IBM Security has announced Watson for Cyber Security, a new cloud-based version of the company’s cognitive technology trained on the language of security as part of a year-long research project.
To further scale the system, IBM plans to collaborate with eight universities to greatly expand the collection of security data IBM has trained the cognitive system with.
Training Watson for Cyber Security is a critical step in the advancement of cognitive security. Watson is learning the nuances of security research findings and discovering patterns and evidence of hidden
cyber attacks and threats that could otherwise be missed. Starting this fall, IBM will work with leading universities and their students to further train Watson on the language of cybersecurity, including: California State Polytechnic University, Pomona; Pennsylvania State University; Massachusetts Institute of Technology; New York University; the University of Maryland, Baltimore County (UMBC); the University of New Brunswick; the University of Ottawa and the University of Waterloo.
Today’s news is part of a pioneering cognitive security project to address the looming cybersecurity skills gap. IBM efforts are designed to improve security analysts’ capabilities using cognitive systems that automate the connections between data, emerging threats and remediation strategies. IBM intends to begin beta production deployments that take advantage of IBM Watson for Cyber Security later this year.
IBM’s world-renowned X-Force research library will be a central part of the materials fed to Watson for Cyber Security. This body of knowledge includes 20 years of security research, details on 8 million spam and phishing attacks and over 100,000 documented vulnerabilities.
Watson to Address Looming Security Skills Gap
The volume of security data presented to analysts is staggering. The average organization sees over
200,000 pieces of security event data per day1 with enterprises spending $1.3 million a year dealing with false positives alone, wasting nearly 21,000 hours2. Couple this with 75,000-plus known software vulnerabilities reported in the National Vulnerability Database3, 10,000 security research papers published each year and over 60,000 security blogs published each month4– and security analysts are severely challenged to move with informed speed.
Designed on the IBM Cloud, Watson for Cyber Security will be the first technology to offer cognition of security data at scale using Watson’s ability to reason and learn from “unstructured data” – 80 percent of all data on the internet that traditional security tools cannot process, including blogs, articles, videos, reports, alerts, and other information. In fact, IBM analysis found that the average organization leverages only 8 percent of this unstructured data. Watson for Cyber Security also uses natural language processing to understand the vague and imprecise nature of human language in unstructured data.
As a result, Watson for Cyber Security is designed to provide insights into emerging threats, as well as recommendations on how to stop them, increasing the speed and capabilities of security professionals.
IBM will also incorporate other Watson capabilities including the system’s data mining techniques for outlier detection, graphical presentation tools and techniques for finding connections between related data points in different documents. For example, Watson can find data on an emerging form of malware in an online security bulletin and data from a security analyst’s blog on an emerging remediation strategy.
“Even if the industry was able to fill the estimated 1.5 million open cyber security jobs by 2020, we’d still have a skills crisis in security,” said Marc van Zadelhoff, General Manager, IBM Security. “The volume and velocity of data in security is one of our greatest challenges in dealing with cybercrime. By leveraging Watson’s ability to bring context to staggering amounts of unstructured data, impossible for people alone to process, we will bring new insights, recommendations, and knowledge to security professionals, bringing greater speed and precision to the most advanced cybersecurity analysts, and providing novice analysts with on-the-job training.”
Universities to Help Train IBM Watson for Cyber Security
IBM plans to collaborate with eight universities that have some of the world’s best cybersecurity programs to further train Watson and introduce their students to cognitive computing. The universities include: California State Polytechnic University, Pomona; Pennsylvania State University; Massachusetts Institute of Technology; New York University; UMBC; the University of New Brunswick; the University of Ottawa and the University of Waterloo.
Students will help train Watson on the language of cybersecurity, initially working to help build Watson’s corpus of knowledge by annotating and feeding the system security reports and data. As students work closely with IBM Security experts to learn the nuances of these security intelligence reports, they’ll also be amongst the first in the world to gain hands-on experience in this emerging field of cognitive security.
This work will build on IBM’s work in developing and training Watson for Cyber Security. IBM currently plans to process up to 15,000 security documents per month over the next phase of the training with the university partners, clients and IBM experts collaborating.
These documents will include threat intelligence reports, cybercrime strategies and threat databases. Training Watson will also help build the taxonomy for Watson in cybersecurity including the understanding of hashes, infection methods and indicators of compromise and help identify advanced persistent threats.
In another effort to further scientific advancements in cognitive security, UMBC also announced a multi-year collaboration with IBM Research to create an Accelerated Cognitive Cybersecurity Laboratory (ACCL) in the College of Engineering and Information Technology. Faculty and students working in the ACCL will apply cognitive computing to complex cybersecurity challenges to build upon their own prior research. They will also collaborate with IBM scientists and leverage IBM’s advanced computing systems to add speed and scale to new cybersecurity solutions.
