Security

Privacy by Design for Financial Services Organizations in the GDPR Era

IBM Research understands data privacy for a modern business and has developed state-of-the-art solutions for protecting data in the GDPR era.

Continue reading

Threat Intelligence Computing for Efficient Cyber Threat Hunting

Threat discovery in cybersecurity is like scientific discovery: both start from observations, such as an anomalous cyber activity or an interesting fact; both require hypothesis conception, such as what malicious intent is behind the activity or what causes the fact; both develop hypotheses regarding additional observations and finally validate them. Our team at the IBM […]

Continue reading

The Adversarial Robustness Toolbox v0.3.0: Closing the Backdoor in AI Security

Yesterday we announced a new release of the Adversarial Robustness Toolbox, an open-source software library to support researchers and developers in defending neural networks against adversarial attacks. The new release provides a method for defending against poisoning and “backdoor” attacks in machine learning models. We announced the release at Black Hat USA, the world’s leading […]

Continue reading

Protecting the Intellectual Property of AI with Watermarking

If we can protect videos, audio and photos with digital watermarking, why not AI models? This is the question my colleagues and I asked ourselves as we looked to develop a technique to assure developers that their hard work in building AI, such as deep learning models, can be protected. You may be thinking, “Protected […]

Continue reading

The Adversarial Robustness Toolbox: Securing AI Against Adversarial Threats

Recent years have seen tremendous advances in the development of artificial intelligence (AI). Modern AI systems achieve human-level performance on cognitive tasks such as recognizing objects in images, annotating videos, converting speech to text, or translating between different languages. Many of these breakthrough results are based on Deep Neural Networks (DNNs). DNNs are complex machine […]

Continue reading

Elegant, Disgusting Cryptography

“The prettiest thing I had ever seen” is not how IBM researcher Shai Halevi describes the beaches in Israel where he grew up. Or the sunset after a long day of hiking in Mitzpe Ramon desert. Rather, he saves these words to describe the first time he saw a cryptographic equation as an undergrad student. […]

Continue reading

Changing the Way the World Works: IBM Research’s “5 in 5”

Each year, we showcase some of the biggest breakthroughs coming out of IBM Research’s global labs – five technologies that we believe will fundamentally reshape business and society in the next five years.

Continue reading

IBM Research at Think 2018

Quantum computing, future of AI and celebrity guest speakers make up the IBM Research lineup for Think 2018, IBM’s upcoming megaconference in Las Vegas. IBM Research will be the feature of over 45 sessions at Think 2018, taking place in Las Vegas, Nevada, March 19-22. IBM’s biggest industry and innovation event of the year will […]

Continue reading

IBM Fellow Awarded Levchin Prize for Contributions to Cryptography

We can all thank an elementary school teacher for keeping our electronic data safe and secure. Growing up in Argentina, and studying in Israel, not far from where his career started at IBM’s Haifa Lab, IBM Fellow and cryptographer, Hugo M. Krawczyk cites his third-grade teacher as one of his first influences. “She piqued my […]

Continue reading

Millennial IBM scientists revolutionize cyber security operations from idea to product

Every year, CareerCast publishes a widely-reported list of the top 10 most stressful jobs. The 2017 list includes some obvious careers including military service, firefighter, and police officer, who risk their lives every day. The list also includes several less life-threatening jobs including TV news broadcaster and taxi driver. But what if you had the […]

Continue reading

Security intelligence

Special Issue of the IBM Journal of Research and Development Cybersecurity is among the most important and pressing challenges of our times. The inadequacy of perimeter-based security controls in protecting enterprises is demonstrated in the increase in the scale, scope, and frequency of cyber-attacks confronting enterprises today. As noted by guest editor and IBM Fellow […]

Continue reading

Career spotlight: Meet Cindy Eisner, cyber-detective

Since she was a child, Cindy Eisner, a senior technical staff member at IBM Research – Haifa, has loved watching whodunit detective shows on TV and reading suspense thrillers. Today, as an expert in malware evasion techniques, she tries to figure out how the bad guys are avoiding detection as they try to hack our […]

Continue reading