• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

CYBER WARFARE, EW, CLOUD HOMELAND SECURITY UPDATE

January 20, 2017 by

17 Jan 17. Watson For Cybersecurity. IBM has announced that 40 companies around the world have signed up for its IBM Watson’s Beta Cybersecurity Program. The companies will test the ability of IBM’s cognitive computing technology to help in the battle against cybercrime. The trial will include representatives of the banking, healthcare, insurance, education and other key industry sectors. Watson for Cyber Security uses technologies such as machine learning and natural language processing, which is being trained to understand the language of security.
IBM claims the combined technologies will help security analysts make better, faster decisions from vast amounts of data, including unstructured data that has been “dark” to security defences until now.
Today’s increasingly challenging security environment has created the need for more intelligence to identify and prioritise threats, which is, in turn, increasing the workload of security analysts with more alerts and anomalies to process than ever, said IBM.
A recent study from the IBM Institute for Business Value shows that nearly 60% of security professionals believe emerging cognitive technologies will play a critical role in turning the tide in the war on cyber-crime.
“Customers are in the early stages of implementing cognitive security technologies,” said Sandy Bird, chief technology officer at IBM Security. “Our research suggests this adoption will increase threefold over the next three years, as tools like Watson for Cyber Security mature and become pervasive in security operations centres. Currently, only 7% of security professionals claim to be using cognitive solutions.” Companies taking part in the beta tests will use Watson in their current security environments to bring additional context to their cyber security data. IBM said Watson will help organisations to determine whether or not a current security “offence” is associated with a known malware or cyber-crime campaign. If it is, Watson can provide background on the malware employed, vulnerabilities exploited and scope of the threat, among other insights, said IBM. Watson is also expected to help improve organisations’ ability to identify suspicious behaviour by providing additional context to user activity. Working with these beta customers, IBM is continuing to enhance Watson’s understanding of the cyber security data and refine how Watson can seamlessly integrate into day-to-day security operations. (Source: Cyber Security Intelligence/ComputerWeekly)

17 Jan 17. Pair of Air Force Cyber Weapons Systems Ready for War. Late last year, the Air Force declared one of its newest cyber weapons tools initially operationally capable. The tool, the Automated Remediation Asset Discovery (ARAD), is a modification to the Air Force Cyber Security and Control System (CSCS), which was itself declared IOC by Air Force Space Command in 2014.
CSCS, according to an Air Force fact sheet, is a weapons system that is designed to provide 24/7 network operations and management functions enabling key enterprise services within both classified and unclassified Air Force networks as well as supporting defensive cyber operations on those networks.
As outlined in a recent release from 24th Air Force – home to Air Force’s Cyber – ARAD leverages leading-edge technology to comprehensively modernize and efficiently improve vulnerability management execution, defensive cyber operations, system health, asset management and situational awareness capabilities.
“ARAD brings improved speed and precision across the enterprise. We are excited about the potential ARAD holds to improve our situational awareness and cyberspace defense,” said Brig. Gen. Mitchel Butikofer, 24th Air Force vice commander.
Moreover, ARAD will improve management of vulnerability discovery and remediate them automatically in a matter of seconds to minutes, as opposed to days or weeks.
“ARAD has the ability to discover and identify adversary activity and actions

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
Hilux Military Raceday Novemeber 2023 Chepstow SOF Week 2023

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    March 24, 2023
    Read more
  • VETERANS UPDATE

    March 24, 2023
    Read more
  • MANAGEMENT ON THE MOVE

    March 24, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT