The 2022 IBM Research annual letterDeep DiveDarío Gil13 Jan 2023Accelerated DiscoveryAIHybrid CloudQuantumSecuritySemiconductors
The cryptography standards that will keep today’s data and systems quantum safeNews22 Sep 2022CryptographyQuantumQuantum-Safe Cryptography and MigrationSecurity
Why it’s time to take quantum-safe cryptography seriouslyExplainerScott Crowder, Charles Robinson, and Ray Harishankar26 Jul 2022CryptographyQuantumQuantum-Safe Cryptography and MigrationSecurity
What is confidential computing?ExplainerDaniele Buono, James Bottomley, Hubertus Franke, and Robert Senger25 Jul 2022Cloud SecurityConfidential ComputingCryptographyHybrid Cloud
IBM scientists help develop NIST’s quantum-safe standardsNewsMichael Osborne and Vadim Lyubashevsky06 Jul 2022CryptographyQuantumQuantum-Safe Cryptography and MigrationSecurity
A safer, lower-cost alternative to real data for pretraining computer vision modelsExplainerKim Martineau23 Jun 2022AIComputer VisionData and AI Security
Securing AI systems with adversarial robustnessDeep DivePin-Yu Chen15 Dec 20218 minute readAdversarial Robustness and PrivacyAIData and AI Security
New crypto techniques protect passwords from unreliable doorkeepersExplainerJulia Hesse24 Nov 20217 minute readCryptographySecurity
IBM’s new AI-infused security technologies help defenders speed response to cyber attacksReleaseIan Molloy, Marc Stoecklin, and Yaron Wolfsthal02 Nov 20218 minute readAISecurityThreat Management
New service from IBM Research and X-Force Red makes vulnerability management more efficientReleaseMuhammed Fatih Bulut, Ting Dai, and Steve Ocepek14 Oct 20215 minute readHybrid CloudSecurity
Open source workload identity management could help secure hybrid cloudsReleaseBrandon Lum and Mariusz Sabath26 Aug 20216 minute readCloud SecurityHybrid CloudHybrid Cloud PlatformSecurity
Researchers develop defenses against deep learning hack attacksReleaseAmbrish Rawat, Killian Levacher, and Mathieu Sinn05 Aug 20217 minute readAdversarial Robustness and PrivacyData and AI SecuritySecurityTrustworthy AI
IBM boosts software supply chain security with signature-based Kubernetes verificationReleaseYuji Watanabe, Jim Doran, Hirokuni Kitahara, Kugamoorthy Gajananan, Ruriko Kudo, and Malgorzata Steinder28 Jul 20216 minute readCloud SecurityHybrid CloudHybrid Cloud PlatformSecurity
(In)security of ElGamal in OpenPGPResearchLuca De Feo, Bertram Poettering, and Alessandro Sorniotti20 Jul 20215 minute readCryptographySecuritySecurity Analysis
The thrill of cyber threat hunting with Kestrel Threat Hunting LanguageReleaseXiaokui Shu, Paul Coccoli, Jiyong Jang, and Ian Molloy19 May 20217 minute readSecurityThreat Management
New open source tool automates complianceReleaseChris Butler, Frank Suits, and Lou Degenaro13 Apr 20215 minute readCloud SecurityHybrid CloudSecurity
AI goes anonymous during training to boost privacy protectionReleaseAbigail Goldsteen26 Jan 20214 minute readAdversarial Robustness and PrivacyData and AI SecurityMachine LearningSecurity