Security
Cyber threats have grown exponentially as the modern web and powerful AI systems have proliferated. We’re designing systems to secure the hybrid cloud and AI for sensitive datasets to ensure organizations can continue to operate safely and securely.
Overview
Cloud computing and AI have dramatically transformed global computational capabilities, yet they also introduce novel security risks. It’s why we're developing AI-powered tools for threat detection, investigation, and response that operate seamlessly across enterprise systems, cloud environments, and the edge.
Recognizing the looming challenges quantum computing poses, we're helping enterprises proactively deploy new quantum-safe encryption schemes.
Our pioneering technologies in confidential computing, decentralized trust, and a secure supply chain will enable more secure, zero-trust infrastructures for all.
Our work
- NewsPeter Hess
Transitioning to quantum-safe communication: Adding Q-safe preference to OpenSSL TLSv1.3
Technical noteMartin Schmatz and David KelseyIBM’s quantum-safe signature schemes advance in NIST’s PQC process
Technical noteWard Beullens and Luca De FeoSurfing, customizing AI models, and really big microscopes
NewsMike MurphyManaging cryptography with CBOMkit
Technical noteNicklas Körtge, Gero Dittmann, and Silvio DragoneIBM and UC Berkeley paper shows how to enable the seamless deployment of multi-party cryptographic systems
Technical notePravein Govindan Kannan, Darya Kaviani, Sijun Tan, and Raluca Ada Popa- See more of our work on Security
Topics
Cloud Security: Infrastructure and Applications
Advancing the system integrity of cloud systems in mission-critical situations.Confidential Computing
The cloud computing revolution has brought new security challenges. Confidential computing aims to protect applications and their data when running in the cloud. It works by consistently keeping the application and data encrypted, and only decrypting it inside the processor using keys known to the application/data owner and the processor.Cryptography
Building the next generation of private, authenticated, and confidential communication cyrtopgraphy tools.Data and AI Security
Designing systems to monitor and protect sensitive data for robust and secure AI systems on the hybrid cloud.Quantum-Safe Cryptography and Migration
Designing cryptographic algorithms that are quantum-safe to ensure the world’s digital infrastructure is secure.Threat Management
Building the next wave of tools to help security teams detect and deflect against advanced cybersecurity threats.
Publications
An Online, Probabilistic Distributed Tracing System
- Mert Toslali
- Syed Qasim
- et al.
- 2024
- IC2E 2024
Workshop on Collaborative and Federated Agentic Workflows (CFAgentic @ ICML'25)
- Alexander Erben
- Gauri Joshi
- et al.
- 2025
- ICML 2025
Trust but Verify: Uncovering the Hidden Risks of Inaccurate SBOMs with JBomAudit
- Yue Xiao
- Jiyong Jang
- et al.
- 2025
- OSSNA 2025
A Secure Tekton Task by using Confidential Containers
- 2025
- cdCon 2025
PRISM: Simple And Compact Identification and Signatures From Large Prime Degree Isogenies
- Andrea Basso
- Giacomo Borin
- et al.
- 2025
- PKC 2025
Key Derivation Functions Without a Grain of Salt
- Matilda Backendal
- Sebastian Clermont
- et al.
- 2025
- Eurocrypt 2025
IBM Security Solutions
Innovations from our Security Research teams are regularly developed into cutting-edge new capabilities for IBM’s Security offerings.