{"id":207641,"date":"2017-02-13T18:21:09","date_gmt":"2017-02-13T23:21:09","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/ibm-adds-voice-help-to-cybercrime-fighting-watson-powered-weaponry-campus-technology.php"},"modified":"2017-02-13T18:21:09","modified_gmt":"2017-02-13T23:21:09","slug":"ibm-adds-voice-help-to-cybercrime-fighting-watson-powered-weaponry-campus-technology","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/technology\/ibm-adds-voice-help-to-cybercrime-fighting-watson-powered-weaponry-campus-technology.php","title":{"rendered":"IBM Adds Voice Help to Cybercrime-Fighting Watson-Powered Weaponry &#8211; Campus Technology"},"content":{"rendered":"<p><p>    Security  <\/p>\n<p>      IBM Watson-powered cognitive security operations center.      (Credit: IBM)    <\/p>\n<p>    Remember the scene when the Avengers are in the process of    breaking into a Hydra base in \"Avengers: Age of Ultron,\" and    virtual assistant Jarvis informs Tony Stark, \"The central    building is protected by some kind of energy shield. Strucker's    technology is well beyond any other Hydra base we've taken\"?    That really isn't much different from a security analyst making    the announcement to his on-campus CISO that a dorm of students    has been hit by Locky malware. However, in a vision hinted at    by IBM as it officially announced the availability of Watson    for Cyber Security, one crucial addition would be extra help so    that everybody on the security team would know exactly how to    respond to the new threat.  <\/p>\n<p>    The new Watson security technology is being integrated into    IBM's new cognitive security operations center (SOC) platform,    which combines the cognitive abilities of Watson with    on-the-ground security operations to help cybersecurity teams    detect and fight threats across endpoints, networks, users and    the cloud.  <\/p>\n<p>    Several components come into play. IBM QRadar Advisor with Watson is a new app    that taps into Watson's \"corpus\" of cybersecurity data, both    structured and unstructured, and then correlates it with local    security incidents to augment investigations. Based on the    information the app gathers, it formulates a threat query to    deliver to Watson for additional processing. The advisor    program is available in the IBM Security App Exchange.  <\/p>\n<p>    Among the users of QRadar Advisor is the University of    Brunswick, which was one of eight institutions chosen last year by    IBM to help the company adapt Watson for use in cybersecurity    work. Computer science students at that time were enlisted    to help Watson consume and process massive amounts of    cybersecurity data, including two decades of security research,    details on eight million spam and phishing attacks and more    than 100,000 documented vulnerabilities. Now UNB, along with    California    Polytechnic and other organizations, is testing Watson's    ability to aid in directly fighting cybercrime.  <\/p>\n<p>    IBM is also pushing its Global X-Force Command Center work, which    sets up managed service \"war rooms\" for staying on top of cyber    threats. Those operations can be on-premise or hosted by IBM    and run through the cloud. As part of that line, the company    introduced a Watson-powered chatbot, which it uses to interact    with its customers. According to the company, clients may ask    Watson questions via instant messaging about their security    posture or network configurations or execute commands, such as    reassigning a ticket to a new support person.  <\/p>\n<p>    Now it has also begun testing additional technology, code-named    \"Havyn\" (for \"haven\"), which provides a voice-powered security    assistant, a la Jarvis. Havyn was created by IBM \"master    inventor\" Michael Spisak, who worked on the tool with his    11-year-old son. Spisak had been chatting with Watson through    the keyboard when his son asked how come he couldn't just talk    to Watson. Experimentation with a low-cost Raspberry Pi    microcomputer and equally inexpensive 7-inch touchscreen lead    to the development of the voice operation, which allowed Spisak    to ask the system verbal questions about cybersecurity. Now    it's being tested in the field to provide security analysts    with updates on new threats that have appeared, along with    recommended remediation steps.  <\/p>\n<p>    The company has also introduced BigFix Detect, a new endpoint detection and    response (EDR) program.  <\/p>\n<p>    \"The Cognitive SOC is now a reality for clients looking to find    an advantage against the growing legions of cybercriminals and    next generation threats,\" said Denis Kennelly, vice president    of development and technology in the security division, in a    prepared statement. \"Our investments in Watson for    Cybersecurity have given birth to several innovations in just    under a year. Combining the unique abilities of man and machine    intelligence will be critical to the next stage in the fight    against advanced cybercrime.\"  <\/p>\n<p>      About the Author    <\/p>\n<p>      Dian Schaffhauser is a senior contributing editor for 1105      Media's education publications THE Journal and      Campus Technology. She can be reached at <a href=\"mailto:dian@dischaffhauser.com\">dian@dischaffhauser.com<\/a>      or on Twitter @schaffhauser.<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read this article:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/campustechnology.com\/articles\/2017\/02\/13\/ibm-adds-voice-help-to-cyber-crime-fighting-watson-powered-weaponry.aspx\" title=\"IBM Adds Voice Help to Cybercrime-Fighting Watson-Powered Weaponry - Campus Technology\">IBM Adds Voice Help to Cybercrime-Fighting Watson-Powered Weaponry - Campus Technology<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Security IBM Watson-powered cognitive security operations center. (Credit: IBM) Remember the scene when the Avengers are in the process of breaking into a Hydra base in \"Avengers: Age of Ultron,\" and virtual assistant Jarvis informs Tony Stark, \"The central building is protected by some kind of energy shield. Strucker's technology is well beyond any other Hydra base we've taken\"?  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/technology\/ibm-adds-voice-help-to-cybercrime-fighting-watson-powered-weaponry-campus-technology.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[431576],"tags":[],"class_list":["post-207641","post","type-post","status-publish","format-standard","hentry","category-technology"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/207641"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=207641"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/207641\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=207641"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=207641"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=207641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}