cybersecurity

IBM Releases Fully Homomorphic Encryption Toolkit for MacOS and iOS; Linux and Android Coming Soon

Often, when I begin explaining fully homomorphic encryption (FHE) to someone for the first time I start by saying that I’ve been working in the field for nearly a decade and yet, I still have to pause to spell it right. So, let’s call it FHE. Half-kidding aside, FHE really sounds like magic when you […]

Continue reading

Unleashing Cyber Reasoning Potential in The Era of AI Security

IBM Research was selected to participate in DARPA's program to investigate Transparent Computing.

Continue reading

Meet the women in IBM Research securing your digital future

This is our fifth and final blog post in a series for Women’s History Month 2020 focused on women innovating the future of IBM Research. The tremendous power of digital technology also introduces risk. If it’s hacked, or falls into the wrong hands, it can be used against us. That’s why security research is indispensable. The four women we meet here represent every aspect of it, from blockchain and open source defense to erecting cloud-based fortifications around digital crown jewels.

Continue reading

Speculator : A Microscope for Spectre-like Attacks

Ever since the discovery of Spectre and Meltdown at the beginning of 2018, my team at IBM Research – Zurich and I have been focusing very closely on the study of transient execution attacks. Beginning that journey, we quickly realized that in order to study transient execution attacks, we first needed to observe and understand […]

Continue reading

Sensemaker Series: IBM Researchers on Future Tech for Financial Services

The financial services industry faces mounting pressures to reduce costs, improve customer experience, compete with emerging players, and comply with new regulations. At the same time, IBM Research is driving innovations that will transform the financial services industries using technologies like AI, blockchain, quantum computing, IoT, cybersecurity, and cloud. These advances are surfacing new capabilities […]

Continue reading

Threat Intelligence Computing for Efficient Cyber Threat Hunting

Threat discovery in cybersecurity is like scientific discovery: both start from observations, such as an anomalous cyber activity or an interesting fact; both require hypothesis conception, such as what malicious intent is behind the activity or what causes the fact; both develop hypotheses regarding additional observations and finally validate them. Our team at the IBM […]

Continue reading

Protecting the Intellectual Property of AI with Watermarking

If we can protect videos, audio and photos with digital watermarking, why not AI models? This is the question my colleagues and I asked ourselves as we looked to develop a technique to assure developers that their hard work in building AI, such as deep learning models, can be protected. You may be thinking, “Protected […]

Continue reading