November 17, 2016 By Security Intelligence Staff 2 min read

IBM Security recently launched and announced quite a few initiatives designed to help organizations defend against cyberattacks, including:

  • The opening of the fully operational X-Force Command Cyber Range. This space immerses participants in simulated cyberattacks to train them to properly prepare for, respond to and manage a broad variety of threats.
  • The upgrade of the IBM X-Force Command Center Atlanta, a security operations center that IBM has operated for 15 years. The facility now handles over 35 billion security events per day — a 75 percent increase in capacity.
  • The formation of the new IBM X-Force IRIS Team, an incident response and intelligence consulting service. Over 100 elite cybersecurity consultants around the world use IBM’s X-Force Threat Intelligence network to help clients understand where and how cyberattacks are being launched so they can defend against and remediate them with greater speed and accuracy.

A Tour de X-Force

You might have noticed that X-Force has a hand in all these initiatives. So we sat down with Nick Bradley, an X-Force Research Practice Lead, to learn more about the evolution of the IBM X-Force team and its objectives.

Question: How has IBM X-Force changed over time?

Bradley: Our mission has always been based on protecting our clients. However, over time, that mission has expanded into a great many different areas. Whereas the main focus was to monitor threats and vulnerabilities to create coverage in IBM products, we now do much more in the way of pure research.

We are now the center for information sharing within IBM and, in many cases, outside of IBM through the amazing capabilities of the X-Force Exchange. My X-Force Threat Research team and X-Force Threat Analysis team have moved on from just reporting the news to discovering it and publishing it as original works.

It is only right that all of this progress benefit what we used to call the security operations center (SOC). Now being bolstered by all the arms of the X-Force, it seemed logical to rebrand the SOC as the X-Force Command Center.

What gives IBM X-Force an edge over other commercial research groups?

Bradley: Simply stated, experience. X-Force has been doing this since before cybersecurity was a household word. We have access to copious amounts of data from around the world and from many different sectors. This gives us a unique perspective into the threat landscape.

How does the research from IBM X-Force support enhancements to our protection solutions for clients?

Bradley: I almost want to say that this is a no-brainer, but I know that is only due to my involvement. The research being done is communicated up, down and across, through multiple channels, to keep all the different facets of IBM Security informed. Our discoveries usually make their way directly into the IBM products, either at a signature level or on a correlation level. The information sharing channels we have developed make this easier and easier.

Anything else you might want to add related to the X-Force Command Center?

Bradley: It’s cool! The X-Force Command Center is a state-of-the-art working and collaboration environment developed by analysts for analysts. Gone is the dark, dank dungeon look where even working with someone 10 feet away was difficult due to the floor layout. This is a very comfortable work environment that enables collaboration.

More from

How governance, risk and compliance (GRC) addresses growing data liability concerns

4 min read - In an era where businesses increasingly rely on artificial intelligence (AI) and advanced data capabilities, the effectiveness of IT services is more critical than ever. Yet despite the advancements in technology, business leaders are increasingly dissatisfied with their IT departments.According to a study by IBM's Institute for Business Value, confidence in the effectiveness of basic IT services among top executives has significantly declined. While AI promises transformational capabilities, particularly generative artificial intelligence (gen AI), the road to realizing these benefits…

Risk, reward and reality: Has enterprise perception of the public cloud changed?

4 min read - Public clouds now form the bulk of enterprise IT environments. According to 2024 Statista data, 73% of enterprises use a hybrid cloud model, 14% use multiple public clouds and 10% use a single public cloud solution. Multiple and single private clouds make up the remaining 3%.With enterprises historically reticent to adopt public clouds, adoption data seems to indicate a shift in perception. Perhaps enterprise efforts have finally moved away from reducing risk to prioritizing the potential rewards of public cloud…

Cybersecurity Awareness Month: Horror stories

4 min read - When it comes to cybersecurity, the question is when, not if, an organization will suffer a cyber incident. Even the most sophisticated security tools can’t withstand the biggest threat: human behavior.October is Cybersecurity Awareness Month, the time of year when we celebrate all things scary. So it seemed appropriate to ask cybersecurity professionals to share some of their most memorable and haunting cyber incidents. (Names and companies are anonymous to avoid any negative impact. Suffering a cyber incident is bad…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today