What’s Next in Security
is intrinsic protection
Cloud and AI have revolutionized the way the world computes — but they come with new security threats. We’re using AI to build intelligent threat detection, investigation, and response capabilities across enterprise, cloud, and the edge. We’re helping clients migrate to quantum-safe cryptography to protect against future threats from quantum computers. We’re enabling enterprises to deploy and run applications on encrypted data. Our pioneering technologies in confidential computing, decentralized trust and a secure supply chain will enable more secure, zero-trust infrastructures for all.
- Quantum-Safe Cryptography and Migration
- Fully Homomorphic Encryption
- Confidential Computing
- Threat Management
Our work
Your web browsing habits may be less private than you think
NewsKim MartineauHow IBM Quantum is bringing organizations along their quantum-safe technology journey
NewsRay Harishankar, John Buselli, and Jai S. ArunBuilding privacy-preserving federated learning to help fight financial crime
Technical noteNathalie Baracaldo, Hayim Shaul, Nir Drucker, Swanand Kadhe, and Heiko LudwigPrivate Certifier Intersection: Finding common certificate authorities without compromising privacy
Technical noteSikhar Patranabis, Dhinakaran Vinayagamurthy, Venkatraman Ramakrishna, Krishnasuri Narayanam, Sandip Chakraborty, and Bishakh Chandra GhoshSaška Mojsilović wants to channel AI for good. She may also make you rethink sour cabbage
NewsKim MartineauWhat is synthetic data?
ExplainerKim Martineau- See more of our work on Security
Publication collections
Tools + code
AI Privacy 360
Tools to support the assessment of privacy risks of AI-based solutions, and to help them adhere to any relevant privacy requirements. Tradeoffs between privacy, accuracy, and performance can be explored at different stages in the machine learning lifecycle.
View project →Kestrel Threat Hunting Language
Kestrel threat hunting language provides an abstraction for threat hunters to focus on the high-value and composable threat hypothesis development instead of specific realization of hypothesis testing with heterogeneous data sources, threat intelligence, and public or proprietary analytics.
View project →Virtual TPM
Libtpms-based Trusted Platform Module (TPM) emulator with socket, character device, and Linux CUSE interface.
View project →Open Quantum Safe
An open-source project to support the development and prototyping of quantum-resistant cryptography.
View project →HELayers – Community Edition
SDKs for computing on encrypted data without decrypting it, provided via Docker container. Equipped with C++ and Python API’s and includes Jupyter Notebooks and VS Code IDEs with demonstrations, tutorials and documentation for AI/ML and encrypted search applications. Support for Linux, Intel, MacOS and s390x platforms.
View project →
IBM Security Solutions
Innovations from our Security Research teams are regularly developed into cutting-edge new capabilities for IBM’s Security offerings.