Can a personalized AI be more useful?NewsKim Martineau18 Dec 2024AIGenerative AINatural Language Processing
The cryptography standards that will keep today’s data and systems quantum safeNews22 Sep 2022CryptographyQuantumQuantum SafeSecurity
Why it’s time to take quantum-safe cryptography seriouslyExplainerScott Crowder, Charles Robinson, and Ray Harishankar26 Jul 2022CryptographyQuantumQuantum SafeSecurity
What is confidential computing?ExplainerDaniele Buono, James Bottomley, Hubertus Franke, and Robert Senger25 Jul 2022Cloud SecurityConfidential ComputingCryptographyHybrid Cloud
IBM scientists help develop NIST’s quantum-safe standardsNewsMichael Osborne and Vadim Lyubashevsky06 Jul 2022CryptographyQuantumQuantum SafeSecurity
A new way to generate synthetic data for pretraining computer vision modelsNewsKim Martineau23 Jun 2022AIData and AI SecurityMachine Learning
Securing AI systems with adversarial robustnessDeep DivePin-Yu Chen15 Dec 20218 minute readAdversarial Robustness and PrivacyAIData and AI Security
New crypto techniques protect passwords from unreliable doorkeepersExplainerJulia Hesse24 Nov 20217 minute readCryptographySecurity
IBM’s new AI-infused security technologies help defenders speed response to cyber attacksReleaseMarc Stoecklin, Ian Molloy, and Yaron Wolfsthal02 Nov 20218 minute readAISecurityThreat Management
New service from IBM Research and X-Force Red makes vulnerability management more efficientReleaseMuhammed Fatih Bulut, Ting Dai, and Steve Ocepek14 Oct 20215 minute readHybrid CloudSecurity
Open source workload identity management could help secure hybrid cloudsReleaseBrandon Lum and Mariusz Sabath26 Aug 20216 minute readCloud SecurityHybrid CloudHybrid Cloud PlatformSecurity
Researchers develop defenses against deep learning hack attacksReleaseAmbrish Rawat, Killian Levacher, and Mathieu Sinn05 Aug 20217 minute readAdversarial Robustness and PrivacyData and AI SecurityGenerative AISecurityTrustworthy AI
IBM boosts software supply chain security with signature-based Kubernetes verificationReleaseYuji Watanabe, Jim Doran, Hirokuni Kitahara, Kugamoorthy Gajananan, Ruriko Kudo, and Malgorzata Steinder28 Jul 20216 minute readCloud SecurityHybrid CloudHybrid Cloud PlatformSecurity
(In)security of ElGamal in OpenPGPResearchLuca De Feo, Bertram Poettering, and Alessandro Sorniotti20 Jul 20215 minute readCryptographySecuritySecurity Analysis
The thrill of cyber threat hunting with Kestrel Threat Hunting LanguageReleaseXiaokui Shu, Paul Coccoli, Jiyong Jang, and Ian Molloy19 May 20217 minute readSecurityThreat Management
New open source tool automates complianceReleaseChris Butler, Frank Suits, and Lou Degenaro13 Apr 20215 minute readCloud SecurityHybrid CloudSecurity
AI goes anonymous during training to boost privacy protectionReleaseAbigail Goldsteen26 Jan 20214 minute readAdversarial Robustness and PrivacyData and AI SecurityMachine LearningSecurity