June 28, 2017 By Martin Borrett 2 min read

As a tennis fan, I look forward to the start of Wimbledon every year — an opportunity to watch the world’s best tennis players in action, displaying passion, stamina and poise under pressure. This is what makes great tennis. But what makes great cybersecurity?

IBM security analysts working on-site at the tournament possess many of these same qualities, which help them stay one step ahead of fraudsters and remain ready to fight cyberattacks. Only this year, our team of security analysts won’t have to act alone. They’ll have a new teammate in their court, Watson for Cyber Security, to help them react up to 60 times faster than manual threat investigations.

Watson Serves Up Security at Wimbledon

Watson for Cyber Security already made an appearance at the PGA Masters in April. This was a great testing ground for the cognitive technology that interprets millions of pieces of data and makes unique correlations between the research and current security events. Now applied on-site in the Wimbledon bunker, security analysts will be using Watson for Cyber Security to monitor real-time threats and ensure that any opportunistic attacks against the tournament are discovered and swiftly remediated.

The advent of the digital age and the prevalence of social media means that sports fans no longer have to wait to hear what’s going on during their favorite match. Online resources provide up-to-the-minute scores, attendee tweets, news commentary and more. With all these instant statistics available to consume, IBM works hard behind the scenes to ensure that cybersecurity is the last thing on most people’s minds.

Last year, I had the privilege of taking BBC reporter Gordon Corera behind the scenes at Wimbledon, showing him the best of IBM Security in action at one of the most highly viewed tennis tournaments in the world. Gordon’s feature, which aired on BBC News, highlighted how IBM experts defend against cyberattacks in a secret security bunker underneath London SW19.

Bringing the Power of Man and Machine Together

Last year’s tournament saw a 302 percent year-over-year increase in security incidents and attacks against the event’s official website. Even before the championships, in the week leading up to the first day of play, there was a 275 percent year-over-year increase in attacks.

Any outage as a result of a cybersecurity event could impact the value of the tournament’s brand and its status as the premier tennis event in the world. With over 70 million visits during the 2016 Championships, Wimbledon’s digital properties must always be easily accessible for the millions of fans who use them to check the latest scores, watch live video, view highlights and read articles.

Watson for Cyber Security is now being used at major sporting events — and by IBM clients around the world — to bring the power of man and machine together. Prioritizing the most critical threats and investigating them faster allows our team of specialists to focus on what matters most: the user experience.

Now that you know Wimbledon’s cybersecurity is in safe hands, don your whites, pour yourself a Pimm’s and enjoy the tennis!

To learn more, join in the #WhatMakesGreat twitter conversation.

Learn more about  Watson for Cyber Security

More from

CVE-2023-20078 technical analysis: Identifying and triggering a command injection vulnerability in Cisco IP phones

7 min read - CVE-2023-20078 catalogs an unauthenticated command injection vulnerability in the web-based management interface of Cisco 6800, 7800, and 8800 Series IP Phones with Multiplatform Firmware installed; however, limited technical analysis is publicly available. This article presents my findings while researching this vulnerability. In the end, the reader should be equipped with the information necessary to understand and trigger this vulnerability.Vulnerability detailsThe following Cisco Security Advisory (Cisco IP Phone 6800, 7800, and 8800 Series Web UI Vulnerabilities - Cisco) details CVE-2023-20078 and…

X-Force data reveals top spam trends, campaigns and senior superlatives in 2023

10 min read - The 2024 IBM X-Force Threat Intelligence Index revealed attackers continued to pivot to evade detection to deliver their malware in 2023. The good news? Security improvements, such as Microsoft blocking macro execution by default starting in 2022 and OneNote embedded files with potentially dangerous extensions by mid-2023, have changed the threat landscape for the better. Improved endpoint detection also likely forced attackers to shift away from other techniques prominent in 2022, such as using disk image files (e.g. ISO) and…

The compelling need for cloud-native data protection

4 min read - Cloud environments were frequent targets for cyber attackers in 2023. Eighty-two percent of breaches that involved data stored in the cloud were in public, private or multi-cloud environments. Attackers gained the most access to multi-cloud environments, with 39% of breaches spanning multi-cloud environments because of the more complicated security issues. The cost of these cloud breaches totaled $4.75 million, higher than the average cost of $4.45 million for all data breaches.The reason for this high cost is not only the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today