IBM Watson To Fight Cybercrime - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Data Management

IBM Watson To Fight Cybercrime

After Watson beat human players on the TV game show Jeopardy!, its cognitive might was put to work in a variety of fields, including healthcare and finance. Now IBM Security is dispatching the supercomputer to fight cybercrime.

7 Ways Cloud Computing Propels IT Security
7 Ways Cloud Computing Propels IT Security
(Click image for larger view and slideshow.)

On Tuesday, IBM announced that it is expanding the role of Watson from beyond the healthcare, financial, and customer service industries to fighting cybercrime, as it unveiled Watson for Cyber Security.

As part of this launch, Watson will team up with eight universities in the fall to expand its cloud-based knowledge of the cyber-security landscape. The universities aim to annotate and feed Watson's machine-learning system with security reports and data.

"The key piece to remember is 'garbage in equals garbage out.' If Watson is given bad or incomplete information, it will never be effective in learning and predicting a threat. If the data is real, complete, and patterns can be established, it will be able to predict what potentially can happen, and, most importantly, build future models that can be scaled to help everyone. This is why university help in programming Watson is so important. If successful, it might very well be a game changer in the next decade (for using cognitive technology in cyber security)," Morey Haber, vice president of technology at BeyondTrust, told InformationWeek in an interview.

Watson will work with the California State Polytechnic University, Pomona; Pennsylvania State University; MIT; NYU; the University of Maryland, Baltimore County (UMBC); the University of New Brunswick; the University of Ottawa; and the University of Waterloo.

IBM is planning to process up to 15,000 security documents a month during the next phase of Watson's training.

The documents will include threat intelligence reports, cybercrime strategies, and threat databases, which will help Watson understand infection methods, compromise indicators, and how to identify advanced and persistent threats.

(Image: DKart/iStockphoto)

(Image: DKart/iStockphoto)

The goal is to help security analysts use cognitive systems to determine emerging threats and provide strategies to resolve them.

IBM expects to start beta production deployments for Watson for Cyber Security later this year. Marc van Zadelhoff, general manager of IBM Security, said in a statement:

The volume and velocity of data in security is one of our greatest challenges in dealing with cybercrime. By leveraging Watson's ability to bring context to staggering amounts of unstructured data, impossible for people alone to process, we will bring new insights, recommendations, and knowledge to security professionals, bringing greater speed and precision to the most advanced cybersecurity analysts, and providing novice analysts with on-the-job training.

Haber, however, cautioned that vendors claim they use artificial intelligence all the time and, unfortunately, the industry widely dismisses AI as another buzzword. But he noted Watson is different.

[Read IBM, SAP Strike Deeper Cloud Partnership.]

"The industry recognizes (Watson) is a real AI engine based on a supercomputer and not an Intel i7 CPU in your laptop," Haber told us. "Based on raw horsepower and very sophisticated programming, it takes AI algorithms to a new level by [having them] learning and adapting themselves to the data and tasks assigned. It is closer to a true learning system than we have ever achieved before, and it has been tasked with helping meet modern cyber-security challenges."

Nonetheless, Haber noted it will be a few years before Watson will actually have an impact within an organization. But if Watson for Cyber Security is successful in training its intelligence engines on the nuances of cyber-security, Haber said, "it will be incredibility effective."

Dawn Kawamoto is an Associate Editor for Dark Reading, where she covers cybersecurity news and trends. She is an award-winning journalist who has written and edited technology, management, leadership, career, finance, and innovation stories for such publications as CNET's ... View Full Bio

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Charlie Babcock
Charlie Babcock,
User Rank: Author
5/10/2016 | 9:26:14 PM
Welcome, Watson
This is a promising field in which to apply Watson. Civil mankind needs more intelligence to use against the mischief makers, intruders and outright criminals. 
User Rank: Ninja
5/10/2016 | 7:47:00 PM
Has Cyber Crime Finally Met It's Match ?

It is about time we use the machine learning strength of Watson to adress this issue of cybercrime.    

Though I am worried that GIGO will hamper the effectiveness of Watson in the end.   I hope I am wrong but cleaning data is one of the most difficult jobs around and not many are good at it.


Good luck IBM and Watson.

The State of Chatbots: Pandemic Edition
Jessica Davis, Senior Editor, Enterprise Apps,  9/10/2020
Deloitte on Cloud, the Edge, and Enterprise Expectations
Joao-Pierre S. Ruth, Senior Writer,  9/14/2020
Data Science: How the Pandemic Has Affected 10 Popular Jobs
Cynthia Harvey, Freelance Journalist, InformationWeek,  9/9/2020
White Papers
Register for InformationWeek Newsletters
2020 State of DevOps Report
2020 State of DevOps Report
Download this report today to learn more about the key tools and technologies being utilized, and how organizations deal with the cultural and process changes that DevOps brings. The report also examines the barriers organizations face, as well as the rewards from DevOps including faster application delivery, higher quality products, and quicker recovery from errors in production.
Current Issue
IT Automation Transforms Network Management
In this special report we will examine the layers of automation and orchestration in IT operations, and how they can provide high availability and greater scale for modern applications and business demands.
Flash Poll