Charting the course to 100,000 qubitsNewsJay Gambetta and Matthias Steffen21 May 2023Quantum CommunityQuantum HardwareQuantum Information Science
Strengthening cloud security with confidential computingTechnical noteRick Boivie04 Nov 2022Cloud SecurityConfidential ComputingSecurity
Five ways IBM is using synthetic data to improve AI modelsResearchKim Martineau02 Nov 2022AIData and AI SecurityMachine Learning
Breaking Rainbow takes a weekend on a laptopTechnical noteWard Beullens13 Oct 2022CryptographyQuantum-Safe Cryptography and MigrationSecurity
How we quantum-proofed IBM z16 Case studySilvio Dragone11 Oct 2022CryptographyQuantumQuantum-Safe Cryptography and MigrationSecurity
How IBM is helping make the world’s networks quantum safeNewsRay Harishankar29 Sep 2022CryptographyQuantumQuantum-Safe Cryptography and MigrationSecurity
The cryptography standards that will keep today’s data and systems quantum safeNews22 Sep 2022CryptographyQuantumQuantum-Safe Cryptography and MigrationSecurity
Why it’s time to take quantum-safe cryptography seriouslyExplainerScott Crowder, Charles Robinson, and Ray Harishankar26 Jul 2022CryptographyQuantumQuantum-Safe Cryptography and MigrationSecurity
What is confidential computing?ExplainerDaniele Buono, James Bottomley, Hubertus Franke, and Robert Senger25 Jul 2022Cloud SecurityConfidential ComputingCryptographyHybrid Cloud
IBM scientists help develop NIST’s quantum-safe standardsNewsMichael Osborne and Vadim Lyubashevsky06 Jul 2022CryptographyQuantumQuantum-Safe Cryptography and MigrationSecurity
A new way to generate synthetic data for pretraining computer vision modelsNewsKim Martineau23 Jun 2022AIData and AI SecurityMachine Learning
Securing AI systems with adversarial robustnessDeep DivePin-Yu Chen15 Dec 20218 minute readAdversarial Robustness and PrivacyAIData and AI Security
New crypto techniques protect passwords from unreliable doorkeepersExplainerJulia Hesse24 Nov 20217 minute readCryptographySecurity
IBM’s new AI-infused security technologies help defenders speed response to cyber attacksReleaseIan Molloy, Marc Stoecklin, and Yaron Wolfsthal02 Nov 20218 minute readAISecurityThreat Management
New service from IBM Research and X-Force Red makes vulnerability management more efficientReleaseMuhammed Fatih Bulut, Ting Dai, and Steve Ocepek14 Oct 20215 minute readHybrid CloudSecurity
Open source workload identity management could help secure hybrid cloudsReleaseBrandon Lum and Mariusz Sabath26 Aug 20216 minute readCloud SecurityHybrid CloudHybrid Cloud PlatformSecurity
Researchers develop defenses against deep learning hack attacksReleaseAmbrish Rawat, Killian Levacher, and Mathieu Sinn05 Aug 20217 minute readAdversarial Robustness and PrivacyData and AI SecurityGenerative AISecurityTrustworthy AI