We are the Borg. You will be assimilated. Resistance is futile.

Organizations today find themselves in a situation not unlike that of the Enterprise crew in “Star Trek.” They are facing a formidable, technologically advanced enemy capable of taking over key components of the organization. In one episode of “Star Trek,” in fact, the Borg collective takes control of Captain Jean-Luc Picard himself, to the horror of his crew.

Cognitive Security Fills In Critical Gaps

So how can organizations fight an enemy of great patience and persistence, capable of launching surgically targeted attacks and assimilating systems and people into its own collective? Machine learning is our best hope.

Machine learning is our best hope to help incident responders, security analysts and, ultimately, security leaders restore a sense of balance, a sense of peace in the universe. When the time to discover an intrusion is measured in months or years; when the people responsible for keeping track of threat vectors can’t keep up; when the incident responders can’t determine quickly and accurately enough whether an alert is a benign event or the tip of the iceberg for what could be a jaw-dropping cyber incident … where can you turn?

“Star Trek,” of course. And when you’re done binge-watching all the episodes, you can start looking into the progress that has been made in cognitive security — the application of artificial intelligence and machine learning concepts to the cybersecurity battlefront.

A recent report by IBM’s Institute for Business Value (IBV), based on a survey of 700 security leaders back here on Earth, revealed that IT teams are looking for ways to more effectively address three main shortcomings in their security response capabilities: a speed gap, an accuracy gap and an intelligence gap.

Resistance Is Futile Without Machine Learning

According to the survey, most security leaders have high hopes for cognitive security, though there will certainly be some resistance — most likely from the same folks who resisted the move to the cloud, or those who try to argue that their organizations should steer clear of investments in Internet of Things (IoT) projects.

But even this resistance will be overcome — but not by the Borg. It will be overcome by pressure from competitors, pressure from the marketplace or pressure from top leadership. Yes, machine learning can be scary; I fully realize the weight of these words knowing that in the very near future, such an intelligence might be reading this very article, processing its words, absorbing its points and counterpoints and perhaps even making sense of my analogies. However, without the assistance of cognitive computing, I don’t see a way for us to level the cybersecurity playing field.

We have no choice but to boldly go where no human has gone before — to trust artificial intelligence.

Read the full IBM report on Cybersecurity in the cognitive era

More from Artificial Intelligence

Machine Learning Applications in the Cybersecurity Space

3 min read - Machine learning is one of the hottest areas in data science. This subset of artificial intelligence allows a system to learn from data and make accurate predictions, identify anomalies or make recommendations using different techniques. Machine learning techniques extract information from vast amounts of data and transform it into valuable business knowledge. While most industries use these techniques, they are especially prominent in the finance, marketing, healthcare, retail and cybersecurity sectors. Machine learning can also address new cyber threats. There…

3 min read

Now Social Engineering Attackers Have AI. Do You? 

4 min read - Everybody in tech is talking about ChatGPT, the AI-based chatbot from Open AI that writes convincing prose and usable code. The trouble is malicious cyber attackers can use generative AI tools like ChatGPT to craft convincing prose and usable code just like everybody else. How does this powerful new category of tools affect the ability of criminals to launch cyberattacks, including social engineering attacks? When Every Social Engineering Attack Uses Perfect English ChatGPT is a public tool based on a…

4 min read

Can Large Language Models Boost Your Security Posture?

4 min read - The threat landscape is expanding, and regulatory requirements are multiplying. For the enterprise, the challenges just to keep up are only mounting. In addition, there’s the cybersecurity skills gap. According to the (ISC)2 2022 Cybersecurity Workforce Study, the global cybersecurity workforce gap has increased by 26.2%, which means 3.4 million more workers are needed to help protect data and prevent threats. Leveraging AI-based tools is unquestionably necessary for modern organizations. But how far can tools like ChatGPT take us with…

4 min read

Why Robot Vacuums Have Cameras (and What to Know About Them)

4 min read - Robot vacuum cleaner products are by far the largest category of consumer robots. They roll around on floors, hoovering up dust and dirt so we don’t have to, all while avoiding obstacles. The industry leader, iRobot, has been cleaning up the robot vacuum market for two decades. Over this time, the company has steadily gained fans and a sterling reputation, including around security and privacy. And then, something shocking happened. Someone posted on Facebook a picture of a woman sitting…

4 min read