IBM Watson Fights Real-Time Cyber Crime

You may know Watson as IBM’s Jeopardy-winning, cookbook-writing, dress-designing, weather-predicting supercomputer-of-all trades. Now it’s embarking on its biggest challenge yet: Preventing cybercrime in finance, healthcare, and other fields.

Starting early December, 40 organizations will begin to rely upon the clever computers cognitive power to help spot cybercrime. The Watson for Cybersecurity beta program helps IBM too, because Watson’s real-world experience will help it hone its skills and work within specific industries. After all, the threats that keep security experts at Sun Life Financial up at night differ from those that spook the cyber-sleuths at University of New Brunswick.

Watson isn’t starting from scratch here. IBM researchers started training Watson in the fundamentals of cybersecurity last spring so the computer could begin to analyse and prevent threats. Now it graduates to real-world situations to further hone its skills. Think of it as the world’s smartest intern.

Ransomware

The computer’s done a lot of cramming since May. Cyberspace is vast, and the more of it Watson recognizes and understands, the more effectively it can discern the difference between benign threats and real problems. Watson’s great skill isn’t the ability to comb through huge amounts of information (though it does that too), it’s the ability to contextualize that information by combining structured data such as specific security events with unstructured data like white papers, research reports, and blog posts.

“Cognitive computing is 30-40% faster than traditional rule-based systems,” says Forrester Research analyst Andras Cser, who adds that cognitive systems like Watson also result in fewer false positives. Because it learns as it goes, it doesn’t repeat the same mistakes.

Before it could do that, though, Watson needed to study. Researchers fed Watson up to 15,000 documents each month through the fall, linking it to libraries and news feeds in real-time to keep its knowledge base current. Volume, too, is only half the battle; Watson must understand what words mean before it can know how they relate.

Take “ransomware.” You might know it as an increasingly prevalent type of hack that holds computers and systems hostage until the victim pays up. For a while Watson, thought it was a place.

When IBM researchers annotated “ransomware” documents with a definition, Watson finally understood that his teachers aren’t obsessed with some far-flung metropolis.

It’s a fun anecdote that illustrates the challenges and opportunities of bringing Watson up to speed. What it doesn’t know, it can use context to guess. If it guesses wrong, it can learn. And once it learns, it never forgets. Which is where the beta program comes in.

Dialect Coach

Now, Watson’s beta isn’t like the kind you associate with consumer software.

“In a regular development project, you assign a testing matrix and go through testing to see how it deals with the tests,” says Barlow. “In this case, it’s much more like human learning. There are things it can do in grade school, things it can do in high school, things it can do when it goes off to college, and things it can do when it’s had a lot of experience in the industry. Watson will follow a very similar journey.”

In other words, Watson currently understands the fundamentals of security. Now it must learn the specific vernacular that peppers various use cases. “The language of security in the healthcare industry is probably completely different than the language of security in the energy sector,” says Barlow.

During the beta, Watson will embed with a few dozen companies and provide their security analysts with reports and recommendations. Specifically, Watson can identify whether a security event is associated with known malware and provide relevant background, as well as identify suspicious user behavior. Also think of password entry; are repeated failed attempts an absentminded user, or an attempted break-in?

Watson doesn’t replace humans, but rather helps make them faster and more comprehensive in their response. IBM research shows that security teams sift through an average of 200,000 potentially significant events per day; a computer that prioritizes those events and reveals how they fit into the broader security climate saves worlds of time.

And in the process, save companies, and their customers, from potentially crippling threats. Not a bad learning curve for a computer that until recently was looking for ransomware on a map.

Wired:           IBM’s Watson Will Use AI To Treat Cancer:

 

 

« Behavior Analytics Tools For Cyber-Security
Cyber Police Stations Across India »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

StoneFly

StoneFly

StoneFly offers High Availability, high performance cluster and scale out storage, and backup and disaster recovery appliances.

PFP Cybersecurity

PFP Cybersecurity

PFP provides a SaaS solution for life-cycle protection based on our IoT security platform and power usage analytics.

NetMotion Software

NetMotion Software

NetMotion Software specializes in mobile performance management solutions to manage, secure and support the mobile enterprise.

Industrial Networking Solutions (INS)

Industrial Networking Solutions (INS)

INS Services specializes in designing, deploying and providing on-going support for critical OT (Operational Technology) and IIoT (Industrial Internet of Things) networks.

Assured Enterprises

Assured Enterprises

Assured Enterprises provides comprehensive cyber risk identification, management and mitigation across all platforms.

Cyberens

Cyberens

Cyberens provide cybersecurity consulting services in IT sectors relating to defense and space, banking, industrial control systems and IoT.

IBLISS Digital Security

IBLISS Digital Security

How cyber-resilient is your business now? We help companies to continuously answer this never-ending C-level question.

TOAE Security

TOAE Security

TOAE Security is a trusted cyber security consulting partner helping today's leading organizations protect their most important assets from evolving cyber threats.

Czech Accreditation Institute

Czech Accreditation Institute

Czech Accreditation Institute is the national accreditation body for the Czech Republic. The directory of members provides details of organisations offering certification services for ISO 27001.

PROW Information Technology

PROW Information Technology

PROW is at the forefront of the technology and digital revolution with a focus and mastery in the cybersecurity, information security and data management realms.

DESCERT

DESCERT

DESCERT offers you an extended IT, cyber security, risk advisory & compliance audit team which provides strategic guidance, engineering and audit services.

Var Group

Var Group

Var Group is one of the main partners for innovation in the ICT sector in Italy.

Bleach Cyber

Bleach Cyber

Bleach Cyber helps small businesses with an affordable and user-friendly solution for managing cloud security.

Prompt Security

Prompt Security

Prompt Security provides an LLM agnostic approach to ensure security, data privacy and safety across all aspects of Generative AI.

Haiku

Haiku

Haiku stands at the forefront of cybersecurity upskilling, leveraging video games to immerse you in a flow state for accelerated, enduring learning.

Assurestor

Assurestor

Assurestor's singular focus is delivering leading cloud-based backup and disaster recovery designed to increase levels of IT resilience.