June 28, 2017 By Martin Borrett 2 min read

As a tennis fan, I look forward to the start of Wimbledon every year — an opportunity to watch the world’s best tennis players in action, displaying passion, stamina and poise under pressure. This is what makes great tennis. But what makes great cybersecurity?

IBM security analysts working on-site at the tournament possess many of these same qualities, which help them stay one step ahead of fraudsters and remain ready to fight cyberattacks. Only this year, our team of security analysts won’t have to act alone. They’ll have a new teammate in their court, Watson for Cyber Security, to help them react up to 60 times faster than manual threat investigations.

Watson Serves Up Security at Wimbledon

Watson for Cyber Security already made an appearance at the PGA Masters in April. This was a great testing ground for the cognitive technology that interprets millions of pieces of data and makes unique correlations between the research and current security events. Now applied on-site in the Wimbledon bunker, security analysts will be using Watson for Cyber Security to monitor real-time threats and ensure that any opportunistic attacks against the tournament are discovered and swiftly remediated.

The advent of the digital age and the prevalence of social media means that sports fans no longer have to wait to hear what’s going on during their favorite match. Online resources provide up-to-the-minute scores, attendee tweets, news commentary and more. With all these instant statistics available to consume, IBM works hard behind the scenes to ensure that cybersecurity is the last thing on most people’s minds.

Last year, I had the privilege of taking BBC reporter Gordon Corera behind the scenes at Wimbledon, showing him the best of IBM Security in action at one of the most highly viewed tennis tournaments in the world. Gordon’s feature, which aired on BBC News, highlighted how IBM experts defend against cyberattacks in a secret security bunker underneath London SW19.

Bringing the Power of Man and Machine Together

Last year’s tournament saw a 302 percent year-over-year increase in security incidents and attacks against the event’s official website. Even before the championships, in the week leading up to the first day of play, there was a 275 percent year-over-year increase in attacks.

Any outage as a result of a cybersecurity event could impact the value of the tournament’s brand and its status as the premier tennis event in the world. With over 70 million visits during the 2016 Championships, Wimbledon’s digital properties must always be easily accessible for the millions of fans who use them to check the latest scores, watch live video, view highlights and read articles.

Watson for Cyber Security is now being used at major sporting events — and by IBM clients around the world — to bring the power of man and machine together. Prioritizing the most critical threats and investigating them faster allows our team of specialists to focus on what matters most: the user experience.

Now that you know Wimbledon’s cybersecurity is in safe hands, don your whites, pour yourself a Pimm’s and enjoy the tennis!

To learn more, join in the #WhatMakesGreat twitter conversation.

Learn more about  Watson for Cyber Security

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today