{"id":183940,"date":"2017-03-19T16:28:21","date_gmt":"2017-03-19T20:28:21","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/amazon-applies-its-ai-tools-to-cyber-security-newsweek\/"},"modified":"2017-03-19T16:28:21","modified_gmt":"2017-03-19T20:28:21","slug":"amazon-applies-its-ai-tools-to-cyber-security-newsweek","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/ai\/amazon-applies-its-ai-tools-to-cyber-security-newsweek\/","title":{"rendered":"Amazon Applies Its AI Tools to Cyber Security &#8211; Newsweek"},"content":{"rendered":"<p><p>    This article originally    appeared on The Motley Fool.  <\/p>\n<p>    Amazon.com, Inc. has been making quite a push into the field    ofartificial    intelligence(AI). Its most public example of this    effort, Alexa, its voice-activateddigital assistant, controls    the Echo smart speaker and Echo Dot, which were top sellers on    Amazon's website over the holidays.  <\/p>\n<p>    Those familiar with Amazon Web Services (AWS), an industry    leader in cloud computing, may also be aware of the AI-based    tools the company has recently made available to AWS customers:    Rekognition for building image recognition apps; Polly for    translating text to speech; and Lex, to build conversational    bots.  <\/p>\n<p>    Try Newsweek for only $1.25 per week  <\/p>\n<p>            Jeff    Bezos, founder of Amazon. Joshua Roberts\/Reuters  <\/p>\n<p>    Amazon also is adding cyber-security to its AI resume.    TechCrunch isreportingthat Amazon has    acquired AI-based cyber-security company Harvest.ai. According    to itswebsite, Harvest.ai uses AI-based    algorithms to identify the most important documents and    intellectual property of a business, then combines user    behavior analytics with data loss prevention techniques to    protect them from cyber attacks. Harvest.ai already had ties to    Amazon, as a customer who was featured in an AWS Startup    Spotlight article, which focuses on innovative and disruptive    young companies. Harvest.ai boasts former members of the    National Security Agency (NSA), Federal Bureau of Investigation    (FBI), Department of Defense (DoD), as well as former employees    of Websense and FireEye, Inc .  <\/p>\n<p>    Harvest.ai's flagship product, MACIE, monitors a company's    network in near real-time to identify when a suspicious user    accesses unauthorized documents.Its target market was    \"Fortune 1000 organizations that were migrating to cloud-based    platforms.\" Amazon has a Who's Who of big name companies as    customers, so it seems like a natural fit for the company. If    it decides to deploy MACIE to its cloud, it adds to the suite    of hosting products available for its customers.Amazon    already offers its Amazon Inspector, which it defines as an    \"automated security assessment service to help improve the    security and compliance of applications deployed on    AWS.\"Harvest.ai would take that to the next level.  <\/p>\n<p>    The use of AI in cybersecurity isn't new. MIT has been    experimenting with a novel approach to application. By pairing    a system with a human counterpart and applying supervised    learning, the system was able to detect 85 percentof    threats. Over time, that success rate is sure to improve. Last    year,IBMannounced an initiative to train    itsAI-based Watsonin    security protocols, in what was to be a year-long research    project. By the end of the year, the company expanded the beta    program with the inclusion of 40 clients across a variety of    industries. Earlier this month, IBM announced that Watson for    Cyber Security would be available to customers.  <\/p>\n<p>    The task of cyber security seems ideally suited to AI    applications. The ability to digest a magnitude of data in a    short time and match real-time situations against a set of    specified criteria seems tailor made for the platform. Add to    this AI's ability to learn over time and it seems inevitable    that there would be a merging of these technologies.  <\/p>\n<p>    These acquisitions combined with Amazon's own research makes it    one of several companies on the cutting edge of AI. Amazon has    been applying the knowledge it gains across a wide swath of its    business from consumer facing products to its business-centric    applications.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.newsweek.com\/amazon-applies-ai-tools-cyber-security-569372\" title=\"Amazon Applies Its AI Tools to Cyber Security - Newsweek\">Amazon Applies Its AI Tools to Cyber Security - Newsweek<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> This article originally appeared on The Motley Fool. Amazon.com, Inc <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/ai\/amazon-applies-its-ai-tools-to-cyber-security-newsweek\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187743],"tags":[],"class_list":["post-183940","post","type-post","status-publish","format-standard","hentry","category-ai"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/183940"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=183940"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/183940\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=183940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=183940"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=183940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}