{"id":182062,"date":"2017-03-07T22:20:09","date_gmt":"2017-03-08T03:20:09","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/amazons-latest-ai-push-cybersecurity-motley-fool\/"},"modified":"2017-03-07T22:20:09","modified_gmt":"2017-03-08T03:20:09","slug":"amazons-latest-ai-push-cybersecurity-motley-fool","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/ai\/amazons-latest-ai-push-cybersecurity-motley-fool\/","title":{"rendered":"Amazon&#8217;s Latest AI Push: Cybersecurity &#8211; Motley Fool"},"content":{"rendered":"<p><p>    Amazon.com, Inc.    (NASDAQ:AMZN)    has been making quite a push into the field of artificial intelligence (AI). You are no    doubt familiar with the most public example of this effort --    Alexa, its voice-activated digital assistant which controls the Echo    smart speaker and Echo Dot, which were top sellers on Amazon's    website over the holidays. Those familiar with Amazon Web    Services (AWS), an industry leader in cloud computing, may also    be aware of the AI-based tools the company has recently made    available to AWS customers: Rekognition for building image    recognition apps; Polly for translating text to speech; and    Lex, to build conversational bots.  <\/p>\n<p>      Image source: Pixabay.    <\/p>\n<p>    What you may not know is that Amazon is adding cyber-security    to its AI resume. TechCrunch is reporting that Amazon has acquired AI-based    cyber-security company Harvest.ai. According to its website,    Harvest.ai uses AI-based algorithms to identify the most    important documents and intellectual property of a business,    then combines user behavior analytics with data loss prevention    techniques to protect them from cyber attacks. Harvest.ai    already had ties to Amazon, as a customer who was featured in    an AWS Startup Spotlight article, which focuses on innovative    and disruptive young companies. Harvest.ai boasts former    members of the National Security Agency (NSA), Federal Bureau    of Investigation (FBI), Department of Defense (DoD), as well as    former employees of Websense and FireEye,    Inc.  <\/p>\n<p>    Harvest.ai's flagship product, MACIE, monitors a company's    network in near real-time to identify when a suspicious user    accesses unauthorized documents.Its target market was    \"Fortune 1000 organizations that were migrating to cloud-based    platforms.\" Amazon has a Who's Who of big name companies as    customers, so it seems like a natural fit for the company. If    it decides to deploy MACIE to its cloud, it adds to the suite    of hosting products available for its customers.Amazon    already offers its Amazon Inspector, which it defines as an    \"automated security assessment service to help improve the    security and compliance of applications deployed on    AWS.\"Harvest.ai would take that to the next level.  <\/p>\n<p>      AI is perfectly suited for the task of cyber-security. Image      source: Pixabay.    <\/p>\n<p>    The use of AI in cybersecurity isn't new. MIT has been    experimenting with a novel approach to application. By pairing    a system with a human counterpart and applying supervised    learning, the system was able to detect 85% of threats. Over    time, that success rate is sure to improve. Last year,    IBM (NYSE:IBM)    announced an initiative to train its AI-based Watson in security protocols, in    what was to be a year-long research project. By the end of the    year, the company expanded the beta program with the inclusion    of 40 clients across a variety of industries. Earlier this    month, IBM announced that Watson for Cyber Security would be    available to customers.  <\/p>\n<p>    The task of cyber security seems ideally suited to AI    applications. The ability to digest a magnitude of data in a    short time and match real-time situations against a set of    specified criteria seems tailor made for the platform. Add to    this AI's ability to learn over time and it seems inevitable    that there would be a merging of these technologies.  <\/p>\n<p>    These acquisitions combined with Amazon's own research makes it    one of several companies on the cutting edge of AI. Amazon has    been applying the knowledge it gains across a wide swath of its    business from consumer facing products to its business-centric    applications. Amazon's investors are sure to benefit from this    multi-pronged approach.  <\/p>\n<p>    Danny Vena    owns shares of Amazon. The Motley Fool owns shares of and    recommends Amazon and FireEye. The Motley Fool has a disclosure    policy.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Here is the original post:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.fool.com\/investing\/2017\/03\/07\/amazons-latest-ai-push-cybersecurity.aspx\" title=\"Amazon's Latest AI Push: Cybersecurity - Motley Fool\">Amazon's Latest AI Push: Cybersecurity - Motley Fool<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Amazon.com, Inc.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/ai\/amazons-latest-ai-push-cybersecurity-motley-fool\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187743],"tags":[],"class_list":["post-182062","post","type-post","status-publish","format-standard","hentry","category-ai"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/182062"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=182062"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/182062\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=182062"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=182062"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=182062"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}