IBM Company Cyber Security Posture

ibm.com

At IBM, we do more than work. We create. We create as technologists, developers, and engineers. We create with our partners. We create with our competitors. If you're searching for ways to make the world work better through technology and infrastructure, software and consulting, then we want to work with you. We're here to help every creator turn their "what if" into what is. Let's create something that will change everything.

IBM Company Details

Linkedin ID:

ibm

Employees number:

330724 employees

Number of followers:

17958236.0

NAICS:

541

Industry Type:

IT Services and IT Consulting

Homepage:

ibm.com

IP Addresses:

Scan still pending

Company ID:

IBM_3075085

Scan Status:

In-progress

AI scoreIBM Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

IBM Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

IBM Company Cyber Security News & History

Past Incidents
3
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
IBMVulnerability60304/2020IBM162291222Link
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: Four zero-day vulnerabilities impacted an IBM security product after the company refused to patch bugs following a private bug disclosure attempt. The bugs impacted the IBM Data Risk Manager (IDRM). It is an enterprise security tool that aggregates feeds from vulnerability scanning tools and other risk management tools to let admins investigate security issues. The compromise of product led to a full-scale company compromise, as the tool had credentials to access other security tools. It contained information about critical vulnerabilities that affect the company.

IBMVulnerability10053/2025IBM545032025Link
Rankiteo Explanation :
Attack threatening the organizationโ€™s existence

Description: IBM AIX operating systems experienced critical security vulnerabilities, traced as CVE-2024-56346 and CVE-2024-56347, which could potentially allow unauthorized remote attackers to execute arbitrary commands, thus compromising the system's integrity. The flaws had high CVSS scores of 10.0 and 9.6, indicating critical severity. Being operational in key sectors like finance, banking, healthcare, and telecommunications, the vulnerability threatened sensitive operations, critical applications, and data security. Unpatched, these vulnerabilities presented risks of unauthorized access, data theft, and service disruptions with the potential for cascading impacts across affected enterprises.

IBMVulnerability10056/2025IBM347060525Link
Rankiteo Explanation :
Attack threatening the organization's existence

Description: IBM experienced a cloud outage on Wednesday that lasted over four hours, causing users to be unable to access the console for managing their cloud resources or to open and view support cases. This outage repeated a similar incident from Tuesday. Additionally, IBM identified a critical-rated vulnerability in its QRadar threat detection and response tools and Cloud Pak for Security integration suite, which left a password in a configuration file. The vulnerability was scored 9.6 on the Common Vulnerability Scoring System, and IBM's security bulletin also advised of four other QRadar flaws.

IBM Company Subsidiaries

SubsidiaryImage

At IBM, we do more than work. We create. We create as technologists, developers, and engineers. We create with our partners. We create with our competitors. If you're searching for ways to make the world work better through technology and infrastructure, software and consulting, then we want to work with you. We're here to help every creator turn their "what if" into what is. Let's create something that will change everything.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=ibm' -H 'apikey: YOUR_API_KEY_HERE'
newsone

IBM Cyber Security News

2025-06-13T07:00:00.000Z
What Is Cybersecurity?

Cybersecurity is the practice of protecting people, systems and data from cyberattacks by using various technologies, processes and policies. Atย ...

2025-07-06T07:31:14.000Z
3 Top Cybersecurity Stocks to Buy in July

3 Top Cybersecurity Stocks to Buy in July ยท 1. Check Point. Check Point is a pure-play cybersecurity stock, working with more than 100,000ย ...

2025-07-04T04:42:10.000Z
Neudesic's Cloud Security Renewal: A Strategic Play in the Cybersecurity Boom

Neudesic, an IBM subsidiary, has solidified its position as a leader in hybrid cloud security with its renewed Microsoft Cloud Securityย ...

2025-04-22T07:00:00.000Z
Cloud Range, Cyviz join to boost cybersecurity curriculum in higher education through IBMโ€™s Cyber Campus

The flexibility of the IBM Cyber Campus experience ensures educational institutions can integrate comprehensive cybersecurity training intoย ...

2025-04-22T07:00:00.000Z
IBM Asks: How is the Cybersecurity Landscape Evolving?

