Watson For Cybersecurity

IBM has announced that 40 companies around the world have signed up for its IBM Watson's Beta Cybersecurity Program.

The companies will test the ability of IBM’s cognitive computing technology to help in the battle against cybercrime. The trial will include representatives of the banking, healthcare, insurance, education and other key industry sectors.

Watson for Cyber Security uses technologies such as machine learning and natural language processing, which is being trained to understand the language of security.

IBM claims the combined technologies will help security analysts make better, faster decisions from vast amounts of data, including unstructured data that has been “dark” to security defences until now.

Today’s increasingly challenging security environment has created the need for more intelligence to identify and prioritise threats, which is, in turn, increasing the workload of security analysts with more alerts and anomalies to process than ever, said IBM.

A recent study from the IBM Institute for Business Value shows that nearly 60% of security professionals believe emerging cognitive technologies will play a critical role in turning the tide in the war on cyber-crime.

 “Customers are in the early stages of implementing cognitive security technologies,” said Sandy Bird, chief technology officer at IBM Security. “Our research suggests this adoption will increase threefold over the next three years, as tools like Watson for Cyber Security mature and become pervasive in security operations centres. Currently, only 7% of security professionals claim to be using cognitive solutions.”

Companies taking part in the beta tests will use Watson in their current security environments to bring additional context to their cyber security data.

IBM said Watson will help organisations to determine whether or not a current security “offence” is associated with a known malware or cyber-crime campaign.

If it is, Watson can provide background on the malware employed, vulnerabilities exploited and scope of the threat, among other insights, said IBM.

Watson is also expected to help improve organisations’ ability to identify suspicious behaviour by providing additional context to user activity.

Working with these beta customers, IBM is continuing to enhance Watson’s understanding of the cyber security data and refine how Watson can seamlessly integrate into day-to-day security operations.

ComputerWeekly:            IBM Think Ahead: Soon Watson AI Will Be Behind Every Decision:

Cognitive Computing: What Can and Can’t Be Done:
 

« Anti-Surveillance Clothing Thwarts Facial Recognition
2017 Tech Trends: 'A Major Bank Will Fail' »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Perkins Coie LLP

Perkins Coie LLP

Perkins Coie LLP is an internationalk law firm with offices across the USA and Asia. Practice areas include Privacy and Data Security.

HireVergence

HireVergence

HireVergence is a full service IT staffing and recruiting firm with a focus on cyber and information security.

Deutsche Cyber-Sicherheitsorganisation (DCSO)

Deutsche Cyber-Sicherheitsorganisation (DCSO)

DCSO was founded in 2015 with the aim of counteracting the threats posed by globally organized cybercrime and state-controlled industrial espionage.

Dataglobal

Dataglobal

Dataglobal is an industry-leading provider of Information Archiving/Governance and Unified Data Classification solutions.

DocAuthority

DocAuthority

DocAuthority automatically discovers and accurately identifies unprotected, sensitive documents, enabling a broad yet business-friendly security policy.

Netwrix

Netwrix

Netwrix empowers information security and governance professionals to identify and protect sensitive data to reduce the risk of a breach.

PECB

PECB

PECB is a certification body for persons, management systems, and products on a wide range of international standards in a range of areas including Information Security and Risk Management.

V-Key

V-Key

V-Key is a global leader in software based digital security, providing solutions for mobile identity, authentication, authorization, and mobile payments for major banks.

ATIS Systems

ATIS Systems

ATIS Systems offers first-class complete solutions for legal interception, mediation, data retention, and IT forensics.

LiveVault

LiveVault

LiveVault delivers fully automated, turnkey, backup over the Internet or a private network connection for uninterrupted remote data protection.

Living Security

Living Security

Living Security specializes in metric driven and engaging security awareness solutions that reduce risk by increasing security culture and changing employee behaviour.

Bowbridge

Bowbridge

Bowbridge provides anti-virus and application security solutions for SAP systems.

Digital Identification & Authentication Council of Canada (DIACC)

Digital Identification & Authentication Council of Canada (DIACC)

DIACC is a non-profit coalition of public and private sector leaders committed to developing a Canadian framework for digital identification and authentication.

D2 Network Associates (D2NA)

D2 Network Associates (D2NA)

D2NA help businesses deliver and achieve their goals, through innovative IT solutions, robust cyber security services and proactive IT managed services.

Otto

Otto

Stop Client-Side Attacks. Plug otto into your application security suite and protect your supply chain.

Lineaje

Lineaje

Lineaje solves critical Software Supply Chain security problems faced by every organization that builds, uses or sells software.