Security
Cyber threats have grown exponentially as the modern web and powerful AI systems have proliferated. We’re designing systems to secure the hybrid cloud and AI for sensitive datasets to ensure organizations can continue to operate safely and securely.
Overview
Cloud computing and AI have dramatically transformed global computational capabilities, yet they also introduce novel security risks. It’s why we're developing AI-powered tools for threat detection, investigation, and response that operate seamlessly across enterprise systems, cloud environments, and the edge.
Recognizing the looming challenges quantum computing poses, we're helping enterprises proactively deploy new quantum-safe encryption schemes.
Our pioneering technologies in confidential computing, decentralized trust, and a secure supply chain will enable more secure, zero-trust infrastructures for all.
Recognizing the looming challenges quantum computing poses, we're helping enterprises proactively deploy new quantum-safe encryption schemes.
Our pioneering technologies in confidential computing, decentralized trust, and a secure supply chain will enable more secure, zero-trust infrastructures for all.
Our work
Surfing, customizing AI models, and really big microscopes
NewsMike MurphyManaging cryptography with CBOMkit
Technical noteNicklas Körtge, Gero Dittmann, and Silvio DragoneIBM and UC Berkeley paper shows how to enable the seamless deployment of multi-party cryptographic systems
Technical notePravein Govindan Kannan, Darya Kaviani, Sijun Tan, and Raluca Ada PopaBringing quantum-safe security to IBM Quantum Platform, and the world
NewsChristopher Codella, Michael Maximilien, Paula Austel, Paul Schweigert, Mariam John, Navaneeth Rameshan, Martin Schmatz, Joachim Schäfer, and Robert DavisNIST’s post-quantum cryptography standards are here
NewsMichael Osborne, Katia Moskvitch, and Jennifer JanechekProtecting user data with fully homomorphic encryption and confidential computing
Technical noteOmri Soceanu and Zhongshu Gu- See more of our work on Security
Topics
- Cloud Security: Infrastructure and ApplicationsAdvancing the system integrity of cloud systems in mission-critical situations.
- Confidential ComputingThe cloud computing revolution has brought new security challenges. Confidential computing aims to protect applications and their data when running in the cloud. It works by consistently keeping the application and data encrypted, and only decrypting it inside the processor using keys known to the application/data owner and the processor.
- CryptographyBuilding the next generation of private, authenticated, and confidential communication cyrtopgraphy tools.
- Data and AI SecurityDesigning systems to monitor and protect sensitive data for robust and secure AI systems on the hybrid cloud.
- Quantum-Safe Cryptography and MigrationDesigning cryptographic algorithms that are quantum-safe to ensure the world’s digital infrastructure is secure.
- Threat ManagementBuilding the next wave of tools to help security teams detect and deflect against advanced cybersecurity threats.
Publications
- Mert Toslali
- Syed Qasim
- et al.
- 2024
- IC2E 2024
- Achilleas Tzenetopoulos
- Michele Gazzetti
- et al.
- 2024
- IC2E 2024
- Nir Drucker
- Shai Gueron
- 2024
- CSCML 2024
- Bertram Poettering
- Simon Rastikian
- 2024
- AsiaCrypt 2024
- 2024
- AGU 2024
- Andrea Basso
- Pierrick Dartois
- et al.
- 2024
- AsiaCrypt 2024
IBM Security Solutions
Innovations from our Security Research teams are regularly developed into cutting-edge new capabilities for IBM’s Security offerings.
Learn more
Projects
Synderella
A synthetic data generation service that enables secure and responsible analysis of privacy-sensitive data