Threat Intelligence Computing for Efficient Cyber Threat Hunting


IBM researchers recently developed a cyber reasoning paradigm named Threat Intelligence Computing to facilitate cyber threat discovery.

Continue reading

Security

October 16, 2018

The Adversarial Robustness Toolbox v0.3.0: Closing the Backdoor in AI...


A new release of the Adversarial Robustness Toolbox provides a method for defending against poisoning and "backdoor" attacks in machine learning models.

Continue reading

AI

August 10, 2018

Protecting the Intellectual Property of AI with Watermarking


Can we develop a watermarking technique to assure developers that their hard work in building AI, such as deep learning models, can be protected?

Continue reading

Security

July 20, 2018

The Adversarial Robustness Toolbox: Securing AI Against Adversarial Threats


IBM Research released the Adversarial Robustness Toolbox, an open-source software library to make AI systems more secure.

Continue reading

Security

April 17, 2018

Elegant, Disgusting Cryptography


Files are often encrypted in transit and at rest, but decrypted while in use. This regimen provides hackers repeated opportunities to steal unencrypted files. But FHE plugs those holes by...

Continue reading

Cryptography

March 21, 2018

Changing the Way the World Works: IBM Research’s “5 in...


Our mission at IBM is to help our clients change the way the world works. There’s no better example of that than IBM Research’s annual “5 in 5” technology predictions.

Continue reading

IBM 5 in 5

March 19, 2018

IBM Research at Think 2018


Quantum computing, future of AI and celebrity guest speakers make up the IBM Research lineup for Think 2018, IBM's upcoming megaconference in Las Vegas. IBM Research will be the feature...

Continue reading

Quantum Computing

March 12, 2018

IBM Fellow Awarded Levchin Prize for Contributions to Cryptography


IBM Fellow Hugo Krawczyk is awarded the Levchin Prize for Contributions to Cryptography and is recognized for developing fundamental and lasting contributions to the theoretical and practical foundations of cryptography...

Continue reading

Cryptography

January 10, 2018

Millennial IBM scientists revolutionize cyber security operations from idea to...


As part of our agile design processes, we spent several weeks interviewing and sitting side-by-side with analysts at the IBM Managed Security Services (MSS) SOCs around the world, including Costa...

Continue reading

Security

May 2, 2017

Security intelligence


Special Issue of the IBM Journal of Research and Development Cybersecurity is among the most important and pressing challenges of our times. The inadequacy of perimeter-based security controls in protecting...

Continue reading

August 4, 2016

Career spotlight: Meet Cindy Eisner, cyber-detective


Since she was a child, Cindy Eisner, a senior technical staff member at IBM Research – Haifa, has loved watching whodunit detective shows on TV and reading suspense thrillers. Today,...

Continue reading

June 6, 2016