IBM Watson Fights Real-Time Cyber Crime

You may know Watson as IBM’s Jeopardy-winning, cookbook-writing, dress-designing, weather-predicting supercomputer-of-all trades. Now it’s embarking on its biggest challenge yet: Preventing cybercrime in finance, healthcare, and other fields.

Starting early December, 40 organizations will begin to rely upon the clever computers cognitive power to help spot cybercrime. The Watson for Cybersecurity beta program helps IBM too, because Watson’s real-world experience will help it hone its skills and work within specific industries. After all, the threats that keep security experts at Sun Life Financial up at night differ from those that spook the cyber-sleuths at University of New Brunswick.

Watson isn’t starting from scratch here. IBM researchers started training Watson in the fundamentals of cybersecurity last spring so the computer could begin to analyse and prevent threats. Now it graduates to real-world situations to further hone its skills. Think of it as the world’s smartest intern.

Ransomware

The computer’s done a lot of cramming since May. Cyberspace is vast, and the more of it Watson recognizes and understands, the more effectively it can discern the difference between benign threats and real problems. Watson’s great skill isn’t the ability to comb through huge amounts of information (though it does that too), it’s the ability to contextualize that information by combining structured data such as specific security events with unstructured data like white papers, research reports, and blog posts.

“Cognitive computing is 30-40% faster than traditional rule-based systems,” says Forrester Research analyst Andras Cser, who adds that cognitive systems like Watson also result in fewer false positives. Because it learns as it goes, it doesn’t repeat the same mistakes.

Before it could do that, though, Watson needed to study. Researchers fed Watson up to 15,000 documents each month through the fall, linking it to libraries and news feeds in real-time to keep its knowledge base current. Volume, too, is only half the battle; Watson must understand what words mean before it can know how they relate.

Take “ransomware.” You might know it as an increasingly prevalent type of hack that holds computers and systems hostage until the victim pays up. For a while Watson, thought it was a place.

When IBM researchers annotated “ransomware” documents with a definition, Watson finally understood that his teachers aren’t obsessed with some far-flung metropolis.

It’s a fun anecdote that illustrates the challenges and opportunities of bringing Watson up to speed. What it doesn’t know, it can use context to guess. If it guesses wrong, it can learn. And once it learns, it never forgets. Which is where the beta program comes in.

Dialect Coach

Now, Watson’s beta isn’t like the kind you associate with consumer software.

“In a regular development project, you assign a testing matrix and go through testing to see how it deals with the tests,” says Barlow. “In this case, it’s much more like human learning. There are things it can do in grade school, things it can do in high school, things it can do when it goes off to college, and things it can do when it’s had a lot of experience in the industry. Watson will follow a very similar journey.”

In other words, Watson currently understands the fundamentals of security. Now it must learn the specific vernacular that peppers various use cases. “The language of security in the healthcare industry is probably completely different than the language of security in the energy sector,” says Barlow.

During the beta, Watson will embed with a few dozen companies and provide their security analysts with reports and recommendations. Specifically, Watson can identify whether a security event is associated with known malware and provide relevant background, as well as identify suspicious user behavior. Also think of password entry; are repeated failed attempts an absentminded user, or an attempted break-in?

Watson doesn’t replace humans, but rather helps make them faster and more comprehensive in their response. IBM research shows that security teams sift through an average of 200,000 potentially significant events per day; a computer that prioritizes those events and reveals how they fit into the broader security climate saves worlds of time.

And in the process, save companies, and their customers, from potentially crippling threats. Not a bad learning curve for a computer that until recently was looking for ransomware on a map.

Wired:           IBM’s Watson Will Use AI To Treat Cancer:

 

 

« Behavior Analytics Tools For Cyber-Security
Cyber Police Stations Across India »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Solarflare

Solarflare

Solarflare is a leading provider of intelligent networking I/O software and hardware platforms that accelerate, monitor and secure network data.

Zivver

Zivver

Zivver is the effortless, secure email platform, powering the next generation of secure communications.

Kudelski Security

Kudelski Security

Kudelski Security is an international cybersecurity company providing innovative, independent and tailored security solutions for large enterprise and public sector clients.

KayHut

KayHut

KayHut is a young, innovative company engaged in cyber research and security solutions.

LiveVault

LiveVault

LiveVault delivers fully automated, turnkey, backup over the Internet or a private network connection for uninterrupted remote data protection.

Cyber Security Centre - Daffodil International University

Cyber Security Centre - Daffodil International University

Cyber Security Centre, DIU is a non-profitable organization which is focused on applied research in cyber security.

VS Security Products

VS Security Products

VS Security Products design, manufacture and sell the most extensive range of degaussers and data destroyers on the market, suitable for all types of magnetic media.

Appgate

Appgate

Appgate is the secure access company. We empower how people work and connect by providing solutions purpose-built on Zero Trust security principles.

Netragard

Netragard

Netragard has an established reputation for providing high-quality offensive and defensive security services.

Reliance Cyber

Reliance Cyber

Reliance Cyber (formerly Reliance ACSN) help to monitor and manage your organisation’s security infrastructure 24/7, so you can make sure all threats and issues are dealt with.

ADVA Optical Networking

ADVA Optical Networking

ADVA is a company founded on innovation and focused on helping our customers succeed. Our technology forms the building blocks of a shared digital future and empowers networks across the globe.

OSC Edge

OSC Edge

OSC was founded with the vision of providing expert solutions in IT to government and businesses. OSC Edge empowers organizations with solutions that prepare them for today and tomorrow.

Myntex

Myntex

Myntex® builds the future of mobile security. We empower our partners to deliver exclusive mobile endpoint security software, fortifying against mobile threats, device exploits and data exfiltration.

CyberSecAsia

CyberSecAsia

CyberSecAsia series conference is the one and only decision-makers gathering for CISO and info security experts in Asia.

LetsData

LetsData

LetsData uses AI to provide governments, intergovernmental organizations, civil society, and businesses with data-empowered decisions on communication in the age of online disinformation.

SecureFlag

SecureFlag

SecureFlag is dedicated to enhancing secure coding across all technical profiles within the Software Development Lifecycle.