It might be surprising to note that the number of connected devices outgrew the world population back in 2008. By 2020, on average, each person on the planet will have about six devices. It’s fair to say that the Internet of Things (IoT) has already arrived, but what does this mean, and should you be concerned?

Surfing the Tsunami of IoT Challenges

Organizations are increasingly embracing the IoT, where business technology is connected to physical assets. These IoT-enabled solutions can offer a wide range of business and commercial applications, connecting tens of millions of devices to help drive optimization, cost reduction, access to real-time data, and speedier and safer decision-making.

However, this convergence will create a potential tsunami of security challenges if not properly addressed. Wearables, connected cars, smart cities and more contribute to this ecosystem, but these life-enhancing technologies bring additional problems. Many of these sensors and devices lack the proper hardware and software to meet burgeoning security demands.

Novel types of attacks and new cybersecurity regulations may take some industries by surprise. To succeed with the IoT transformation, companies must gather information to understand new threats and how to mitigate them within the context of big data.

The IoT opens up networks to a variety of threats as they connect to more and more devices and, eventually, to the cloud. The figure below shows an example of a home automation device connected to a home network with possible security threats.

Big Data, Big Problems

The traditional model of security is different when applied to IoT devices such as basic sensors and data collectors. A new approach is required to withstand the increasing volume of devices. Unfortunately, organizations don’t yet understand what this new approach should look like.

With the huge amounts of data we have available to us, it is impossible to understand it all. It’s important to train businesses to ask themselves what they need to know, not what they need to do. When combined with cognitive capabilities, this insight empowers analysts to ask the right questions, build foresight and adapt accordingly ahead of risk. In other words, data integration — or, to be technical, data harmonization — is absolutely essential for taking full advantage of your big data and the IoT revolution.

Listen to the podcast series: 5 Indisputable facts about IOT security

IBM’s Watson for Cyber Security represents a new relationship between technology and people in which the technology transforms from enabler to trusted advisor. By accessing and understanding all kinds of data — including unstructured data, which had previously been invisible to analysts — and making correlations at great scale and speed, Watson for Cyber Security helps analysts more effectively respond to threats across the network, endpoints and in the cloud. Security investigations can be shortened from days or weeks to mere minutes.

Watson Changes the Game

Why Watson? The IoT will soon be the largest single source of data on the planet, yet almost 90 percent of that data is never used. Video, audio, blog posts, tweets — it all overwhelms traditional computing systems and approaches to analytics. As a result, we can only see slivers of insight. The rest remains in the dark.

Watson is a game changer. It is the first — in fact, the only — complete cognitive computing platform built specifically to handle all the data processing challenges the IoT presents. With its unique ability to learn at scale, reason with purpose and interact naturally with users, Watson opens the door for enterprises, governments and individuals to more fully harness the potential of this data to generate new insights that can benefit businesses and society alike.

QRadar Advisor with Watson provides cognitive abilities that can help your team deal with security challenges. Its technologies can mimic human thought to understand advanced threats, triage those threats and make recommendations about dealing with potential or actual attacks.

A Continued Investment

IBM is investing heavily in the IoT and aspires to become the platform for the IoT market. In March 2015, we announced a $3 billion investment over the next four years to deliver IoT solutions and services to customers. With this investment, the company plans to create, build, and manage connected products and systems at the heart of the IoT.

Using its industry-leading cognitive security capabilities, Watson can be your trusted advisor to help you make sense of a sea of structured and unstructured data. QRadar Advisor with Watson taps into the vast array of data to uncover new threat patterns, deliver faster and more accurate analysis of security threats, and save precious time and enterprise security resources.

Learn More About Cognitive Security Analytics and what it can do for your business

More from Artificial Intelligence

Generative AI security requires a solid framework

4 min read - How many companies intentionally refuse to use AI to get their work done faster and more efficiently? Probably none: the advantages of AI are too great to deny.The benefits AI models offer to organizations are undeniable, especially for optimizing critical operations and outputs. However, generative AI also comes with risk. According to the IBM Institute for Business Value, 96% of executives say adopting generative AI makes a security breach likely in their organization within the next three years.CISA Director Jen…

Self-replicating Morris II worm targets AI email assistants

4 min read - The proliferation of generative artificial intelligence (gen AI) email assistants such as OpenAI’s GPT-3 and Google’s Smart Compose has revolutionized communication workflows. Unfortunately, it has also introduced novel attack vectors for cyber criminals. Leveraging recent advancements in AI and natural language processing, malicious actors can exploit vulnerabilities in gen AI systems to orchestrate sophisticated cyberattacks with far-reaching consequences. Recent studies have uncovered the insidious capabilities of self-replicating malware, exemplified by the “Morris II” strain created by researchers. How the Morris…

Open source, open risks: The growing dangers of unregulated generative AI

3 min read - While mainstream generative AI models have built-in safety barriers, open-source alternatives have no such restrictions. Here’s what that means for cyber crime.There’s little doubt that open-source is the future of software. According to the 2024 State of Open Source Report, over two-thirds of businesses increased their use of open-source software in the last year.Generative AI is no exception. The number of developers contributing to open-source projects on GitHub and other platforms is soaring. Organizations are investing billions in generative AI…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today