Cognitive 7 – Challenging Cyber-Criminals

It’s estimated that cyber-crime will cost the global economy more than $2 trillion by 2019—and could be the greatest threat to every company in the world! Since I have your attention now, lets spend some more time detailing this statement that I made.

cybercrimeOrganized criminals, hacktivists, governments and adversaries are compelled by financial gain, politics and notoriety to attack organizations’ most valuable assets. Their operations are well funded and business-like. However, cybersecurity solutions of the past often fail to protect against increasingly sophisticated attack methods. The result is more severe security breaches happening more frequently (50% increase in past year alone) which are geared towards stealing higher-value records such as health-related personally identifiable information (PII) and other highly sensitive data.

3 Top Security concerns of companies:

  • Optimizing their security program to unite security silos, reduce complexity and lower costs as opposed to buying dozens of products from dozens of vendors to nail down all kind of security risks.
  • Stopping advanced threats to prevent, detect and respond to known and unknown threats throughout the entire attack lifecycle. Currently on average a company takes 201 days to identify a data breach!
  • Safeguarding critical assets across users, applications, sensitive data and infrastructure, in the cloud, on mobile or on-premise. Note more than 55 percent of all attacks are carried out by malicious insiders or inadvertent actors

Protecting against security threats:

Cybersecurity  can be compared to an immune system. When you get a cold or virus, the immune system understands the virus and sends data through your central nervous system (security intelligence) to create white blood cells and antibodies to gather info, prioritize and take action. This is what’s called the “immune response.” Faced with an attack—whether to a server, mobile device, application, etc.—an effective security solution should detect that breach and work to stop it, similar to how an immune system would function.

Continuing with our comparison to fighting infection, think about how global health organizations share data to stop a pandemic. For cybersecurity, a partner ecosystem serves that same purpose. When organizations collaborate and share their data on new or changing threats, the other organizations can more quickly assess their own vulnerability based on that data and put appropriate protections in place.

Why Cognitive security?

Because even with major advances in technology, the tools available to today’s security analysts aren’t enough to keep up with the number of security events they see every day. There’s a tremendous amount of security knowledge created for human consumption, yet most of it is untapped. 80% of all data on the internet, including blogs, articles, videos, reports, alerts and other information cannot be processed by traditional security tools, and it’s this unstructured data which often proves most valuable in detecting and stopping threats before they cause harm.

Cognitive computing has the ability to tap into and make sense of all of the security data that has previously been dark. A cognitive systems continues to observe events and behaviors—distinguishing the good from the bad—the ability to use integrated defenses to block new threats gets stronger and stronger. By helping to make security analysts more effective and accelerating the response to emerging threats, cognitive security will help to address the current security skills gap, bringing heightened levels of confidence and risk control.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s