June 28, 2017 By Martin Borrett 2 min read

As a tennis fan, I look forward to the start of Wimbledon every year — an opportunity to watch the world’s best tennis players in action, displaying passion, stamina and poise under pressure. This is what makes great tennis. But what makes great cybersecurity?

IBM security analysts working on-site at the tournament possess many of these same qualities, which help them stay one step ahead of fraudsters and remain ready to fight cyberattacks. Only this year, our team of security analysts won’t have to act alone. They’ll have a new teammate in their court, Watson for Cyber Security, to help them react up to 60 times faster than manual threat investigations.

Watson Serves Up Security at Wimbledon

Watson for Cyber Security already made an appearance at the PGA Masters in April. This was a great testing ground for the cognitive technology that interprets millions of pieces of data and makes unique correlations between the research and current security events. Now applied on-site in the Wimbledon bunker, security analysts will be using Watson for Cyber Security to monitor real-time threats and ensure that any opportunistic attacks against the tournament are discovered and swiftly remediated.

The advent of the digital age and the prevalence of social media means that sports fans no longer have to wait to hear what’s going on during their favorite match. Online resources provide up-to-the-minute scores, attendee tweets, news commentary and more. With all these instant statistics available to consume, IBM works hard behind the scenes to ensure that cybersecurity is the last thing on most people’s minds.

Last year, I had the privilege of taking BBC reporter Gordon Corera behind the scenes at Wimbledon, showing him the best of IBM Security in action at one of the most highly viewed tennis tournaments in the world. Gordon’s feature, which aired on BBC News, highlighted how IBM experts defend against cyberattacks in a secret security bunker underneath London SW19.

Bringing the Power of Man and Machine Together

Last year’s tournament saw a 302 percent year-over-year increase in security incidents and attacks against the event’s official website. Even before the championships, in the week leading up to the first day of play, there was a 275 percent year-over-year increase in attacks.

Any outage as a result of a cybersecurity event could impact the value of the tournament’s brand and its status as the premier tennis event in the world. With over 70 million visits during the 2016 Championships, Wimbledon’s digital properties must always be easily accessible for the millions of fans who use them to check the latest scores, watch live video, view highlights and read articles.

Watson for Cyber Security is now being used at major sporting events — and by IBM clients around the world — to bring the power of man and machine together. Prioritizing the most critical threats and investigating them faster allows our team of specialists to focus on what matters most: the user experience.

Now that you know Wimbledon’s cybersecurity is in safe hands, don your whites, pour yourself a Pimm’s and enjoy the tennis!

To learn more, join in the #WhatMakesGreat twitter conversation.

Learn more about  Watson for Cyber Security

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today