Watson For Cybersecurity

IBM has announced that 40 companies around the world have signed up for its IBM Watson's Beta Cybersecurity Program.

The companies will test the ability of IBM’s cognitive computing technology to help in the battle against cybercrime. The trial will include representatives of the banking, healthcare, insurance, education and other key industry sectors.

Watson for Cyber Security uses technologies such as machine learning and natural language processing, which is being trained to understand the language of security.

IBM claims the combined technologies will help security analysts make better, faster decisions from vast amounts of data, including unstructured data that has been “dark” to security defences until now.

Today’s increasingly challenging security environment has created the need for more intelligence to identify and prioritise threats, which is, in turn, increasing the workload of security analysts with more alerts and anomalies to process than ever, said IBM.

A recent study from the IBM Institute for Business Value shows that nearly 60% of security professionals believe emerging cognitive technologies will play a critical role in turning the tide in the war on cyber-crime.

 “Customers are in the early stages of implementing cognitive security technologies,” said Sandy Bird, chief technology officer at IBM Security. “Our research suggests this adoption will increase threefold over the next three years, as tools like Watson for Cyber Security mature and become pervasive in security operations centres. Currently, only 7% of security professionals claim to be using cognitive solutions.”

Companies taking part in the beta tests will use Watson in their current security environments to bring additional context to their cyber security data.

IBM said Watson will help organisations to determine whether or not a current security “offence” is associated with a known malware or cyber-crime campaign.

If it is, Watson can provide background on the malware employed, vulnerabilities exploited and scope of the threat, among other insights, said IBM.

Watson is also expected to help improve organisations’ ability to identify suspicious behaviour by providing additional context to user activity.

Working with these beta customers, IBM is continuing to enhance Watson’s understanding of the cyber security data and refine how Watson can seamlessly integrate into day-to-day security operations.

ComputerWeekly:            IBM Think Ahead: Soon Watson AI Will Be Behind Every Decision:

Cognitive Computing: What Can and Can’t Be Done:
 

« Anti-Surveillance Clothing Thwarts Facial Recognition
2017 Tech Trends: 'A Major Bank Will Fail' »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IOActive

IOActive

IOActive serves as a trusted security advisor to the Global 500 and other progressive enterprises, helping to safeguard their most important assets and improve their overall security posture.

CYBERPOL

CYBERPOL

CYBERPOL is the leading Public Utility Agency for investigating cyber crimes and cyber attacks by criminals, international adversaries.

CionSystems

CionSystems

CionSystems provides identity, access and authentication solutions to improve security and streamline IT infrastructure management.

InAuth

InAuth

InAuth Security Platform delivers advanced device identification, risk detection, and analysis capabilities to help organizations limit risk and reduce fraud.

IT Security Association Germany (TeleTrusT)

IT Security Association Germany (TeleTrusT)

TeleTrusT is an IT Security association and network for IT security comprising members from industry, administration, consultancy and research.

Entersekt

Entersekt

Entersekt is an innovator in push-based authentication and app security.

Ethoca

Ethoca

Ethoca is a secure network for card issuers and merchants to connect and work cooperatively outside the payment network in a unique and powerful way.

DigitalXRaid

DigitalXRaid

DigitalXRAID is driven and motivated to ensure the bad guys don’t win. We’re dedicated to providing our clients with state-of-the-art cyber security solutions.

The ATOM Group

The ATOM Group

ATOM builds and secures technology for regulated industries. We design and build for a future we can all trust.

PKF Infuse

PKF Infuse

PKF Infuse provide the highest level of cybersecurity support, implementing practical solutions to protect against cyber-attacks, from simple phishing scams to complex data security breaches.

Route1

Route1

Route1 is an advanced provider of secure data intelligence solutions to drive your business forward.

Guidepost Solutions

Guidepost Solutions

Guidepost Solutions are a diverse, global team of investigators, experienced security and technology consultants, and compliance and monitoring experts.

NextGen Cyber Talent

NextGen Cyber Talent

NextGen Cyber Talent is a non-profit providing a platform to increase diversity and inclusion in the cybersecurity industry.

Acclaim Technical Services (ATS)

Acclaim Technical Services (ATS)

ATS provide operational products, services and solutions to the defense and intelligence communities for all types of critical mission needs.

Kontra

Kontra

Kontra application security training is an interactive and intuitive learning experience that engages developers.

Xeliumtech Solutions

Xeliumtech Solutions

Xeliumtech Solutions are a Digital Transformation partner with quality offerings in Mobile App Development, Ecommerce, Devops, RPA, AI, IoT development, Cybersecurity and more.