IBM’s Watson now fights Real-World Cybercrime
You should have heard of Watson. The supercomputer by IBM? Watson gained a lot of attention as a supercomputer of all trades – who won jeopardy, wrote cookbooks, designed dresses and predicted the weather. Now, the supercomputer is up for its biggest challenge yet – fighting cybercrime in real life.
From today onwards, 40 organizations will employ computers with cognitive power to spot cybercrime. Watson for Cybersecurity Beta program will help IBM too. Watson already has a set of real world skills it needs. Also, the supercomputer is not starting from scratch here. It has been trained extensively by IBM since this year’s spring. It was trained to analyze and prevent threats.
Bringing Watson up to speed
Since May, the computer is being crammed with a lot of information. The cyberspace is huge and the more Watson can see, the more is can distinguish between benign, threats and real problems.
Though is combs through a large amount of information, its skill lies in contextualizing information. it combines different security events with unstructured data, such as white papers, research reports, and blog posts.
Cognitive computing is 30 to 40 percent faster than rule based computing. But for that the machine needed to learn. Researchers fed Watson up to 15,000 documents each month through the fall, linking it to libraries and news feeds in real-time to keep its knowledge base current. Also, Watson needs to understand what each word means before it can relate those.
Not for Consumer Software
During this beta phase, Watson will link up with some other companies and will provide their security analysts with reports and recommendations. It will not replace humans, but will enable them to understand the situation better.
For example, think of a password protected entry. Multiple failed attempts may mean two things. Absentminded user, or an attempted break-in. Watson will work on much more complicated problems though, saving companies—and their customers—from potentially crippling threats.