IBM Applying Watson Cognitive Technology to Cybersecurity | Healthcare Informatics Magazine | Health IT | Information Technology Skip to content Skip to navigation

IBM Applying Watson Cognitive Technology to Cybersecurity

May 11, 2016
by Heather Landi
| Reprints
Click To View Gallery

IBM’s artificial intelligence platform Watson has won Jeopardy! and has been applied to transforming healthcare, and its now being trained to tackle cybercrime.

IBM Security announced a year-long research project to train Watson’s cognitive computing capabilities to stop hackers as part of the development of the cloud-based Watson for Cyber Security technology.

Watson for Cyber Security is a new cloud-based version of the company's cognitive technology that’s trained on the language of security, according to an IBM Security press release. But before Watson can help combat cybercrime, the computing system has to learn how cyber security works.

As part of the year-long research project, IBM is collaborating with eight universities to “greatly expand the collection of security data IBM has trained the cognitive system with.”

“Watson is learning the nuances of security research findings and discovering patterns and evidence of hidden cyber attacks and threats that could otherwise be missed,” the company stated.

Starting this fall, IBM will work with a number of universities and their students to further train Watson on the language of cybersecurity, including: California State Polytechnic University, Pomona; Pennsylvania State University; Massachusetts Institute of Technology; New York University; the University of Maryland, Baltimore County (UMBC); the University of New Brunswick; the University of Ottawa and the University of Waterloo.

“IBM efforts are designed to improve security analysts’ capabilities using cognitive systems that automate the connections between data, emerging threats and remediation strategies. IBM intends to begin beta production deployments that take advantage of IBM Watson for Cyber Security later this year,” the company stated in the press release.

For the development of Watson for Cyber Security, IBM will use its X-Force research library as an essential resource. “This body of knowledge includes 20 years of security research, details on 8 million spam and phishing attacks and over 100,000 documented vulnerabilities,” according to IBM.

“The volume of security data presented to analysts is staggering. The average organization sees over 200,000 pieces of security event data per day with enterprises spending $1.3 million a year dealing with false positives alone, wasting nearly 21,000 hours. Couple this with 75,000-plus known software vulnerabilities reported in the National Vulnerability Database, 10,000 security research papers published each year and over 60,000 security blogs published each month—and security analysts are severely challenged to move with informed speed,” IBM stated.

Designed on the IBM Cloud, Watson for Cyber Security will be designed to offer cognition of security data at scale using Watson's ability to reason and learn from “unstructured data”—80 percent of all data on the internet that traditional security tools cannot process, including blogs, articles, videos, reports, alerts, and other information. Watson for Cyber Security also uses natural language processing to understand the vague and imprecise nature of human language in unstructured data, the company said.

Watson for Cyber Security is designed to provide insights into emerging threats, as well as recommendations on how to stop them, increasing the speed and capabilities of security professionals.

“Even if the industry was able to fill the estimated 1.5 million open cyber security jobs by 2020, we’d still have a skills crisis in security,” Marc van Zadelhoff, general manager, IBM Security, said in a statement. “The volume and velocity of data in security is one of our greatest challenges in dealing with cybercrime. By leveraging Watson’s ability to bring context to staggering amounts of unstructured data, impossible for people alone to process, we will bring new insights, recommendations, and knowledge to security professionals, bringing greater speed and precision to the most advanced cybersecurity analysts, and providing novice analysts with on-the-job training.”

 

Get the latest information on Health IT and attend other valuable sessions at this two-day Summit providing healthcare leaders with educational content, insightful debate and dialogue on the future of healthcare and technology.

Learn More

Topics

News

Study will Leverage Connecticut HIE to Help Prevent Suicides

A new study will aim to leverage CTHealthLink, a physician-led health information exchange (HIE) in Connecticut, to help identify the factors leading to suicide and to ultimately help prevent those deaths.

Duke Health First to Achieve HIMSS Stage 7 Rating in Analytics

North Carolina-based Duke Health has become the first U.S. healthcare institution to be awarded the highest honor for analytic capabilities by HIMSS Analytics.

NIH Releases First Dataset from Adolescent Brain Development Study

The National Institutes of Health (NIH) announced the release of the first dataset from the Adolescent Brain Cognitive Development (ABCD) study, which will enable scientists to conduct research on the many factors that influence brain, cognitive, social, and emotional development.

Boston Children's Accelerates Data-Driven Approach to Clinical Research

In an effort to bring a more data-driven approach to clinical research, Boston Children’s Hospital has joined the TriNetX global health research network.

Paper Records, Films Most Common Type of Healthcare Data Breach, Study Finds

Despite the high level of hospital adoption of electronic health records and federal incentives to do so, paper and films were the most frequent location of breached data in hospitals, according to a recent study.

AHA Appoints Senior Advisor for Cybersecurity and Risk

The American Hospital Association (AHA) has announced that John Riggi has joined the association as senior advisor for cybersecurity and risk.