Security intelligence

Special Issue of the IBM Journal of Research and Development Cybersecurity is among the most important and pressing challenges of our times. The inadequacy of perimeter-based security controls in protecting...

Continue reading

August 4, 2016

Career spotlight: Meet Cindy Eisner, cyber-detective

Since she was a child, Cindy Eisner, a senior technical staff member at IBM Research – Haifa, has loved watching whodunit detective shows on TV and reading suspense thrillers. Today,...

Continue reading

June 6, 2016

It’s always harder to hack a moving target

When it comes to hacking, there are always new techniques being used by both us good guys who work in security, and the bad guys who are trying to exploit...

Continue reading

April 13, 2016

Delivering financial services via blockchain

Have you recently bought a house, or sold shares in a company, or maybe sent money overseas? If so, I suspect that the experience has left you wondering why these...

Continue reading

March 16, 2016

Data Privacy Day Webinar: Protecting personal information can be easy

Your personal identity data was worth several hundred dollars on the black market 10 years ago. Today, it’s worth pocket change. Why? Because it’s easier to steal this information than...

Continue reading

January 26, 2016

IBM’s privacy-friendly Identity Mixer meets the Internet of Things

Prof. Gomez Skarmeta When IBM scientist Dr. Jan Camenisch co-invented Identity Mixer, a cryptographic algorithm to protect personal data, his goal was to help people take back control of their...

Continue reading

January 21, 2016

Would you know if your car was being hacked?

  Yair Allouche, IBM cybersecurity researcher Editor’s note: This article is by Yair Allouche, researcher at IBM’s Cybersecurity Center of Excellence in Beer Sheva, Israel. When my sister reluctantly upgraded...

Continue reading

November 24, 2015

Unusual patterns hold clues in cyber security

When traditional security solutions use signature-based detection (knowing what unwanted events to look for, i.e., a strict pattern), Marc’s team looks into how machine learning, data mining, and statistical modeling...

Continue reading

February 12, 2015