November 17, 2016 By Security Intelligence Staff 2 min read

IBM Security recently launched and announced quite a few initiatives designed to help organizations defend against cyberattacks, including:

  • The opening of the fully operational X-Force Command Cyber Range. This space immerses participants in simulated cyberattacks to train them to properly prepare for, respond to and manage a broad variety of threats.
  • The upgrade of the IBM X-Force Command Center Atlanta, a security operations center that IBM has operated for 15 years. The facility now handles over 35 billion security events per day — a 75 percent increase in capacity.
  • The formation of the new IBM X-Force IRIS Team, an incident response and intelligence consulting service. Over 100 elite cybersecurity consultants around the world use IBM’s X-Force Threat Intelligence network to help clients understand where and how cyberattacks are being launched so they can defend against and remediate them with greater speed and accuracy.

A Tour de X-Force

You might have noticed that X-Force has a hand in all these initiatives. So we sat down with Nick Bradley, an X-Force Research Practice Lead, to learn more about the evolution of the IBM X-Force team and its objectives.

Question: How has IBM X-Force changed over time?

Bradley: Our mission has always been based on protecting our clients. However, over time, that mission has expanded into a great many different areas. Whereas the main focus was to monitor threats and vulnerabilities to create coverage in IBM products, we now do much more in the way of pure research.

We are now the center for information sharing within IBM and, in many cases, outside of IBM through the amazing capabilities of the X-Force Exchange. My X-Force Threat Research team and X-Force Threat Analysis team have moved on from just reporting the news to discovering it and publishing it as original works.

It is only right that all of this progress benefit what we used to call the security operations center (SOC). Now being bolstered by all the arms of the X-Force, it seemed logical to rebrand the SOC as the X-Force Command Center.

What gives IBM X-Force an edge over other commercial research groups?

Bradley: Simply stated, experience. X-Force has been doing this since before cybersecurity was a household word. We have access to copious amounts of data from around the world and from many different sectors. This gives us a unique perspective into the threat landscape.

How does the research from IBM X-Force support enhancements to our protection solutions for clients?

Bradley: I almost want to say that this is a no-brainer, but I know that is only due to my involvement. The research being done is communicated up, down and across, through multiple channels, to keep all the different facets of IBM Security informed. Our discoveries usually make their way directly into the IBM products, either at a signature level or on a correlation level. The information sharing channels we have developed make this easier and easier.

Anything else you might want to add related to the X-Force Command Center?

Bradley: It’s cool! The X-Force Command Center is a state-of-the-art working and collaboration environment developed by analysts for analysts. Gone is the dark, dank dungeon look where even working with someone 10 feet away was difficult due to the floor layout. This is a very comfortable work environment that enables collaboration.

More from

Cybersecurity dominates concerns among the C-suite, small businesses and the nation

4 min read - Once relegated to the fringes of business operations, cybersecurity has evolved into a front-and-center concern for organizations worldwide. What was once considered a technical issue managed by IT departments has become a boardroom topic of utmost importance. With the rise of sophisticated cyberattacks, the growing use of generative AI by threat actors and massive data breach costs, it is no longer a question of whether cybersecurity matters but how deeply it affects every facet of modern operations.The 2024 Allianz Risk…

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Adversarial advantage: Using nation-state threat analysis to strengthen U.S. cybersecurity

4 min read - Nation-state adversaries are changing their approach, pivoting from data destruction to prioritizing stealth and espionage. According to the Microsoft 2023 Digital Defense Report, "nation-state attackers are increasing their investments and launching more sophisticated cyberattacks to evade detection and achieve strategic priorities."These actors pose a critical threat to United States infrastructure and protected data, and compromising either resource could put citizens at risk.Thankfully, there's an upside to these malicious efforts: information. By analyzing nation-state tactics, government agencies and private enterprises are…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today