It might be surprising to note that the number of connected devices outgrew the world population back in 2008. By 2020, on average, each person on the planet will have about six devices. It’s fair to say that the Internet of Things (IoT) has already arrived, but what does this mean, and should you be concerned?

Surfing the Tsunami of IoT Challenges

Organizations are increasingly embracing the IoT, where business technology is connected to physical assets. These IoT-enabled solutions can offer a wide range of business and commercial applications, connecting tens of millions of devices to help drive optimization, cost reduction, access to real-time data, and speedier and safer decision-making.

However, this convergence will create a potential tsunami of security challenges if not properly addressed. Wearables, connected cars, smart cities and more contribute to this ecosystem, but these life-enhancing technologies bring additional problems. Many of these sensors and devices lack the proper hardware and software to meet burgeoning security demands.

Novel types of attacks and new cybersecurity regulations may take some industries by surprise. To succeed with the IoT transformation, companies must gather information to understand new threats and how to mitigate them within the context of big data.

The IoT opens up networks to a variety of threats as they connect to more and more devices and, eventually, to the cloud. The figure below shows an example of a home automation device connected to a home network with possible security threats.

Big Data, Big Problems

The traditional model of security is different when applied to IoT devices such as basic sensors and data collectors. A new approach is required to withstand the increasing volume of devices. Unfortunately, organizations don’t yet understand what this new approach should look like.

With the huge amounts of data we have available to us, it is impossible to understand it all. It’s important to train businesses to ask themselves what they need to know, not what they need to do. When combined with cognitive capabilities, this insight empowers analysts to ask the right questions, build foresight and adapt accordingly ahead of risk. In other words, data integration — or, to be technical, data harmonization — is absolutely essential for taking full advantage of your big data and the IoT revolution.

Listen to the podcast series: 5 Indisputable facts about IOT security

IBM’s Watson for Cyber Security represents a new relationship between technology and people in which the technology transforms from enabler to trusted advisor. By accessing and understanding all kinds of data — including unstructured data, which had previously been invisible to analysts — and making correlations at great scale and speed, Watson for Cyber Security helps analysts more effectively respond to threats across the network, endpoints and in the cloud. Security investigations can be shortened from days or weeks to mere minutes.

Watson Changes the Game

Why Watson? The IoT will soon be the largest single source of data on the planet, yet almost 90 percent of that data is never used. Video, audio, blog posts, tweets — it all overwhelms traditional computing systems and approaches to analytics. As a result, we can only see slivers of insight. The rest remains in the dark.

Watson is a game changer. It is the first — in fact, the only — complete cognitive computing platform built specifically to handle all the data processing challenges the IoT presents. With its unique ability to learn at scale, reason with purpose and interact naturally with users, Watson opens the door for enterprises, governments and individuals to more fully harness the potential of this data to generate new insights that can benefit businesses and society alike.

QRadar Advisor with Watson provides cognitive abilities that can help your team deal with security challenges. Its technologies can mimic human thought to understand advanced threats, triage those threats and make recommendations about dealing with potential or actual attacks.

A Continued Investment

IBM is investing heavily in the IoT and aspires to become the platform for the IoT market. In March 2015, we announced a $3 billion investment over the next four years to deliver IoT solutions and services to customers. With this investment, the company plans to create, build, and manage connected products and systems at the heart of the IoT.

Using its industry-leading cognitive security capabilities, Watson can be your trusted advisor to help you make sense of a sea of structured and unstructured data. QRadar Advisor with Watson taps into the vast array of data to uncover new threat patterns, deliver faster and more accurate analysis of security threats, and save precious time and enterprise security resources.

Learn More About Cognitive Security Analytics and what it can do for your business

More from Artificial Intelligence

SOCs Spend 32% of the Day On Incidents That Pose No Threat

4 min read - When it comes to the first line of defense for any company, its Security Operations Center (SOC) is an essential component. A SOC is a dedicated team of professionals who monitor networks and systems for potential threats, provide analysis of detected issues and take the necessary actions to remediate any risks they uncover. Unfortunately, SOC members spend nearly one-third (32%) of their day investigating incidents that don't actually pose a real threat to the business according to a new report…

4 min read

Machine Learning Applications in the Cybersecurity Space

3 min read - Machine learning is one of the hottest areas in data science. This subset of artificial intelligence allows a system to learn from data and make accurate predictions, identify anomalies or make recommendations using different techniques. Machine learning techniques extract information from vast amounts of data and transform it into valuable business knowledge. While most industries use these techniques, they are especially prominent in the finance, marketing, healthcare, retail and cybersecurity sectors. Machine learning can also address new cyber threats. There…

3 min read

Now Social Engineering Attackers Have AI. Do You? 

4 min read - Everybody in tech is talking about ChatGPT, the AI-based chatbot from Open AI that writes convincing prose and usable code. The trouble is malicious cyber attackers can use generative AI tools like ChatGPT to craft convincing prose and usable code just like everybody else. How does this powerful new category of tools affect the ability of criminals to launch cyberattacks, including social engineering attacks? When Every Social Engineering Attack Uses Perfect English ChatGPT is a public tool based on a…

4 min read

Can Large Language Models Boost Your Security Posture?

4 min read - The threat landscape is expanding, and regulatory requirements are multiplying. For the enterprise, the challenges just to keep up are only mounting. In addition, there’s the cybersecurity skills gap. According to the (ISC)2 2022 Cybersecurity Workforce Study, the global cybersecurity workforce gap has increased by 26.2%, which means 3.4 million more workers are needed to help protect data and prevent threats. Leveraging AI-based tools is unquestionably necessary for modern organizations. But how far can tools like ChatGPT take us with…

4 min read