IBM, Canada, and Quebec are partnering to secure the future of chipmaking in North AmericaNewsMike Murphy26 Apr 2024AI HardwareSemiconductors
IBM’s Cryptography Bill of Materials to speed up quantum-safe assessmentNewsAlessandro Curioni and Michael Osborne08 Dec 2022CryptographyQuantum SafeSecurity
Extending server integrity across space and time with Durable AttestationTechnical noteDaniele Buono, Marcio Augusto de Lima e Silva, Maurizio Drocco, Gheorghe Almasi, and James Bottomley14 Nov 2022Cloud Security
Improving endpoint security on Linux with IBM ReaQta-SysFlowTechnical noteFrederico Araujo and Teryl Taylor08 Nov 2022Security
Strengthening cloud security with confidential computingTechnical noteRick Boivie04 Nov 2022Cloud SecurityConfidential ComputingSecurity
Five ways IBM is using synthetic data to improve AI modelsResearchKim Martineau02 Nov 2022AIData and AI SecurityMachine Learning
Breaking Rainbow takes a weekend on a laptopTechnical noteWard Beullens13 Oct 2022CryptographyQuantum SafeSecurity
How we quantum-proofed IBM z16 Case studySilvio Dragone11 Oct 2022CryptographyQuantumQuantum SafeSecurity
How IBM is helping make the world’s networks quantum safeNewsRay Harishankar29 Sep 2022CryptographyQuantum SafeSecurity
The cryptography standards that will keep today’s data and systems quantum safeNews22 Sep 2022CryptographyQuantumQuantum SafeSecurity
Why it’s time to take quantum-safe cryptography seriouslyExplainerScott Crowder, Charles Robinson, and Ray Harishankar26 Jul 2022CryptographyQuantumQuantum SafeSecurity
What is confidential computing?ExplainerDaniele Buono, James Bottomley, Hubertus Franke, and Robert Senger25 Jul 2022Cloud SecurityConfidential ComputingCryptographyHybrid Cloud
IBM scientists help develop NIST’s quantum-safe standardsNewsMichael Osborne and Vadim Lyubashevsky06 Jul 2022CryptographyQuantumQuantum SafeSecurity
A new way to generate synthetic data for pretraining computer vision modelsNewsKim Martineau23 Jun 2022AIData and AI SecurityMachine Learning
Securing AI systems with adversarial robustnessDeep DivePin-Yu Chen15 Dec 20218 minute readAdversarial Robustness and PrivacyAIData and AI Security
New crypto techniques protect passwords from unreliable doorkeepersExplainerJulia Hesse24 Nov 20217 minute readCryptographySecurity
IBM’s new AI-infused security technologies help defenders speed response to cyber attacksReleaseMarc Stoecklin, Ian Molloy, and Yaron Wolfsthal02 Nov 20218 minute readAISecurityThreat Management