
IBM Company Cyber Security Posture
ibm.comAt IBM, we do more than work. We create. We create as technologists, developers, and engineers. We create with our partners. We create with our competitors. If you're searching for ways to make the world work better through technology and infrastructure, software and consulting, then we want to work with you. We're here to help every creator turn their "what if" into what is. Let's create something that will change everything.
IBM Company Details
ibm
330724 employees
17958236.0
541
IT Services and IT Consulting
ibm.com
Scan still pending
IBM_3075085
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

IBM Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
IBM Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
IBM | Vulnerability | 60 | 3 | 04/2020 | IBM162291222 | Link | |
Rankiteo Explanation : Attack with significant impact with internal employee data leaksDescription: Four zero-day vulnerabilities impacted an IBM security product after the company refused to patch bugs following a private bug disclosure attempt. The bugs impacted the IBM Data Risk Manager (IDRM). It is an enterprise security tool that aggregates feeds from vulnerability scanning tools and other risk management tools to let admins investigate security issues. The compromise of product led to a full-scale company compromise, as the tool had credentials to access other security tools. It contained information about critical vulnerabilities that affect the company. | |||||||
IBM | Vulnerability | 100 | 5 | 3/2025 | IBM545032025 | Link | |
Rankiteo Explanation : Attack threatening the organizationโs existenceDescription: IBM AIX operating systems experienced critical security vulnerabilities, traced as CVE-2024-56346 and CVE-2024-56347, which could potentially allow unauthorized remote attackers to execute arbitrary commands, thus compromising the system's integrity. The flaws had high CVSS scores of 10.0 and 9.6, indicating critical severity. Being operational in key sectors like finance, banking, healthcare, and telecommunications, the vulnerability threatened sensitive operations, critical applications, and data security. Unpatched, these vulnerabilities presented risks of unauthorized access, data theft, and service disruptions with the potential for cascading impacts across affected enterprises. | |||||||
IBM | Vulnerability | 100 | 5 | 6/2025 | IBM347060525 | Link | |
Rankiteo Explanation : Attack threatening the organization's existenceDescription: IBM experienced a cloud outage on Wednesday that lasted over four hours, causing users to be unable to access the console for managing their cloud resources or to open and view support cases. This outage repeated a similar incident from Tuesday. Additionally, IBM identified a critical-rated vulnerability in its QRadar threat detection and response tools and Cloud Pak for Security integration suite, which left a password in a configuration file. The vulnerability was scored 9.6 on the Common Vulnerability Scoring System, and IBM's security bulletin also advised of four other QRadar flaws. |
IBM Company Subsidiaries

At IBM, we do more than work. We create. We create as technologists, developers, and engineers. We create with our partners. We create with our competitors. If you're searching for ways to make the world work better through technology and infrastructure, software and consulting, then we want to work with you. We're here to help every creator turn their "what if" into what is. Let's create something that will change everything.
Access Data Using Our API

Get company history
.png)
IBM Cyber Security News
What Is Cybersecurity?
Cybersecurity is the practice of protecting people, systems and data from cyberattacks by using various technologies, processes and policies. Atย ...
3 Top Cybersecurity Stocks to Buy in July
3 Top Cybersecurity Stocks to Buy in July ยท 1. Check Point. Check Point is a pure-play cybersecurity stock, working with more than 100,000ย ...
Neudesic's Cloud Security Renewal: A Strategic Play in the Cybersecurity Boom
Neudesic, an IBM subsidiary, has solidified its position as a leader in hybrid cloud security with its renewed Microsoft Cloud Securityย ...
Cloud Range, Cyviz join to boost cybersecurity curriculum in higher education through IBMโs Cyber Campus
The flexibility of the IBM Cyber Campus experience ensures educational institutions can integrate comprehensive cybersecurity training intoย ...
IBM Asks: How is the Cybersecurity Landscape Evolving?
Share. Share. IBM Quantum scientist Dr. Maika Takita in a lab (Credit: IBM). IBM has released its 'IBM X-Force 2025 Threat Intelligenceย ...
Cybersecurity trends: IBMโs predictions for 2025
Last year's cybersecurity predictions focused heavily on AI and its impact on how security teams will operate in the future.
IBM X-Force reports evolving threat landscape amid shifting tactics, marking rise in stealth and identity exploits
The IBM X-Force report noted that hackers openly trade exploits on the dark web to target critical infrastructure, while ransomware andย ...
How unified cybersecurity platforms add business value
Security platforms offer unparalleled visibility, strengthened defenses, improved costs, and efficiencyโall leading to tangible businessย ...
Protecting the future of AI: IBM Consulting Cybersecurity Services and Guardium AI Security
IBM Guardium and IBM Consulting Cybersecurity Services are teaming up to help businesses secure and scale their use of agentic AI and otherย ...