“This collaboration will allow our students and faculty to work with IBM to advance the state-of-the-art in cognitive computing and cybersecurity,” said Anupam Joshi, director of UMBC’s Center for Cybersecurity and chair of computer science and electrical engineering, at UMBC, who will lead the ACCL at UMBC.
Now download a bank account
Absa has introduced an end-to-end account opening for new customers, through the Absa Banking App, which can be downloaded from the Android and Apple app stores. This follows the launch of the world first ChatBanking on WhatsApp service.
This “download your account” feature enables new customers to Absa, to open a Cheque account, order their card and start transacting on the Absa Banking App, all within minutes, from anywhere and at any time, by downloading it from the App stores.
“Overall, this new capability is not only expected to enhance the customer’s digital experience, but we expect to leverage this in our branches, bringing digital experiences to the branch environment and making it easier for our customers to join and bank with us regardless of where they may be,” says Aupa Monyatsi, Managing Executive for Virtual Channels at Absa Retail & Business Banking.
“With this innovation comes the need to ensure that the security of our customers is at the heart of our digital experience, this is why the digital onboarding experience for this feature includes a high-quality facial matching check with the Department of Home Affairs to verify the customer’s identity, ensuring that we have the most up to date information of our clients. Security is supremely important for us.”
The new version of the Absa Banking App is now available in the Apple and Android App stores, and anyone with a South African ID can become an Absa customer, by following these simple steps:
- Download the Absa App
- Choose the account you would like to open
- Tell us who you are
- To keep you safe, we will verify your cell phone number
- Take a selfie, and we will do facial matching with the Department of Home Affairs to confirm you are who you say you are
- Tell us where you live
- Let us know what you do for a living and your income
- Click Apply.
How we use phones to avoid human contact
A recent study by Kaspersky Lab has found that 75% of people pick up their connected device to avoid conversing with another human being.
Connected devices are becoming essential to keeping people in contact with each other, but for many they are also a much-needed comfort blanket in a variety of social situations when they do not want to interact with others. A recent survey from Kaspersky Lab has confirmed this trend in behaviour after three-quarters of people (75%) admitted they use a device to pretend to be busy when they don’t want to talk to someone else, showing the importance of keeping connected devices protected under all circumstances.
Imagine you’ve arrived at a bar and you’re waiting for your date. The bar is busy, and people are chatting all around you. What do you do now? Strike up a conversation with someone you don’t know? Grab your phone from your pocket or handbag until your date arrives to keep yourself busy? Why talk to humans or even make eye-contact with someone else when you can stare at your connected device instead?
The truth is, our use of devices is making it much easier to avoid small talk or even be polite to those around us, and new Kaspersky Lab research has found that 72% of people use one when they do not know what to do in a social situation. They are also the ‘go-to’ distraction for people even when they aren’t trying to look busy or avoid someone’s eye. 46% of people admit to using a device just to kill time every day and 44% use it as a daily distraction.
In addition to just being a distraction, devices are also a lifeline to those who would rather not talk directly to another person in day-to-day situations, to complete essential tasks. In fact, nearly a third (31%) of people would prefer to carry out tasks such as ordering a taxi or finding directions to where they need to go via a website and an app, because they find it an easier experience than speaking with another person.
Whether they are helping us avoid direct contact or filling a void in our daily lives, our constant reliance on devices has become a cause for panic when they become unusable. A third (34%) of people worry that they will not be able to entertain themselves if they cannot access a connected device. 12% are even concerned that they won’t be able to pretend to be busy if their device is out of action.
Dmitry Aleshin, VP for Product Marketing, Kaspersky Lab said, “The reliance on connected devices is impacting us in more ways than we could have ever expected. There is no doubt that being connected gives us the freedom to make modern life easier, but devices are also vital to help people get through different and difficult social situations. No matter what your ‘connection crutch’ is, it is essential to make sure your device is online and available when you need it most.”
To ensure your device lifeline is always there and in top health – no matter what the reason or situation – Kaspersky Security Cloud keeps your connection safe and secure:
· I want to use my device while waiting for a friend – is it secure to access the bar’s Wi-Fi?
With Kaspersky Security Cloud, devices are protected against network threats, even if the user needs to use insecure public Wi-Fi hotspots. This is done through transferring data via an encrypted channel to ensure personal data safety, so users’ devices are protected on any connection.
· Oh no! I’m bored but my phone’s battery is getting low – what am I going to do?
Users can track their battery level thanks to a countdown of how many minutes are left until their device shuts down in the Kaspersky Security Cloud interface. There is also a wide-range of portable power supplies available to keep device batteries charged while on-the-go.
· I’ve lost my phone! How will I keep myself entertained now?
Should the unthinkable happen and you lose or have your phone stolen, Kaspersky Security Cloud can track and protect your device from data breaches, for complete peace of mind. Remote lock and locate features ensure your device remains secure until you are reunited.