The Next Step to Cognitive Intelligence
We are approaching a century of computing, if we think that Kurt Gödel’s paradox about a thinking “system” began what Alan Turing and Claude Shannon would talk about in secret Bell Laboratory projects during World War II, read The Information: a History, a theory and a flood of James Gleick, to understand what was done, until the first computer was created in valves.
Then we develop increasingly complex programs, and we can simulate genome sequencing, weather forecasting, sharing data around the world, but the most interesting pieces for us humans, such as creating a poem, recognizing an image of painting or even reading a Book, explaining it so that systems still fall short.
Now concerned with security systems, machines advance our desires and individualities, they finally seem to challenge the developers: to create a cognitive security capable of going beyond the machines, and to continue to give us security to work with them.
For decades, computers have been trained to recognize viruses, malware and exploits, and we have tried to make these services more accurate, but it is not enough, machines seem to discover our desires and offer things to make us offers and throw us on even stronger consumption Than at the beginning of the cinema and radio era.
Now your attacks and find creative ways to break the defenses, so what systems need is the ability to detect the most subtle change of activity and analyze it with as much context as possible to distinguish and eliminate new threats?
IBM promises to move forward on these smarter, now called cognitive, segregations, Samsung also promises advanced programs in this area, with two key points:
– traditional security is unable to analyze and apply this view in the way that an analyst can. That’s why the most challenging security issues still require people to make good decisions about how to act and how to know if it’s not a false alarm.
– the second is to build a kind of “security instincts” and expertise in new defenses that analyze search reports, Web text, threat data, and other structured and unstructured security-relevant data – just as security professionals do on a daily basis – but on a scale never seen before.
This is the essence of cognitive security, be it the IBM video above.