IBM Similar Companies

TD SYNNEX
Weโre TD SYNNEX (NYSE: SNX), a leading distributor and solutions aggregator for the IT ecosystem. Weโre 23,000 of the IT industryโs best and brightest, who share an unwavering passion for bringing compelling technology products, services and solutions to the world. Weโre an innovative partner that

IAP
IAP is a top-tier Japanese IT consulting and professional services firm, headquarters in Tokyo, Japan and a well established Quality certified development center in India. IAP has a technical and academic alliance program with more than 40 companies and organizations worldwide, creating a pooled w

Serco
We bring together the right people, the right technology and the right partners to create innovative solutions that make positive impact and address some of the most urgent and complex challenges facing the modern world. With a focus on serving governments globally, Sercoโs services span justice,

Mastercard
Mastercard powers economies and empowers people in 200+ countries and territories worldwide. Together with our customers, weโre building a sustainable economy where everyone can prosper. We support a wide range of digital payments choices, making transactions secure, simple, smart and accessible. Ou

Capita
Capita is an outsourcer, helping clients across the public and private sectors run complex business processes more efficiently, creating better consumer experiences. Operating across 8 countries, Capitaโs 41,000 colleagues support primarily UK and European clients with people-based services underpi

Tata Consultancy Services
Tata Consultancy Services is an IT services, consulting and business solutions organization that has been partnering with many of the worldโs largest businesses in their transformation journeys for over 56 years. Our consulting-led, cognitive powered, portfolio of business, technology and engineerin

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
IBM CyberSecurity History Information
How many cyber incidents has IBM faced?
Total Incidents: According to Rankiteo, IBM has faced 3 incidents in the past.
What types of cybersecurity incidents have occurred at IBM?
Incident Types: The types of cybersecurity incidents that have occurred incidents Vulnerability.
How does IBM detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through remediation measures with Health checks of resources and contacting IBM Cloud Support and communication strategy with Messages sent to customers and apology issued by IBM Japan.
Incident Details
Can you provide details on each incident?

Incident : Outage and Vulnerability
Title: IBM Cloud Outage and Critical Vulnerability
Description: IBM experienced a cloud outage and a critical-rated vulnerability in its QRadar threat detection and response tools and Cloud Pak for Security integration suite.
Date Detected: 2023-05-21
Date Resolved: 2023-05-21
Type: Outage and Vulnerability
Vulnerability Exploited: CVE-2025-2502

Incident : Software Vulnerability
Title: IBM AIX Operating System Vulnerabilities
Description: IBM AIX operating systems experienced critical security vulnerabilities, traced as CVE-2024-56346 and CVE-2024-56347, which could potentially allow unauthorized remote attackers to execute arbitrary commands, thus compromising the system's integrity. The flaws had high CVSS scores of 10.0 and 9.6, indicating critical severity. Being operational in key sectors like finance, banking, healthcare, and telecommunications, the vulnerability threatened sensitive operations, critical applications, and data security. Unpatched, these vulnerabilities presented risks of unauthorized access, data theft, and service disruptions with the potential for cascading impacts across affected enterprises.
Type: Software Vulnerability
Attack Vector: Remote Code Execution
Vulnerability Exploited: CVE-2024-56346, CVE-2024-56347

Incident : Zero-Day Exploit
Title: IBM Data Risk Manager Zero-Day Vulnerabilities
Description: Four zero-day vulnerabilities impacted the IBM Data Risk Manager (IDRM) after the company refused to patch bugs following a private bug disclosure attempt. The compromise of the product led to a full-scale company compromise, as the tool had credentials to access other security tools.
Type: Zero-Day Exploit
Attack Vector: Unpatched Vulnerability
Vulnerability Exploited: Four zero-day vulnerabilities in IBM Data Risk Manager
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.
Impact of the Incidents
What was the impact of each incident?

Incident : Outage and Vulnerability IBM347060525
Systems Affected: IBM Cloud Console, Support Cases
Downtime: ['2023-05-21 09:03 AM UTC', '2023-05-21 01:20 PM UTC']
Operational Impact: Users unable to access cloud resources and support cases
Brand Reputation Impact: Apologies issued by IBM Japan

Incident : Software Vulnerability IBM545032025
Systems Affected: IBM AIX Operating Systems
Operational Impact: Unauthorized access, data theft, service disruptions

Incident : Zero-Day Exploit IBM162291222
Data Compromised: Critical vulnerability information
Systems Affected: IBM Data Risk Manager, Other security tools
Operational Impact: Full-scale company compromise
Which entities were affected by each incident?

Incident : Outage and Vulnerability IBM347060525
Entity Type: Corporation
Industry: Technology
Location: Global
Size: Large

Incident : Software Vulnerability IBM545032025
Entity Type: Corporation
Industry: ['Finance', 'Banking', 'Healthcare', 'Telecommunications']
Response to the Incidents
What measures were taken in response to each incident?

Incident : Outage and Vulnerability IBM347060525
Remediation Measures: Health checks of resources and contacting IBM Cloud Support
Communication Strategy: Messages sent to customers and apology issued by IBM Japan
Data Breach Information
What measures does the company take to prevent data exfiltration?
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Health checks of resources and contacting IBM Cloud Support.
Lessons Learned and Recommendations
What recommendations were made to prevent future incidents?

Incident : Outage and Vulnerability IBM347060525
Recommendations: Perform health checks of resources and contact IBM Cloud Support if issues persist
What recommendations has the company implemented to improve cybersecurity?
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Perform health checks of resources and contact IBM Cloud Support if issues persist.
References
Where can I find more information about each incident?

Incident : Outage and Vulnerability IBM347060525
Source: IBM Security Bulletin
Where can stakeholders find additional resources on cybersecurity best practices?
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: IBM Security Bulletin.
Investigation Status
How does the company communicate the status of incident investigations to stakeholders?
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through was Messages sent to customers and apology issued by IBM Japan.
Stakeholder and Customer Advisories
Were there any advisories issued to stakeholders or customers for each incident?

Incident : Outage and Vulnerability IBM347060525
Customer Advisories: Perform health checks of their resources and contact IBM Cloud Support if they continue to experience failures.
What advisories does the company provide to stakeholders and customers following an incident?
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Perform health checks of their resources and contact IBM Cloud Support if they continue to experience failures..
Additional Questions
Incident Details
What was the most recent incident detected?
Most Recent Incident Detected: The most recent incident detected was on 2023-05-21.
What was the most recent incident resolved?
Most Recent Incident Resolved: The most recent incident resolved was on 2023-05-21.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident was Critical vulnerability information.
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident were IBM Cloud Console, Support Cases and IBM AIX Operating Systems and IBM Data Risk Manager, Other security tools.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Critical vulnerability information.
Lessons Learned and Recommendations
What was the most significant recommendation implemented to improve cybersecurity?
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Perform health checks of resources and contact IBM Cloud Support if issues persist.
References
What is the most recent source of information about an incident?
Most Recent Source: The most recent source of information about an incident is IBM Security Bulletin.
Stakeholder and Customer Advisories
What was the most recent customer advisory issued?
Most Recent Customer Advisory: The most recent customer advisory issued was was an Perform health checks of their resources and contact IBM Cloud Support if they continue to experience failures.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
