Platform Architecture Is Outpacing Security Architecture
Glasswing Is the Deadline.
IBM and Anthropic named each other publicly yesterday.
Project Glasswing — confirmed. IBM Concert, IBM Autonomous Security, Red Hat upstream hardening — enterprise tooling in market. Not a whitepaper. Not a pilot. Shipping.
I filed the Cat. 14 signal elevation this morning. Before you read the field note, I want to give you the read behind the read.
Here’s what thirty years on this platform tells me.
IBM i security culture was built on a true premise: the platform is genuinely hard to compromise. Object authority, adopted profiles, journal-based auditing — the architecture was designed for integrity from the ground up. That’s not mythology. It’s real.
But the threat model that culture was built against no longer exists.
AI-accelerated attack lifecycles don’t probe for known weaknesses. They enumerate everything, map everything, and identify the gap you didn’t know was there — at machine speed, before a human analyst has finished their first coffee. The reconnaissance phase alone has been compressed from weeks to hours.
IBM knows this. That’s why Concert and Autonomous Security exist. That’s why Glasswing exists.
The IBM i community is the last to price this in. Not because the platform is weak. Because the practitioners who run it — people I’ve worked alongside for decades — built their security intuitions in an era when the threat moved at human speed. That era has a firm expiration date.
The Knowledge Distance Problem doesn’t get more concrete than this.
The distance between what IBM’s security apparatus now assumes about the threat environment and what the average IBM i shop assumes is measurable. IBM is building the hardened perimeter. The question is whether you’re close enough to the coalition to benefit from what it finds — or far enough outside it to be the last to know when something breaks.
The field note covers three angles: why IBM i is inside the perimeter IBM is hardening, how the KD Problem applies here specifically, and the formal Cat. 14 signal elevation with status change.
The diagram is worth your time. Radial threat perimeter — AI attack lifecycle on the outside, IBM’s four-tool defense ring in the middle, IBM i and financial services in the protected core. Visual makes the argument faster than the words do.
Read the full field note at signal4i
If someone in your network runs IBM i and hasn’t thought about this yet — forward this issue. This is exactly the gap Signal4i exists to close.
Source is Sovereignty.
— Reggie


