Picture this: You are the leader of a security operations center (SOC) and yet another major ransomware attack is making headlines. Within minutes of the news breaking, you receive questions about your company’s exposure to this ransomware. You’ve implemented your incident response plan and you’ve woken your team members from their beds.

Your team is overwhelmed, working tirelessly to analyze the fallout from WannaCry, Petya and other recent high-profile attacks. You’ve also been dealing with compliance audits, investigating insider threats, moving between data centers and bringing staff members up to speed — all essential activities for any security team leader.

Closing the Skills Gap With Cognitive Security

Cognitive security tools can help analysts juggle these responsibilities. New tools are reaching the market at an increasing rate, some of which are already integrated with your current security information and event management (SIEM) system and SOC infrastructure. The SOC has been generating huge amounts of data for various initiatives, such as compliance efforts, performance data and more. It also generates lots of noise and false positives. Meanwhile, the new analysts you’ve hired are struggling to come up to speed, and your established rock stars are busy fighting fires.

SOC team leaders need reliable solutions to help them cope with this skills gap. It’s time to invest in cognitive tools to ring-fence the firefighters and tune the system to reduce false positives. When determining which solutions to invest in, look for products that are simple, efficient and compatible with existing infrastructure. It’s also worth considering whether these tools can be tested at a responsible speed.

Augmenting Human Intelligence With Automated Insights

There are solutions that deliver on all these features and more. The centerpiece of IBM’s new Cognitive SOC is QRadar Advisor with Watson. It combines IBM QRadar, the industry’s leading security analytics platform, with the cognitive capabilities of Watson for Cyber Security to automatically investigate and qualify security incidents. It also integrates with most SIEM tools using a wizard-based solution. Most importantly, it enables analysts to stop fighting fires and focus on strategies to proactively protect the network from ransomware and other threats.

The cybersecurity skills gap is no match for Watson. Cognitive security augments those inexperienced new hires by uncovering hidden threats and automating insights. With this collective knowledge at their fingertips, your analysts can respond to threats with unprecedented speed and accuracy, and your rock stars have more time to improve your platform — and maybe get some much-needed shut-eye.

More from Artificial Intelligence

AI cybersecurity solutions detect ransomware in under 60 seconds

2 min read - Worried about ransomware? If so, it’s not surprising. According to the World Economic Forum, for large cyber losses (€1 million+), the number of cases in which data is exfiltrated is increasing, doubling from 40% in 2019 to almost 80% in 2022. And more recent activity is tracking even higher.Meanwhile, other dangers are appearing on the horizon. For example, the 2024 IBM X-Force Threat Intelligence Index states that threat group investment is increasingly focused on generative AI attack tools.Criminals have been…

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today