June 28, 2017 By Martin Borrett 2 min read

As a tennis fan, I look forward to the start of Wimbledon every year — an opportunity to watch the world’s best tennis players in action, displaying passion, stamina and poise under pressure. This is what makes great tennis. But what makes great cybersecurity?

IBM security analysts working on-site at the tournament possess many of these same qualities, which help them stay one step ahead of fraudsters and remain ready to fight cyberattacks. Only this year, our team of security analysts won’t have to act alone. They’ll have a new teammate in their court, Watson for Cyber Security, to help them react up to 60 times faster than manual threat investigations.

Watson Serves Up Security at Wimbledon

Watson for Cyber Security already made an appearance at the PGA Masters in April. This was a great testing ground for the cognitive technology that interprets millions of pieces of data and makes unique correlations between the research and current security events. Now applied on-site in the Wimbledon bunker, security analysts will be using Watson for Cyber Security to monitor real-time threats and ensure that any opportunistic attacks against the tournament are discovered and swiftly remediated.

The advent of the digital age and the prevalence of social media means that sports fans no longer have to wait to hear what’s going on during their favorite match. Online resources provide up-to-the-minute scores, attendee tweets, news commentary and more. With all these instant statistics available to consume, IBM works hard behind the scenes to ensure that cybersecurity is the last thing on most people’s minds.

Last year, I had the privilege of taking BBC reporter Gordon Corera behind the scenes at Wimbledon, showing him the best of IBM Security in action at one of the most highly viewed tennis tournaments in the world. Gordon’s feature, which aired on BBC News, highlighted how IBM experts defend against cyberattacks in a secret security bunker underneath London SW19.

Bringing the Power of Man and Machine Together

Last year’s tournament saw a 302 percent year-over-year increase in security incidents and attacks against the event’s official website. Even before the championships, in the week leading up to the first day of play, there was a 275 percent year-over-year increase in attacks.

Any outage as a result of a cybersecurity event could impact the value of the tournament’s brand and its status as the premier tennis event in the world. With over 70 million visits during the 2016 Championships, Wimbledon’s digital properties must always be easily accessible for the millions of fans who use them to check the latest scores, watch live video, view highlights and read articles.

Watson for Cyber Security is now being used at major sporting events — and by IBM clients around the world — to bring the power of man and machine together. Prioritizing the most critical threats and investigating them faster allows our team of specialists to focus on what matters most: the user experience.

Now that you know Wimbledon’s cybersecurity is in safe hands, don your whites, pour yourself a Pimm’s and enjoy the tennis!

To learn more, join in the #WhatMakesGreat twitter conversation.

Learn more about  Watson for Cyber Security

More from

Evolving red teaming for AI environments

2 min read - As AI becomes more ingrained in businesses and daily life, the importance of security grows more paramount. In fact, according to the IBM Institute for Business Value, 96% of executives say adopting generative AI (GenAI) makes a security breach likely in their organization in the next three years. Whether it’s a model performing unintended actions, generating misleading or harmful responses or revealing sensitive information, in the AI era security can no longer be an afterthought to innovation.AI red teaming is emerging…

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

A spotlight on Akira ransomware from X-Force Incident Response and Threat Intelligence

7 min read - This article was made possible thanks to contributions from Aaron Gdanski.IBM X-Force Incident Response and Threat Intelligence teams have investigated several Akira ransomware attacks since this threat actor group emerged in March 2023. This blog will share X-Force’s unique perspective on Akira gained while observing the threat actors behind this ransomware, including commands used to deploy the ransomware, active exploitation of CVE-2023-20269 and analysis of the ransomware binary.The Akira ransomware group has gained notoriety in the current cybersecurity landscape, underscored…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today