{"id":6615,"date":"2017-02-14T04:31:26","date_gmt":"2017-02-14T12:31:26","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/02\/14\/news-434\/"},"modified":"2017-02-14T04:31:26","modified_gmt":"2017-02-14T12:31:26","slug":"news-434","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/02\/14\/news-434\/","title":{"rendered":"IBM Watson: Regular A.I. by day, cybercrime fighter by night"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt0.staticworld.net\/images\/article\/2017\/01\/1024px-ibm_watson-100632019-orig-100703361-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Rebecca Linke| Date: Tue, 14 Feb 2017 04:11:00 -0800<\/strong><\/p>\n<p>IBM Watson is an artificial intelligence of many talents.\u00a0<\/p>\n<p>It can win <em>Jeopardy!<\/em>, help find treatment for cancer patients &#8212; and now it can find cyberthreats. That&#8217;s right, Watson is becoming a cybersecurity expert. So how has IBM helped Watson change hats?<\/p>\n<p>In IT Blogwatch, this reminds us of something.<\/p>\n<p>So what is going on? Alison DeNisco <a href=\"http:\/\/www.techrepublic.com\/article\/ibm-uses-watson-to-fill-cybersecurity-gaps\/\" target=\"_blank\">has some background<\/a>:<\/p>\n<p>But what need does Watson fill here? Ian Barker <a href=\"https:\/\/betanews.com\/2017\/02\/13\/ibm-watson-security\/\" target=\"_blank\">has those details<\/a>:<\/p>\n<p>And what does Watson for Cyber Security do? Larry Dignan <a target=\"_blank\">has the rundown<\/a>:<\/p>\n<p>And has Watson helped detect any shady cyber business yet? Alex Konrad <a href=\"http:\/\/www.forbes.com\/sites\/alexkonrad\/2017\/02\/13\/ibm-turns-watson-to-cyber-security\/#2619c62b5a03\" target=\"_blank\">is in the know<\/a>:<\/p>\n<p>So far, this sounds promising. So who will likely use Watson for Cyber Security? Kevin Bissett <a href=\"http:\/\/www.thetelegram.com\/business\/2017\/2\/13\/ibm-s-famed-watson-computer-gets-a-job-fighting-cybercrime-threat.html\" target=\"_blank\">has that info<\/a>:<\/p>\n<p>Does all sound slightly familiar? Ian Sherr <a href=\"https:\/\/www.cnet.com\/news\/ibm-built-a-voice-assistant-for-cybersecurity-hayvn-watson\/\" target=\"_blank\">thinks he knows what<\/a>:<\/p>\n<p><a href=\"http:\/\/www.computerworld.com\/article\/3169556\/artificial-intelligence\/ibm-watson-regular-ai-by-day-cybercrime-fighter-by-night.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt0.staticworld.net\/images\/article\/2017\/01\/1024px-ibm_watson-100632019-orig-100703361-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Rebecca Linke| Date: Tue, 14 Feb 2017 04:11:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>IBM Watson is an artificial intelligence of many talents.\u00a0<\/p>\n<p>It can win <em>Jeopardy!<\/em>, help find treatment for cancer patients &#8212; and now it can find cyberthreats. That&#8217;s right, Watson is becoming a cybersecurity expert. So how has IBM helped Watson change hats?<\/p>\n<p>In IT Blogwatch, this reminds us of something.<\/p>\n<p>So what is going on? Alison DeNisco <a href=\"http:\/\/www.techrepublic.com\/article\/ibm-uses-watson-to-fill-cybersecurity-gaps\/\" target=\"_blank\">has some background<\/a>:<\/p>\n<blockquote><p>IBM Watson has a new job: Cybersecurity specialist. At the RSA Conference&#8230;IBM announced the availability of Watson for Cyber Security, with the aim of assisting cybersecurity professionals with threat assessment and mitigation&#8230;The company said it is the industry&#8217;s first augmented intelligence technology with the ability to power cognitive security operations centers (SOCs).<\/p><\/blockquote>\n<p>But what need does Watson fill here? Ian Barker <a href=\"https:\/\/betanews.com\/2017\/02\/13\/ibm-watson-security\/\" target=\"_blank\">has those details<\/a>:<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3169556\/artificial-intelligence\/ibm-watson-regular-ai-by-day-cybercrime-fighter-by-night.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11113,11072,11070,714],"class_list":["post-6615","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-artificial-intelligence","tag-cybercrime-hacking","tag-emerging-technology","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6615","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6615"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6615\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6615"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6615"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}