Your team has spent months developing, tuning and perfecting a complex deep neural network to classify important financial, medical or government data. The application has been containerized, packaged, and is finally ready to deploy as a public service on the cloud, but one thing stands in the way. How do you get assurance that your […]
This is our fifth and final blog post in a series for Women’s History Month 2020 focused on women innovating the future of IBM Research. The tremendous power of digital technology also introduces risk. If it’s hacked, or falls into the wrong hands, it can be used against us. That’s why security research is indispensable. The four women we meet here represent every aspect of it, from blockchain and open source defense to erecting cloud-based fortifications around digital crown jewels.
The promise of the Internet of Things: This integration should ideally map to a decentralized hardware and software platform.
A new release of the Adversarial Robustness Toolbox provides a method for defending against poisoning and "backdoor" attacks in machine learning models.
Recent years have seen tremendous advances in the development of artificial intelligence (AI). Modern AI systems achieve human-level performance on cognitive tasks such as recognizing objects in images, annotating videos, converting speech to text, or translating between different languages. Many of these breakthrough results are based on Deep Neural Networks (DNNs). DNNs are complex machine […]
“The prettiest thing I had ever seen” is not how IBM researcher Shai Halevi describes the beaches in Israel where he grew up. Or the sunset after a long day of hiking in Mitzpe Ramon desert. Rather, he saves these words to describe the first time he saw a cryptographic equation as an undergrad student. […]
“I’m not a philosopher. I’m a physicist and a technician…you have ideas or you see needs and you think about them. Mostly I’ve done that.” That’s how IBM Fellow Emeritus and former IBM Researcher Richard L. “Dick” Garwin humbly sums up his career as one of the most influential scientists and researchers of his time, […]
Special Issue of the IBM Journal of Research and Development Cybersecurity is among the most important and pressing challenges of our times. The inadequacy of perimeter-based security controls in protecting enterprises is demonstrated in the increase in the scale, scope, and frequency of cyber-attacks confronting enterprises today. As noted by guest editor and IBM Fellow […]
Since she was a child, Cindy Eisner, a senior technical staff member at IBM Research – Haifa, has loved watching whodunit detective shows on TV and reading suspense thrillers. Today, as an expert in malware evasion techniques, she tries to figure out how the bad guys are avoiding detection as they try to hack our […]
This blog post was authored by Ayman Jarrous and Fady Copty, research staff members at IBM Research – Haifa. When it comes to hacking, there are always new techniques being used by both us good guys who work in security, and the bad guys who are trying to exploit system vulnerabilities. Today’s tools are getting […]
Have you recently bought a house, or sold shares in a company, or maybe sent money overseas? If so, I suspect that the experience has left you wondering why these simple transactions take so much time and cost so much money. In each case, what looks like a simple financial transaction takes place over many […]
Today on Data Privacy Day, IBM is announcing an innovative cloud-based technology for developers to help consumers better protect their personal data online such as their date of birth, home address and credit card numbers. As cybersecurity threats and identity theft continue to threaten both consumers and businesses, IBM scientists have been developing a clever […]