Share. Share. IBM Quantum scientist Dr. Maika Takita in a lab (Credit: IBM). IBM has released its 'IBM X-Force 2025 Threat Intelligenceย ...

2025-04-02T21:38:07.000Z
Cybersecurity trends: IBMโ€™s predictions for 2025

Last year's cybersecurity predictions focused heavily on AI and its impact on how security teams will operate in the future.

2025-04-21T07:00:00.000Z
IBM X-Force reports evolving threat landscape amid shifting tactics, marking rise in stealth and identity exploits

The IBM X-Force report noted that hackers openly trade exploits on the dark web to target critical infrastructure, while ransomware andย ...

2025-01-27T08:00:00.000Z
How unified cybersecurity platforms add business value

Security platforms offer unparalleled visibility, strengthened defenses, improved costs, and efficiencyโ€”all leading to tangible businessย ...

2025-06-23T07:00:00.000Z
Protecting the future of AI: IBM Consulting Cybersecurity Services and Guardium AI Security

IBM Guardium and IBM Consulting Cybersecurity Services are teaming up to help businesses secure and scale their use of agentic AI and otherย ...

similarCompanies

IBM Similar Companies

TD SYNNEX

Weโ€™re TD SYNNEX (NYSE: SNX), a leading distributor and solutions aggregator for the IT ecosystem. Weโ€™re 23,000 of the IT industryโ€™s best and brightest, who share an unwavering passion for bringing compelling technology products, services and solutions to the world. Weโ€™re an innovative partner that

IAP is a top-tier Japanese IT consulting and professional services firm, headquarters in Tokyo, Japan and a well established Quality certified development center in India. IAP has a technical and academic alliance program with more than 40 companies and organizations worldwide, creating a pooled w

Serco

We bring together the right people, the right technology and the right partners to create innovative solutions that make positive impact and address some of the most urgent and complex challenges facing the modern world. With a focus on serving governments globally, Sercoโ€™s services span justice,

Mastercard

Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, weโ€™re building a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Ou

Capita

Capita is an outsourcer, helping clients across the public and private sectors run complex business processes more efficiently, creating better consumer experiences. Operating across 8 countries, Capitaโ€™s 41,000 colleagues support primarily UK and European clients with people-based services underpi

Tata Consultancy Services

Tata Consultancy Services is an IT services, consulting and business solutions organization that has been partnering with many of the worldโ€™s largest businesses in their transformation journeys for over 56 years. Our consulting-led, cognitive powered, portfolio of business, technology and engineerin

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

IBM CyberSecurity History Information

How many cyber incidents has IBM faced?

Total Incidents: According to Rankiteo, IBM has faced 3 incidents in the past.

What types of cybersecurity incidents have occurred at IBM?

Incident Types: The types of cybersecurity incidents that have occurred incidents Vulnerability.

How does IBM detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through remediation measures with Health checks of resources and contacting IBM Cloud Support and communication strategy with Messages sent to customers and apology issued by IBM Japan.

Incident Details

Can you provide details on each incident?

Incident : Outage and Vulnerability

Title: IBM Cloud Outage and Critical Vulnerability

Description: IBM experienced a cloud outage and a critical-rated vulnerability in its QRadar threat detection and response tools and Cloud Pak for Security integration suite.

Date Detected: 2023-05-21

Date Resolved: 2023-05-21

Type: Outage and Vulnerability

Vulnerability Exploited: CVE-2025-2502

Incident : Software Vulnerability

Title: IBM AIX Operating System Vulnerabilities

Description: IBM AIX operating systems experienced critical security vulnerabilities, traced as CVE-2024-56346 and CVE-2024-56347, which could potentially allow unauthorized remote attackers to execute arbitrary commands, thus compromising the system's integrity. The flaws had high CVSS scores of 10.0 and 9.6, indicating critical severity. Being operational in key sectors like finance, banking, healthcare, and telecommunications, the vulnerability threatened sensitive operations, critical applications, and data security. Unpatched, these vulnerabilities presented risks of unauthorized access, data theft, and service disruptions with the potential for cascading impacts across affected enterprises.

