchild."

The implications are chilling — and Collier shares even more sophisticated examples in the full episode.

Don't miss the full conversation — listen now

The Triple Threat: Phishing, Deepfakes and Automated Attacks

Collier outlined three major categories of AI-enhanced threats:

Phishing attacks have evolved dramatically. Where once poorly written emails with obvious grammatical errors were telltale signs of scams, AI now generates perfectly crafted messages that mirror legitimate communications. These attacks can be personalized at scale, targeting specific vulnerabilities in different demographics or cultures.

Deepfake technology extends beyond voice cloning to video manipulation. Cybercriminals can now create convincing fake videos of CEOs authorizing wire transfers or executives making false announcements that manipulate stock prices. The technology has become so sophisticated that even experts struggle to identify fakes without specialized analysis.

Automated vulnerability< scanning allows attackers to probe thousands of systems simultaneously, identifying weaknesses faster than defenders can patch them. This "fire hose" approach means organizations face constant, intelligent attacks that learn and adapt with each attempt.

Want to know how to protect yourself against these threats? Collier walks through practical defense strategies in the episode — strategies you can implement today.

Listen to learn how to defend yourself

Fighting Back: The Defense Arsenal

Despite these daunting challenges, cybersecurity professionals aren't standing still. Collier discusses several defensive strategies:

AI-Powered Defense Systems use machine learning to detect anomalies in network traffic, identify suspicious patterns and respond to threats in real time. These systems can process vastly more data than human analysts and spot subtle indicators of compromise.

Multi-Factor Authentication (MFA) remains one of the most effective defenses against unauthorized access. Even if attackers obtain passwords through phishing or data breaches, MFA creates an additional barrier that's significantly harder to overcome.

The Human Firewall recognizes that people are both the weakest link and the strongest defense. Collier's research into cultural factors affecting cybersecurity awareness reveals that effective training must account for diverse backgrounds, behavioral patterns and cultural attitudes toward authority and trust.

"There are many different cultures out there that have deep respect for authority no matter what. And as a social engineer, I can use that to target somebody and be successful," he notes, emphasizing why one-size-fits-all security training falls short.

The Cultural Dimension of Cybersecurity

One of Collier's most fascinating insights involves how cultural backgrounds influence susceptibility to cyberattacks. His global research initiative examines how different societies' attitudes toward authority, community and trust create unique vulnerability profiles.

For instance, cultures with strong hierarchical structures may be more susceptible to attacks that impersonate authority figures. Understanding these patterns allows organizations to develop more effective, culturally sensitive security training programs.

In the full episode, Collier dives deeper into his groundbreaking global research and shares stories from his work that will fundamentally change how you think about cybersecurity training.

Building a Career in Cybersecurity

For students considering careers in this field, Collier offers candid advice that goes beyond technical skills:

Embrace failure as a learning tool. "You are going to fail far more often than you're ever going to succeed. That's life. Get over it. Move on and find the next solution that hopefully solves that problem."

Develop creativity alongside technical skills. The field demands both logical thinking and the ability to approach problems from unconventional angles. His favorite classroom exercise involves asking students how to empty a cup of coffee — the best answer? "Shoot it with a laser beam."

Seek mentorship from those in the field. The unique challenges of cybersecurity mean that guidance from experienced professionals is invaluable. "The only people that can actually mentor us successfully are other people in the world of cyber security because we are unique, we are different."

Prioritize mental health. Collier emphasizes that cybersecurity professionals often encounter disturbing content and high-stress situations. "You're going to experience things that the average person in your community will never experience... always, always, always make sure you work on taking care of your own mental health."

These are just highlights — in the full 48-minute episode, Collier shares candid stories from his career, practical advice for students and insights you won't find anywhere else. Whether you're considering a career in cybersecurity or simply want to protect yourself better online, this conversation is essential listening.

Hear Dr. Collier's full career insights — listen now

Don't Miss This Essential Conversation


Resources and Support


For Thomas Edison State University Students: For Everyone:
  • October is Cybersecurity Awareness Month — visit CISA.gov for resources and tips
  • Enable multi-factor authentication on all your accounts
  • Stay skeptical of unexpected communications, even from familiar voices or faces
  • Keep software and systems updated with the latest security patches

Listen to the full episode of Edison Sound Stage below.