This is the first article in a three-part series on how IBM Watson for Cyber Security can help analysts win the arms race against the increasingly sophisticated cybercrime landscape.

IBM’s latest and most glamorous offering in the security space is QRadar Advisor with Watson. This technology is designed to reduce the time taken to identify, classify and respond to malicious activity in a company’s infrastructure. In beta, it has gone beyond this remit, finding threats and activities beyond the initial scope of the investigation. Is this the dawn of an age of security provided by artificial intelligence? Can Watson save the security world?

Entering the Age of Watson

Security is increasingly seen as a big data problem. The challenge these days is less about noticing that something isn’t right — there are dozens, if not hundreds, of products available to spot anomalies and raise red flags — and more about whether or not you can consume and act upon that knowledge. The number of alerts coming in just keeps increasing as we find more automated ways to identify malicious behavior, and because there are more people on the dark side creating additional attacks.

Companies today struggle to find sufficiently skilled and affordable analysts to handle the onslaught. Analysts also face a formidable challenge: They must constantly update their skills through research and be able to apply them precisely and quickly. Security is, perhaps, the fastest moving area in IT today. Even if money were no object, there are just too few professionals. It makes sense, then, to address this with a solution that can easily handle the quantities of data involved.

Watson essentially develops hypotheses about what is happening from the data it sees and then uses statistical techniques to prove or disprove them. The technical detail is fascinating, and the IBM Journal of Research and Development (Volume 56, Number 3.4) provides ample reading in this area. The idea of hypothesis testing machines is not new — in fact, it was the prevailing approach to expert systems as far back as the 1970s.

Watson in Action

The beta program for QRadar Adviser with Watson offered a taste of what it can achieve. It has already proven its worth in a live customer environment. However, Watson is a self-learning system. What it has learned so far is not all the knowledge that will ever exist. It will keep learning and refining both its corpus of knowledge and how that knowledge relates to the real world. This leads us to an enticing thought: What will Watson be able to do in the future? Is there a reasonable way we can imagine that?

What we can do is look at Watson’s “sibling” working in the complex world of oncology. This version of IBM’s cognitive computing solution, which is older than Watson for Cyber Security but uses the same or similar techniques and the same algorithms at its heart, has done some truly astonishing things. Cancer researchers working with Watson in this field identified six new proteins to investigate in one month. For comparison, human research identified just 28 such proteins in 30 years.

Watson for Cyber Security already provides highly satisfactory breakthroughs to organizational SOCs in terms of accuracy and speed. But it is also showing glimpses of how it will match its older sibling and do so much more. When given an offense to analyze, Watson returns useful information that human analysts might miss on their own.

Saving the World, One Cyberthreat at a Time

So, will Watson save the world? I should stress again that Watson, in its current incarnation, is intended to augment, not replace, the work of human analysts. To claim that any system could save the world suggests that a critical, irreplaceable resource is protected at least enough for the world to function. But the modern world is completely dependent on technology, communications and the internet, and the consequences if resources were completely compromised could be dire and far-reaching. It seems reasonable, therefore, to call the internet a critical resource.

Cybercriminals are making far too much money to ever quit, and their industry is short term. They will not care much if their activities completely undermine the world economic landscape. They will continue to up the ante and generate more sophisticated and devious attacks. We are in the middle of an arms race.

It’s possible that we now have a way to see much further and faster than ever before. That capacity will help analysts prevent breaches in a day-to-day security operations center (SOC) and develop the tools and skills to keep up with the changing threat landscape. In this sense, Watson holds the potential to save the security world.

Listen to the podcast: What Makes IBM Watson the Whole Package?

More from Artificial Intelligence

Cloud Threat Landscape Report: AI-generated attacks low for the cloud

2 min read - For the last couple of years, a lot of attention has been placed on the evolutionary state of artificial intelligence (AI) technology and its impact on cybersecurity. In many industries, the risks associated with AI-generated attacks are still present and concerning, especially with the global average of data breach costs increasing by 10% from last year.However, according to the most recent Cloud Threat Landscape Report released by IBM’s X-Force team, the near-term threat of an AI-generated attack targeting cloud computing…

Testing the limits of generative AI: How red teaming exposes vulnerabilities in AI models

4 min read - With generative artificial intelligence (gen AI) on the frontlines of information security, red teams play an essential role in identifying vulnerabilities that others can overlook.With the average cost of a data breach reaching an all-time high of $4.88 million in 2024, businesses need to know exactly where their vulnerabilities lie. Given the remarkable pace at which they’re adopting gen AI, there’s a good chance that some of those vulnerabilities lie in AI models themselves — or the data used to…

Security roundup: Top AI stories in 2024

3 min read - 2024 has been a banner year for artificial intelligence (AI). As enterprises ramp up adoption, however, malicious actors have been exploring new ways to compromise systems with intelligent attacks.With the AI landscape rapidly evolving, it's worth looking back before moving forward. Here are our top five AI security stories for 2024.Can you hear me now? Hackers hijack audio with AIAttackers can fake entire conversations using large language models (LLMs), voice cloning and speech-to-text software. This method is relatively easy to…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today