Enterprise security operations centers (SOCs) are being crushed under the burden of an estimated 200,000 events per day, according to IBM research. And while that’s a lot of events, what complicates matters even further is that only a tiny percentage of those events actually require immediate action. But because alerts lack context, security teams must treat one each equally. That means the average enterprise can waste more than 20,000 hours per year on malware containment alone.

Enter Watson for Cyber Security and IBM QRadar Advisor with Watson

IBM QRadar Advisor with Watson is the first solution to apply the power of Watson for Cyber Security. Watson for Cyber Security maintains a specialized corpus of security knowledge, which includes previously invisible unstructured data in the form of blogs, websites, threat intelligence feeds and more.

But Watson for Cyber Security is far more than a giant security library. Its real-time learning capabilities allow it to derive new knowledge and discover hidden relationships in the information it consumes. QRadar Advisor with Watson combines the analytical prowess of IBM QRadar and the cognitive capabilities of Watson for Cyber Security to investigate and qualify security incidents automatically and advise security analysts on nature and extent of the incident.

 

 

That means security analysts can use cognitive capabilities for threat investigations and remediation — shortening cybersecurity investigations from days or weeks to mere minutes.

Watch our on-demand webinar to see a live demo of QRadar Advisor with Watson

More from Artificial Intelligence

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

What should an AI ethics governance framework look like?

4 min read - While the race to achieve generative AI intensifies, the ethical debate surrounding the technology also continues to heat up. And the stakes keep getting higher.As per Gartner, “Organizations are responsible for ensuring that AI projects they develop, deploy or use do not have negative ethical consequences.” Meanwhile, 79% of executives say AI ethics is important to their enterprise-wide AI approach, but less than 25% have operationalized ethics governance principles.AI is also high on the list of United States government concerns.…

GenAI: The next frontier in AI security threats

3 min read - Threat actors aren’t attacking generative AI (GenAI) at scale yet, but these AI security threats are coming. That prediction comes from the 2024 X-Force Threat Intelligence Index. Here’s a review of the threat intelligence types underpinning that report.Cyber criminals are shifting focusIncreased chatter in illicit markets and dark web forums is a sign of interest. X-Force hasn’t seen any AI-engineered campaigns yet. However, cyber criminals are actively exploring the topic. In 2023, X-Force found the terms “AI” and “GPT” mentioned…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today