There are two areas that I am particularly interested in. They are artificial intelligence (AI) and mainframe security. And IBM has just announced a generative AI Cybersecurity Assistant.
Worryingly, we
know that ransomware malware is now available for people to use to attack
mainframe sites – that’s for people who may not have a lot of mainframe
expertise. It’s totally de-skilled launching a ransomware attack on an
organization. We also know from IBM’s Cost
of a Data Breach Report 2024
that organizations using AI and automation lowered their average breach costs
compared to those not using AI and automation by an average of US$1.8m. In
addition, organizations extensively using security AI and automation identified
and contained data breaches nearly 100 days faster on average than
organizations that didn’t use these technologies at all.
The survey also
found that among organizations that stated they used AI and automation
extensively, about 27% used AI extensively in each of these categories:
prevention, detection, investigation, and response. Roughly 40% used AI
technologies at least somewhat.
So that makes
IBM’s new product good news for most mainframe sites. Let’s take a more
detailed look.
Built on IBM’s
watsonx platform, this new GenAI Cybersecurity Assistant for threat detection
and response services, enhances alert investigation for IBM Consulting
analysts, accelerating threat identification and response. The new capabilities
reduce investigation times by 48%, offering historical correlation analysis and
an advanced conversational engine to streamline operations.
That means IBM’s
managed Threat Detection and Response (TDR) Services utilized by IBM Consulting
analysts now has the Cybersecurity Assistant module to accelerate and improve
the identification, investigation, and response to critical security threats.
The product “can reduce manual investigations and operational tasks for
security analysts, empowering them to respond more proactively and precisely to
critical threats, and helping to improve overall security posture for client”,
according to Mark Hughes, Global Managing Partner of Cybersecurity Services,
IBM Consulting.
IBM’s Threat
Detection and Response Services is said to be able to automatically escalate or
close up to 85% of alerts; and now, by bringing together existing AI and
automation capabilities with the new generative AI technologies, IBM’s global
security analysts can speed the investigation of the remaining alerts requiring
action. As mentioned earlier, the best figure they are quoting for reducing
alert investigation times using this new capability is 48% for one client.
Cybersecurity
Assistant cross-correlates alerts and enhances insights from SIEM, network,
Endpoint Detection and Response (EDR), vulnerability, and telemetry to provide
a holistic and integrative threat management approach.
By analysing
patterns of historical, client-specific threat activity, security analysts can
better comprehend critical threats. Analysts will have access to a timeline
view of attack sequences, helping them to better understand the issue and
provide more context to investigations. The assistant can automatically recommend
actions based on the historical patterns of analysed activity and pre-set
confidence levels, which can reduce response times for clients and so reduce the
amount of time that attackers are inside an organization’s network. By
continuously learning from investigations, the Cybersecurity Assistant’s speed
and accuracy is expected to improve over time.
The generative
AI conversational engine in the Cybersecurity Assistant provides real-time
insights and support on operational tasks to both clients and IBM security
analysts. It can respond to requests, such as opening or summarizing tickets, as
well as automatically triggering relevant actions, such as running queries,
pulling logs, command explanations, or enriching threat intelligence. By
explaining complex security events and commands, IBM’s Threat Detection and
Response Service can help reduce noise and boost overall security operations centre
(SOC) efficiency for clients.
Anything that
can accelerate cyber threat investigations and remediation has got to be good,
which this product does using historical correlation analysis (discussed above).
Its other significant feature is its ability to streamline operational tasks,
which it does using its conversational engine (also discussed above).
There really is
an arms race between the bad actors and the rest of us. Anything that gives our
side an advantage, no matter how briefly that might be for, has got to be good.
Plus, it provides a stepping stone to the next advantage that some bright spark
will give us. No-one wants their data all over the dark web, and few companies
can afford the cost of fines for non-compliance as well as court costs and
payments to people whose data is stolen.
No comments:
Post a Comment