IBM Watson Fights Real-Time Cyber Crime

You may know Watson as IBM’s Jeopardy-winning, cookbook-writing, dress-designing, weather-predicting supercomputer-of-all trades. Now it’s embarking on its biggest challenge yet: Preventing cybercrime in finance, healthcare, and other fields.

Starting early December, 40 organizations will begin to rely upon the clever computers cognitive power to help spot cybercrime. The Watson for Cybersecurity beta program helps IBM too, because Watson’s real-world experience will help it hone its skills and work within specific industries. After all, the threats that keep security experts at Sun Life Financial up at night differ from those that spook the cyber-sleuths at University of New Brunswick.

Watson isn’t starting from scratch here. IBM researchers started training Watson in the fundamentals of cybersecurity last spring so the computer could begin to analyse and prevent threats. Now it graduates to real-world situations to further hone its skills. Think of it as the world’s smartest intern.

Ransomware

The computer’s done a lot of cramming since May. Cyberspace is vast, and the more of it Watson recognizes and understands, the more effectively it can discern the difference between benign threats and real problems. Watson’s great skill isn’t the ability to comb through huge amounts of information (though it does that too), it’s the ability to contextualize that information by combining structured data such as specific security events with unstructured data like white papers, research reports, and blog posts.

“Cognitive computing is 30-40% faster than traditional rule-based systems,” says Forrester Research analyst Andras Cser, who adds that cognitive systems like Watson also result in fewer false positives. Because it learns as it goes, it doesn’t repeat the same mistakes.

Before it could do that, though, Watson needed to study. Researchers fed Watson up to 15,000 documents each month through the fall, linking it to libraries and news feeds in real-time to keep its knowledge base current. Volume, too, is only half the battle; Watson must understand what words mean before it can know how they relate.

Take “ransomware.” You might know it as an increasingly prevalent type of hack that holds computers and systems hostage until the victim pays up. For a while Watson, thought it was a place.

When IBM researchers annotated “ransomware” documents with a definition, Watson finally understood that his teachers aren’t obsessed with some far-flung metropolis.

It’s a fun anecdote that illustrates the challenges and opportunities of bringing Watson up to speed. What it doesn’t know, it can use context to guess. If it guesses wrong, it can learn. And once it learns, it never forgets. Which is where the beta program comes in.

Dialect Coach

Now, Watson’s beta isn’t like the kind you associate with consumer software.

“In a regular development project, you assign a testing matrix and go through testing to see how it deals with the tests,” says Barlow. “In this case, it’s much more like human learning. There are things it can do in grade school, things it can do in high school, things it can do when it goes off to college, and things it can do when it’s had a lot of experience in the industry. Watson will follow a very similar journey.”

In other words, Watson currently understands the fundamentals of security. Now it must learn the specific vernacular that peppers various use cases. “The language of security in the healthcare industry is probably completely different than the language of security in the energy sector,” says Barlow.

During the beta, Watson will embed with a few dozen companies and provide their security analysts with reports and recommendations. Specifically, Watson can identify whether a security event is associated with known malware and provide relevant background, as well as identify suspicious user behavior. Also think of password entry; are repeated failed attempts an absentminded user, or an attempted break-in?

Watson doesn’t replace humans, but rather helps make them faster and more comprehensive in their response. IBM research shows that security teams sift through an average of 200,000 potentially significant events per day; a computer that prioritizes those events and reveals how they fit into the broader security climate saves worlds of time.

And in the process, save companies, and their customers, from potentially crippling threats. Not a bad learning curve for a computer that until recently was looking for ransomware on a map.

Wired:           IBM’s Watson Will Use AI To Treat Cancer:

 

 

« Behavior Analytics Tools For Cyber-Security
Cyber Police Stations Across India »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LIFARS

LIFARS

LIFARS is a global leader in Digital Forensics and Cyber Resiliency Services.

Smart Contract Security Alliance

Smart Contract Security Alliance

The Smart Contract Security Alliance supports the blockchain ecosystem by building standards for smart contract security and smart contract audits.

Granted Consultancy

Granted Consultancy

Granted Consultancy is a business consultancy that specialises in securing funding to support companies with the development and commercialisation of new and innovative products and technologies.

Fly Ventures

Fly Ventures

Fly Ventures is a seed-stage venture capital fund for outstanding teams building Enterprise and Deep Tech startups in Europe.

Elevate Security

Elevate Security

Elevate is the leading Security Behavior Platform, changing employee security habits while giving security teams unprecedented visibility.

Whistic

Whistic

Whistic is a cloud-based platform that uses a unique approach to address the challenges of third-party risk management.

Flix11

Flix11

Flix11 is a Cyber Security & ICT Solutions focused company. We provide a range of products and services in Cyber Security, Internet of Things (IoT) and infrastructure solutions.

10dot Cloud Security

10dot Cloud Security

10dot Cloud Security is a security service management company. Our solutions give you contextualised visibility into your network security.

iON United

iON United

iON United is a full-service IT security solutions provider and one of the most trusted names in cybersecurity in Canada.

Association of Azerbaijani Cyber Security Organizations (AKTA)

Association of Azerbaijani Cyber Security Organizations (AKTA)

The Association of Azerbaijani Cyber Security Organizations (AKTA) is a non-commercial organization aimed at strengthening the country's cybersecurity system.

Proximus Ada

Proximus Ada

Proximus Ada is the first Belgian center of excellence combining artificial intelligence and cybersecurity.

Eurotech

Eurotech

Eurotech provides Edge Computers and IoT solutions. We help to connect your assets and make them smarter through secure and agnostic hardware and software technologies.

Fairdinkum Consulting

Fairdinkum Consulting

Fairdinkum is a leading full-service IT consulting firm with more than two decades of experience in the industry.

Digital.ai

Digital.ai

Digital.ai empowers organizations to scale software development teams, continuously deliver software with greater quality and security.

ABPCyber

ABPCyber

ABPCyber offers holistic cybersecurity solutions spanning DevSecOps, advisory and consultancy, designing and integration, managed operations, and cybersecurity investment optimization.

Blackwell Security

Blackwell Security

Blackwell is a driving force in healthcare cybersecurity, transforming how security operations are conducted within this critical sector.