November 29, 2016 By Martin Borrett 2 min read

Early in November, I spoke to an audience of more than 400 professionals at the Payments U.K. Cyber Security and Fraud Seminar. I thoroughly enjoyed the experience, not least for the fantastic acoustics in the oak-paneled auditorium and the challenging questions that the extremely engaged audience threw my way via Nicholas Witchell, a British journalist and newscaster for BBC News, who served as compere.

 

Cognitive Computing Is the Future of Security

My presentation focused on cognition and the future of security. I was able to share my insights and discuss the exciting innovations that IBM Security has made in this space. The event coincided with the day that the new U.K. Chancellor, Philip Hammond, confirmed the government’s £1.9 billion cybersecurity program for the next five years — very timely indeed.

To set the scene, I discussed the evolution of security, from the pre-2005 moats-and-castles approach of continuously building defenses, to today’s common practice of leveraging security intelligence. We are now entering the Cognitive Era, which provides us with an opportunity to accelerate investigation and response times and reduce the cost and complexity of dealing with cybercrime.

Security teams continue to face an onslaught of serious challenges as threats and fraudulent activities grow in sophistication and volume. With new technologies and strategies, organizations need to think differently about security and ensure that they take a coordinated and sophisticated approach to outsmart attackers, secure their business and improve enterprise risk.

Adapting to the Cognitive Era

To help companies prepare for the Cognitive Era, IBM Security is developing Watson for Cyber Security to help security analysts gain powerful insights, leverage threat research and drive better outcomes through a trusted adviser, in turn enabling better human decision-making.

Watson uses cognitive technology to find, analyze and understand the massive amounts of structured and unstructured security data that overwhelm even the best of today’s security professionals. It exploits data mining, machine learning, natural language processing and human-computer interaction to understand, reason and learn the same way people do.

I am often asked whether this type of technology will replace humans, and my answer remains the same: We will always need human involvement in our quest to protect, detect and respond to security breaches. Security intelligence remains essential — applying cognitive solutions to the effort enhances the analyst’s abilities, providing actionable information with speed and scale like never before. This enables organizations to make faster and more informed decisions. Cognitive security will also help to bridge the skills gap in the industry.

It’s time to adapt to the Cognitive Era.

More from

Hive0137 and AI-supplemented malware distribution

12 min read - IBM X-Force tracks dozens of threat actor groups. One group in particular, tracked by X-Force as Hive0137, has been a highly active malware distributor since at least October 2023. Nominated by X-Force as having the “Most Complex Infection Chain” in a campaign in 2023, Hive0137 campaigns deliver DarkGate, NetSupport, T34-Loader and Pikabot malware payloads, some of which are likely used for initial access in ransomware attacks. The crypters used in the infection chains also suggest a close relationship with former…

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

Crisis communication: What NOT to do

4 min read - Read the 1st blog in this series, Cybersecurity crisis communication: What to doWhen an organization experiences a cyberattack, tensions are high, customers are concerned and the business is typically not operating at full capacity. Every move you make at this point makes a difference to your company’s future, and even a seemingly small mistake can cause permanent reputational damage.Because of the stress and many moving parts that are involved, businesses often fall short when it comes to communication in a crisis.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today