Security
Cyber threats have grown exponentially as the modern web and powerful AI systems have proliferated. We’re designing systems to secure the hybrid cloud and AI for sensitive datasets to ensure organizations can continue to operate safely and securely.
Overview
Cloud computing and AI have dramatically transformed global computational capabilities, yet they also introduce novel security risks. It’s why we're developing AI-powered tools for threat detection, investigation, and response that operate seamlessly across enterprise systems, cloud environments, and the edge.
Recognizing the looming challenges quantum computing poses, we're helping enterprises proactively deploy new quantum-safe encryption schemes.
Our pioneering technologies in confidential computing, decentralized trust, and a secure supply chain will enable more secure, zero-trust infrastructures for all.
Recognizing the looming challenges quantum computing poses, we're helping enterprises proactively deploy new quantum-safe encryption schemes.
Our pioneering technologies in confidential computing, decentralized trust, and a secure supply chain will enable more secure, zero-trust infrastructures for all.
Our work
IBM’s quantum-safe signature schemes advance in NIST’s PQC process
Technical noteWard Beullens and Luca De FeoSurfing, customizing AI models, and really big microscopes
NewsMike MurphyManaging cryptography with CBOMkit
Technical noteNicklas Körtge, Gero Dittmann, and Silvio DragoneIBM and UC Berkeley paper shows how to enable the seamless deployment of multi-party cryptographic systems
Technical notePravein Govindan Kannan, Darya Kaviani, Sijun Tan, and Raluca Ada PopaBringing quantum-safe security to IBM Quantum Platform, and the world
NewsChristopher Codella, Michael Maximilien, Paula Austel, Paul Schweigert, Mariam John, Navaneeth Rameshan, Martin Schmatz, Joachim Schäfer, and Robert DavisNIST’s post-quantum cryptography standards are here
NewsMichael Osborne, Katia Moskvitch, and Jennifer Janechek- See more of our work on Security
Topics
- Cloud Security: Infrastructure and ApplicationsAdvancing the system integrity of cloud systems in mission-critical situations.
- Confidential ComputingThe cloud computing revolution has brought new security challenges. Confidential computing aims to protect applications and their data when running in the cloud. It works by consistently keeping the application and data encrypted, and only decrypting it inside the processor using keys known to the application/data owner and the processor.
- CryptographyBuilding the next generation of private, authenticated, and confidential communication cyrtopgraphy tools.
- Data and AI SecurityDesigning systems to monitor and protect sensitive data for robust and secure AI systems on the hybrid cloud.
- Quantum-Safe Cryptography and MigrationDesigning cryptographic algorithms that are quantum-safe to ensure the world’s digital infrastructure is secure.
- Threat ManagementBuilding the next wave of tools to help security teams detect and deflect against advanced cybersecurity threats.
Publications
An Online, Probabilistic Distributed Tracing System
- Mert Toslali
- Syed Qasim
- et al.
- 2024
- IC2E 2024
Key Derivation Functions Without a Grain of Salt
- Matilda Backendal
- Sebastian Clermont
- et al.
- 2025
- Eurocrypt 2025
POKE: A Compact and Efficient PKE from Higher-dimensional Isogenies
- Andrea Basso
- Luciano Maino
- 2025
- Eurocrypt 2025
The 2Hash OPRF Framework and Efficient Post-Quantum Instantiations
- Ward Beullens
- Lucas Dodgson
- et al.
- 2025
- Eurocrypt 2025
PAKE Combiners and Efficient Post-Quantum Instantiations
- Julia Hesse
- Michael Rosenberg
- 2025
- Eurocrypt 2025
Improved Cryptanalysis of SNOVA
- Ward Beullens
- 2025
- Eurocrypt 2025
IBM Security Solutions
Innovations from our Security Research teams are regularly developed into cutting-edge new capabilities for IBM’s Security offerings.
Learn more