November 17, 2016 By Security Intelligence Staff 2 min read

IBM Security recently launched and announced quite a few initiatives designed to help organizations defend against cyberattacks, including:

  • The opening of the fully operational X-Force Command Cyber Range. This space immerses participants in simulated cyberattacks to train them to properly prepare for, respond to and manage a broad variety of threats.
  • The upgrade of the IBM X-Force Command Center Atlanta, a security operations center that IBM has operated for 15 years. The facility now handles over 35 billion security events per day — a 75 percent increase in capacity.
  • The formation of the new IBM X-Force IRIS Team, an incident response and intelligence consulting service. Over 100 elite cybersecurity consultants around the world use IBM’s X-Force Threat Intelligence network to help clients understand where and how cyberattacks are being launched so they can defend against and remediate them with greater speed and accuracy.

A Tour de X-Force

You might have noticed that X-Force has a hand in all these initiatives. So we sat down with Nick Bradley, an X-Force Research Practice Lead, to learn more about the evolution of the IBM X-Force team and its objectives.

Question: How has IBM X-Force changed over time?

Bradley: Our mission has always been based on protecting our clients. However, over time, that mission has expanded into a great many different areas. Whereas the main focus was to monitor threats and vulnerabilities to create coverage in IBM products, we now do much more in the way of pure research.

We are now the center for information sharing within IBM and, in many cases, outside of IBM through the amazing capabilities of the X-Force Exchange. My X-Force Threat Research team and X-Force Threat Analysis team have moved on from just reporting the news to discovering it and publishing it as original works.

It is only right that all of this progress benefit what we used to call the security operations center (SOC). Now being bolstered by all the arms of the X-Force, it seemed logical to rebrand the SOC as the X-Force Command Center.

What gives IBM X-Force an edge over other commercial research groups?

Bradley: Simply stated, experience. X-Force has been doing this since before cybersecurity was a household word. We have access to copious amounts of data from around the world and from many different sectors. This gives us a unique perspective into the threat landscape.

How does the research from IBM X-Force support enhancements to our protection solutions for clients?

Bradley: I almost want to say that this is a no-brainer, but I know that is only due to my involvement. The research being done is communicated up, down and across, through multiple channels, to keep all the different facets of IBM Security informed. Our discoveries usually make their way directly into the IBM products, either at a signature level or on a correlation level. The information sharing channels we have developed make this easier and easier.

Anything else you might want to add related to the X-Force Command Center?

Bradley: It’s cool! The X-Force Command Center is a state-of-the-art working and collaboration environment developed by analysts for analysts. Gone is the dark, dank dungeon look where even working with someone 10 feet away was difficult due to the floor layout. This is a very comfortable work environment that enables collaboration.

More from

New proposed federal data privacy law suggests big changes

3 min read - After years of work and unsuccessful attempts at legislation, a draft of a federal data privacy law was recently released. The United States House Committee on Energy and Commerce released the American Privacy Rights Act on April 7, 2024. Several issues stood in the way of passing legislation in the past, such as whether states could issue tougher rules and if individuals could sue companies for privacy violations. With the American Privacy Rights Act of 2024, the U.S. government established…

AI cybersecurity solutions detect ransomware in under 60 seconds

2 min read - Worried about ransomware? If so, it’s not surprising. According to the World Economic Forum, for large cyber losses (€1 million+), the number of cases in which data is exfiltrated is increasing, doubling from 40% in 2019 to almost 80% in 2022. And more recent activity is tracking even higher.Meanwhile, other dangers are appearing on the horizon. For example, the 2024 IBM X-Force Threat Intelligence Index states that threat group investment is increasingly focused on generative AI attack tools.Criminals have been…

The major hardware flaw in Apple M-series chips

3 min read - The “need for speed” is having a negative impact on many Mac users right now. The Apple M-series chips, which are designed to deliver more consistent and faster performance than the Intel processors used in the past, have a vulnerability that can expose cryptographic keys, leading an attacker to reveal encrypted data. This critical security flaw, known as GoFetch, exploits a vulnerability found in the M-chips data memory-dependent prefetcher (DMP). DMP’s benefits and vulnerabilities DMP predicts memory addresses that the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today