Authored by Jeff Man.

When I first learned that I would be attending IBM InterConnect to provide feedback on IBM’s efforts related to cloud, the Internet of Things (IoT) and Watson, I started to reflect on how much IBM has already influenced the IT and security industries during the span of my career.

My first recollection was from my early days of working for a boutique consulting practice where we often lost bids to larger, more established firms. I became familiar with a saying, “Nobody ever got fired for hiring IBM,” which I took to mean, “You might not be getting the best, but you’re getting a company with a solid reputation, so nobody will hold you accountable for their efforts, good or bad.”

The Evolution of IBM Innovation

The more I thought about my experiences with IBM, the more I realized how many IBM technologies I have encountered over the years and how innovative and life-changing they were. I thought back to my college days and remembered how invaluable my IBM Selectric II electric typewriter was for doing homework and writing term papers. I don’t even remember how I got it — I think it was surplus from my mom’s office — but I sure remember how much quicker and easier it was to use over a manual typewriter.

A few years later, when I began my career at the National Security Agency (NSA), I was soon provided with a brand new toy — a personal computer. In those days, we got upgraded systems nearly every year, and I still remember when I was upgraded to the IBM AT, complete with a 10 MB hard disk drive! Even my first laptop was an IBM PC Convertible, which weighed a mere 13 pounds and featured an Intel 8088 CPU running at 4.77 MHz, 256 KB of RAM and dual 3.5-inch floppy drives.

During my time as a security consultant in the commercial world, I often encountered IBM mainframes running my customers’ critical business and financial systems. Even as a PCI Qualified Security Assessor (QSA), I frequently ran into the IBM 4690 operating system, which was specifically designed to run point-of-sale (POS) systems.

IBM has certainly been an innovative company over the years, which is why it still around and driving innovation today. InterConnect promises to be an exciting forum for learning and experiencing what IBM is doing to bring could, IoT and cognitive technologies to cybersecurity.

Five days is not enough time to do justice to even one of these topics, yet alone all three. InterConnect is offering over 2,000 sessions that include keynotes, discussions, breakout sessions, labs, hands-on training and innovation talks that are sure to highlight some of IBM’s most valuable tools for managing and securing cloud and IoT infrastructure.

Peer Into the Future at InterConnect

While there is an obvious security aspect in play with cloud services, there is a lot of ground to cover with the variety IBM offers. The IBM Bluemix cloud platform has something for everybody in terms of infrastructure, compute services, data storage and network operations. The company is even attempting to use Watson to architect and create customized cloud solutions for each customer.

IBM advertises three IoT services: the IBM Watson IoT Platform, which enables you to set up and manage your connected devices; Context Mapping, which provides physical object trajectories by leveraging geospatial services; and the IoT for Electronics Starter, which allows apps to manage connected electronics devices in your network.

Every cloud and IoT-related product IBM is advertising includes Watson as a critical component or, at least, a key discriminant. As I considered the three topics, I found myself most interested in Watson, cognitive security, and the notions of artificial intelligence (AI) and machine learning.

Man and Machine

AI has been a prevalent theme in science fiction since the invention of computers. My father was an avid science fiction fan, and one of my earliest childhood memories was being taken to a movie theater to see “2001: A Space Odyssey.” One of the stars of the film is an artificially intelligent computer called Hal, which is designed to be infallible and error proof, but — spoiler alert — eventually malfunctions and must be shut down.

I also watched “Star Trek: The Original Series” as a young child in the 1960s, and I can remember several episodes that involved humans combating supposedly superior intellectual forces in the form of supercomputers. There was Nomad from “The Changeling,” Norman from “I, Mudd,” and M-5 from “The Ultimate Computer.”

The main recurring theme is that since machines are inevitably flawed and therefore untrustworthy, they could never truly replace humankind. This theme even permeates into my favorite hacker movie, “WarGames,” in which the protagonists struggle to distinguish between reality and fantasy.

The release of “The Terminator” induced a significant shift in the science fiction canon. Now, the typical storyline revolves around a scenario in which machines are perfect, self-aware and determined to exterminate the real threat to civilization: humanity. In “Ex Machina,” for example, machines consider humans to be entirely unnecessary.

There is a third theme in science fiction when it comes to artificial intelligence, which is embodied in the character of Data from “Star Trek: The Next Generation.” Data is a self-aware, artificially intelligent entity that recognizes its own machine state and aspires to become more human. Most importantly, Data recognizes that being human is the ultimate, desired state.

The Cognitive Security Era Is Near

Sadly, at least for now, there is still a significant gap between the science fiction version of artificial intelligence and the reality. We recently had a good discussion about artificial intelligence on “Paul’s Security Weekly,” where we discussed the capabilities of machine learning, the direction of current research and some of the biggest challenges in designing smarter, self-learning machines.

That brings us back to IBM Watson. I really want to meet Watson. I want Watson to be something along the lines of the Hal 9000, but with the demeanor of Data.

IBM has certainly left a huge footprint on the technology landscape and wants to keep it going. With all this in mind, I look forward to soaking up as much information and knowledge as I can at InterConnect.

More from Artificial Intelligence

How prepared are you for your first Gen AI disruption?

5 min read - Generative artificial intelligence (Gen AI) and its use by businesses to enhance operations and profits are the focus of innovation in virtually every sector and industry. Gartner predicts that global spending on AI software will surge from $124 billion in 2022 to $297 billion by 2027. Businesses are upskilling their teams and hiring costly experts to implement new use cases, new ways to leverage data and new ways to use open-source tooling and resources. What they have failed to look…

Brands are changing cybersecurity strategies due to AI threats

3 min read -  Over the past 18 months, AI has changed how we do many things in our work and professional lives — from helping us write emails to affecting how we approach cybersecurity. A recent Voice of SecOps 2024 study found that AI was a huge reason for many shifts in cybersecurity over the past 12 months. Interestingly, AI was both the cause of new issues as well as quickly becoming a common solution for those very same challenges.The study was conducted…

Does your business have an AI blind spot? Navigating the risks of shadow AI

4 min read - With AI now an integral part of business operations, shadow AI has become the next frontier in information security. Here’s what that means for managing risk.For many organizations, 2023 was the breakout year for generative AI. Now, large language models (LLMs) like ChatGPT have become household names. In the business world, they’re already deeply ingrained in numerous workflows, whether you know about it or not. According to a report by Deloitte, over 60% of employees now use generative AI tools…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today