Machine Learning For Cybersecurity Not Cybercrime

The cybersecurity industry has always been under constant strain from cybercriminals and malware. With increasing integration of hardware, software and services being built into every aspect of our lives, the task of keeping data secure has become even more difficult. The arsenal of tools that cybercriminals now have at their disposal has raised concerns for…

Using Cognitive Security to Fight the Cybersecurity Borg

Organizations today find themselves in a situation not unlike that of the Enterprise crew in “Star Trek.” They are facing a formidable, technologically advanced enemy capable of taking over key components of the organization. In one episode of “Star Trek,” in fact, the Borg collective takes control of Captain Jean-Luc Picard himself, to the horror…

Getting Primed to Adopt Cognitive Security Solutions

President Barack Obama recently sat down for an interview on emerging technologies with Wired Magazine. “Traditionally, when we think about security and protecting ourselves, we think in terms of armor or walls,” he said. “Increasingly, I find myself looking to medicine and thinking about viruses, antibodies … It means that we’ve got to think differently…

Cognitive systems and artificial intelligence revenues to reach $47 billion in 2020

Widespread adoption of cognitive systems and artificial intelligence (AI) across a broad range of industries will drive worldwide revenues from nearly $8 billion in 2016 to more than $47 billion in 2020. According to IDC, the market for cognitive/AI solutions will experience a CAGR of 55.1% over the 2016-2020 forecast period. “Software developers and end…

IBM deploys machine learning to bolster online banking security program

Behavioral biometrics that uses machine learning is behind new features being added to IBM’s Trusteer Pinpoint Detect platform, which financial institutions use to head off crooks who may have stolen the username and password of legitimate account holders. The new feature looks for anomalies between legitimate users’ normal mouse gestures and those of the current…