June 28, 2017 By Martin Borrett 2 min read

As a tennis fan, I look forward to the start of Wimbledon every year — an opportunity to watch the world’s best tennis players in action, displaying passion, stamina and poise under pressure. This is what makes great tennis. But what makes great cybersecurity?

IBM security analysts working on-site at the tournament possess many of these same qualities, which help them stay one step ahead of fraudsters and remain ready to fight cyberattacks. Only this year, our team of security analysts won’t have to act alone. They’ll have a new teammate in their court, Watson for Cyber Security, to help them react up to 60 times faster than manual threat investigations.

Watson Serves Up Security at Wimbledon

Watson for Cyber Security already made an appearance at the PGA Masters in April. This was a great testing ground for the cognitive technology that interprets millions of pieces of data and makes unique correlations between the research and current security events. Now applied on-site in the Wimbledon bunker, security analysts will be using Watson for Cyber Security to monitor real-time threats and ensure that any opportunistic attacks against the tournament are discovered and swiftly remediated.

The advent of the digital age and the prevalence of social media means that sports fans no longer have to wait to hear what’s going on during their favorite match. Online resources provide up-to-the-minute scores, attendee tweets, news commentary and more. With all these instant statistics available to consume, IBM works hard behind the scenes to ensure that cybersecurity is the last thing on most people’s minds.

Last year, I had the privilege of taking BBC reporter Gordon Corera behind the scenes at Wimbledon, showing him the best of IBM Security in action at one of the most highly viewed tennis tournaments in the world. Gordon’s feature, which aired on BBC News, highlighted how IBM experts defend against cyberattacks in a secret security bunker underneath London SW19.

Bringing the Power of Man and Machine Together

Last year’s tournament saw a 302 percent year-over-year increase in security incidents and attacks against the event’s official website. Even before the championships, in the week leading up to the first day of play, there was a 275 percent year-over-year increase in attacks.

Any outage as a result of a cybersecurity event could impact the value of the tournament’s brand and its status as the premier tennis event in the world. With over 70 million visits during the 2016 Championships, Wimbledon’s digital properties must always be easily accessible for the millions of fans who use them to check the latest scores, watch live video, view highlights and read articles.

Watson for Cyber Security is now being used at major sporting events — and by IBM clients around the world — to bring the power of man and machine together. Prioritizing the most critical threats and investigating them faster allows our team of specialists to focus on what matters most: the user experience.

Now that you know Wimbledon’s cybersecurity is in safe hands, don your whites, pour yourself a Pimm’s and enjoy the tennis!

To learn more, join in the #WhatMakesGreat twitter conversation.

Learn more about  Watson for Cyber Security

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today