Type: Software Vulnerability

Attack Vector: Remote Code Execution

Vulnerability Exploited: CVE-2024-56346, CVE-2024-56347

Incident : Zero-Day Exploit

Title: IBM Data Risk Manager Zero-Day Vulnerabilities

Description: Four zero-day vulnerabilities impacted the IBM Data Risk Manager (IDRM) after the company refused to patch bugs following a private bug disclosure attempt. The compromise of the product led to a full-scale company compromise, as the tool had credentials to access other security tools.

Type: Zero-Day Exploit

Attack Vector: Unpatched Vulnerability

Vulnerability Exploited: Four zero-day vulnerabilities in IBM Data Risk Manager

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Impact of the Incidents

What was the impact of each incident?

Incident : Outage and Vulnerability IBM347060525

Systems Affected: IBM Cloud Console, Support Cases

Downtime: ['2023-05-21 09:03 AM UTC', '2023-05-21 01:20 PM UTC']

Operational Impact: Users unable to access cloud resources and support cases

Brand Reputation Impact: Apologies issued by IBM Japan

Incident : Software Vulnerability IBM545032025

Systems Affected: IBM AIX Operating Systems

Operational Impact: Unauthorized access, data theft, service disruptions

Incident : Zero-Day Exploit IBM162291222

Data Compromised: Critical vulnerability information

Systems Affected: IBM Data Risk Manager, Other security tools

Operational Impact: Full-scale company compromise

Which entities were affected by each incident?

Incident : Outage and Vulnerability IBM347060525

Entity Type: Corporation

Industry: Technology

Location: Global

Size: Large

Incident : Software Vulnerability IBM545032025

Entity Type: Corporation

Industry: ['Finance', 'Banking', 'Healthcare', 'Telecommunications']

Incident : Zero-Day Exploit IBM162291222

Entity Type: Enterprise

Industry: Technology

Response to the Incidents

What measures were taken in response to each incident?

Incident : Outage and Vulnerability IBM347060525

Remediation Measures: Health checks of resources and contacting IBM Cloud Support

Communication Strategy: Messages sent to customers and apology issued by IBM Japan

Data Breach Information

What measures does the company take to prevent data exfiltration?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Health checks of resources and contacting IBM Cloud Support.

Lessons Learned and Recommendations

What recommendations were made to prevent future incidents?

Incident : Outage and Vulnerability IBM347060525

Recommendations: Perform health checks of resources and contact IBM Cloud Support if issues persist

What recommendations has the company implemented to improve cybersecurity?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Perform health checks of resources and contact IBM Cloud Support if issues persist.

References

Where can I find more information about each incident?

Incident : Outage and Vulnerability IBM347060525

Source: IBM Security Bulletin

Where can stakeholders find additional resources on cybersecurity best practices?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: IBM Security Bulletin.

Investigation Status

How does the company communicate the status of incident investigations to stakeholders?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through was Messages sent to customers and apology issued by IBM Japan.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident?

Incident : Outage and Vulnerability IBM347060525

Customer Advisories: Perform health checks of their resources and contact IBM Cloud Support if they continue to experience failures.

What advisories does the company provide to stakeholders and customers following an incident?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Perform health checks of their resources and contact IBM Cloud Support if they continue to experience failures..

Additional Questions

Incident Details

What was the most recent incident detected?

Most Recent Incident Detected: The most recent incident detected was on 2023-05-21.

What was the most recent incident resolved?

Most Recent Incident Resolved: The most recent incident resolved was on 2023-05-21.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident was Critical vulnerability information.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident were IBM Cloud Console, Support Cases and IBM AIX Operating Systems and IBM Data Risk Manager, Other security tools.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Critical vulnerability information.

Lessons Learned and Recommendations

What was the most significant recommendation implemented to improve cybersecurity?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Perform health checks of resources and contact IBM Cloud Support if issues persist.

References

What is the most recent source of information about an incident?

Most Recent Source: The most recent source of information about an incident is IBM Security Bulletin.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued?

Most Recent Customer Advisory: The most recent customer advisory issued was was an Perform health checks of their resources and contact IBM Cloud Support if they continue to experience failures.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge