{"id":2959,"date":"2025-04-28T21:42:53","date_gmt":"2025-04-28T21:42:53","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=2959"},"modified":"2025-04-28T21:42:53","modified_gmt":"2025-04-28T21:42:53","slug":"ibm-aims-for-autonomous-security-operations","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=2959","title":{"rendered":"IBM aims for autonomous security operations"},"content":{"rendered":"<div>\n<div class=\"grid grid--cols-10@md grid--cols-8@lg article-column\">\n<div class=\"col-12 col-10@md col-6@lg col-start-3@lg\">\n<div class=\"article-column__content\">\n<div class=\"container\"><\/div>\n<p>IBM has added new agentic and automation capabilities to its managed detection and response (MDR) services to help customers more quickly and efficiently secure enterprise resources.<\/p>\n<p>Specifically, Big Blue is launching an agentic AI system called Autonomous Threat Operations Machine (ATOM), which is designed to provide automated threat triage, investigation, and remediation and reduce the need for human intervention when responding to threats.<\/p>\n<p><a href=\"https:\/\/www.networkworld.com\/article\/3972719\/ibm-aims-for-autonomous-security-operations.html\">Continue reading on Network World.<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>IBM has added new agentic and automation capabilities to its managed detection and response (MDR) services to help customers more quickly and efficiently secure enterprise resources. Specifically, Big Blue is launching an agentic AI system called Autonomous Threat Operations Machine (ATOM), which is designed to provide automated threat triage, investigation, and remediation and reduce the [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":2960,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-2959","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2959"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2959"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/2959\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/media\/2960"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}