Warning: exif_imagetype(https://www.edeals2day.com/wp-content/uploads/2024/08/ibm-presents-ai-powered-threat-detection-tools.jpg): failed to open stream: Connection refused in /home/deploy/sites/www.edeals2day.com/wp-includes/functions.php on line 3314

Warning: file_get_contents(https://www.edeals2day.com/wp-content/uploads/2024/08/ibm-presents-ai-powered-threat-detection-tools.jpg): failed to open stream: Connection refused in /home/deploy/sites/www.edeals2day.com/wp-includes/functions.php on line 3336

Warning: exif_imagetype(https://www.edeals2day.com/wp-content/uploads/2024/08/ibm-presents-ai-powered-threat-detection-tools.jpg): failed to open stream: Connection refused in /home/deploy/sites/www.edeals2day.com/wp-includes/functions.php on line 3314

Warning: file_get_contents(https://www.edeals2day.com/wp-content/uploads/2024/08/ibm-presents-ai-powered-threat-detection-tools.jpg): failed to open stream: Connection refused in /home/deploy/sites/www.edeals2day.com/wp-includes/functions.php on line 3336

Jilino1 tv.Jilino1 tv,Jilino1 tv

News

IBM Presents AI-Powered Threat Detection Tools

IBM has added generative artificial intelligence capabilities to its managed threat detection and response services.

IBM Presents AI-Powered Threat Detection Tools

IBM Consulting Cybersecurity Assistant was developed based on the watsonx data processing and AI platform. This product is designed to accelerate and improve identification, investigation, and response to critical security threats. The relevant information was released by the company on Monday, August 5.

Mark Hughes, the global managing partner of cybersecurity services, IBM Consulting, says that cyber incidents turn from immediate crises into multidimensional events lasting months. According to him, against this background, security services face the enduring challenge associated with a very large number of attacks and a lack of time or people to defend against them.

A new tool from IBM analyzes patterns of threat activity in the past, depending on a particular client. In this case, security analysts are provided with assistance in comprehending threats via a timeline view of attack sequences.

IBM’s digital assistant will also automatically recommend actions based on the patterns of analyzed activity and pre-set confidence levels. In this case, the response time for customers will be reduced and lower the attackers’ dwell time.

It is worth noting that during the period of active development and dissemination of artificial intelligence technologies, the issue of cybersecurity has become more relevant. Scammers also have access to AI. Against the background of corresponding realities, digital literacy is extremely important. For example, a query in an Internet search engine, such as how to know if my camera is hacked, will allow anyone to get information about signs of unauthorized access to the device.

Serhii Mikhailov

2776 Posts 0 Comments

Serhii’s track record of study and work spans six years at the Faculty of Philology and eight years in the media, during which he has developed a deep understanding of various aspects of the industry and honed his writing skills; his areas of expertise include fintech, payments, cryptocurrency, and financial services, and he is constantly keeping a close eye on the latest developments and innovations in these fields, as he believes that they will have a significant impact on the future direction of the economy as a whole.