The is the second article in a three-part series on how IBM Watson for Cyber Security can help analysts win the arms race against the increasingly sophisticated cybercrime landscape. Be sure to read part 1 for the full story.

Many large enterprises with significant investment in cybersecurity are excited at the prospect of cognitive security. But what about smaller enterprises? Is Watson too big, too complex or simply too expensive for an organization of that size? For a small business, a managed security services provider (MSSP) can make all the difference.

Living the Dream

Many small business owners start out with a dream of independence and success. They want to sell their goods and provide great consumer services. They know they need to protect their businesses, but their dreams did not include hiring security specialists to worry about compliance with data protection laws, let alone a highly volatile threat landscape. Many small businesses suffer six-figure losses as the result of a data breach, and a 2011 survey showed that 60 percent of them were forced out of business within six months of an attack.

Some owners may not immediately see how cognitive security can help them protect their business. Although Watson will make security analysts more productive, it will not replace them. Small or even midsized business owners might see the lack of a dedicated security staff as a barrier to getting any benefit out of Watson, despite the outstanding results other companies have enjoyed.

But this is not a new story. The same proviso has applied to many security tools for years. For business owners, the answer is an old story, too: That’s why they often outsource noncore business functions to specialists, rather than trying to specialize in everything.

Enter Managed Security Services

A cannier business might approach a trusted specialist security company in its local market for advice. Some businesses outsource security operations to a partner who can provide the best combination of people, process and technology. This arrangement works very well in most cases, but there are at least two caveats that arise in almost every relationship:

  1. The client business wants the service to be provided at the most competitive cost.
  2. The client more or less wants a guarantee against being breached.

Experienced cybersecurity professionals know that good security isn’t free. They also know that it is impossible to guarantee absolute immunity from data breaches. The truth is, many security specialists strive conscientiously to provide the most comprehensive service they can within the constraints of the client’s budget and the cost of providing the service themselves.

The Value of Cognitive Security

A good MSSP tries to meet the challenge to include the right technology and expertise while staying within budget. At first glance, a new cognitive system such as Watson can appear to be just another cost. In the long run, however, cognitive security saves money and improves the organization’s incident response capabilities, which makes for a valuable addition to any small business’s security suite.

A Good Investment

Throughout the history of IT, business owners have invested in technology with the hopes that their companies would either grow to recoup the cost or save money on existing processes. In this respect, Watson is like any other technology. The main thrust of cognitive security is that it provides context for faster, easier problem identification and resolution. Ultimately, this is about saving money as well as time. Business owners should look at the total cost of ownership rather than the book price when investing in new capabilities.

Reduce the Threat Surface

You can never completely avoid being breached, but you have some control over how quickly you discover a breach and how you respond to it. Watson can help businesses discover and respond to threats much faster and more comprehensively. It also has the potential to help companies reduce the threat landscape in their own infrastructures as well as their clients’. It will supplement and extend analysts’ awareness of where threats lie. This planning is critical to reduce the attack surface of your infrastructure.

Watson Is a Game Changer

You may be surprised at how relatively inexpensive Watson is. All circumstances differ, but it’s worth talking to your IBM sales team to find out how affordable Watson is for you. With the right trusted advisers to help small and medium businesses, Watson should be as much of a game changer for those companies as it is already proving to be for others.

Learn More About Watson for Cyber Security

More from Artificial Intelligence

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Testing the limits of generative AI: How red teaming exposes vulnerabilities in AI models

4 min read - With generative artificial intelligence (gen AI) on the frontlines of information security, red teams play an essential role in identifying vulnerabilities that others can overlook.With the average cost of a data breach reaching an all-time high of $4.88 million in 2024, businesses need to know exactly where their vulnerabilities lie. Given the remarkable pace at which they’re adopting gen AI, there’s a good chance that some of those vulnerabilities lie in AI models themselves — or the data used to…

Security roundup: Top AI stories in 2024

3 min read - 2024 has been a banner year for artificial intelligence (AI). As enterprises ramp up adoption, however, malicious actors have been exploring new ways to compromise systems with intelligent attacks.With the AI landscape rapidly evolving, it's worth looking back before moving forward. Here are our top five AI security stories for 2024.Can you hear me now? Hackers hijack audio with AIAttackers can fake entire conversations using large language models (LLMs), voice cloning and speech-to-text software. This method is relatively easy to…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today