Learning Library

← Back to Library

IBM Cyber Exposure, Quantum Crypto, Watson X

Key Points

  • IBM X‑Force’s new **Cyber Exposure Insights** service monitors the surface, deep, and dark web to detect stolen credentials, brand impersonation, risky domains, and shadow data, giving enterprises an early‑warning, proactive defense tool.
  • The **U.S. NIST** has published three final **post‑quantum cryptography (PQC) standards**—ML‑KEM for key encapsulation, ML‑DSA for digital signatures, and SLH‑DSA (stateless hash‑based signatures)—marking a global shift toward quantum‑resistant security.
  • IBM researchers in Zurich helped develop the first two PQC algorithms, and an IBM‑affiliated scientist co‑created the third, underscoring IBM’s role in shaping the forthcoming quantum‑safe cryptographic ecosystem.
  • NIST’s release provides organizations with concrete guidance and confidence to begin migrating legacy cryptographic systems to quantum‑safe solutions before quantum computers become a practical threat.
  • IBM Watson X **Code Assistant for Z** is introduced as a developer‑focused AI tool to help programmers, architects, and system designers work more efficiently with the Z programming environment.

Full Transcript

# IBM Cyber Exposure, Quantum Crypto, Watson X **Source:** [https://www.youtube.com/watch?v=Lp8Ta02wDhE](https://www.youtube.com/watch?v=Lp8Ta02wDhE) **Duration:** 00:04:19 ## Summary - IBM X‑Force’s new **Cyber Exposure Insights** service monitors the surface, deep, and dark web to detect stolen credentials, brand impersonation, risky domains, and shadow data, giving enterprises an early‑warning, proactive defense tool. - The **U.S. NIST** has published three final **post‑quantum cryptography (PQC) standards**—ML‑KEM for key encapsulation, ML‑DSA for digital signatures, and SLH‑DSA (stateless hash‑based signatures)—marking a global shift toward quantum‑resistant security. - IBM researchers in Zurich helped develop the first two PQC algorithms, and an IBM‑affiliated scientist co‑created the third, underscoring IBM’s role in shaping the forthcoming quantum‑safe cryptographic ecosystem. - NIST’s release provides organizations with concrete guidance and confidence to begin migrating legacy cryptographic systems to quantum‑safe solutions before quantum computers become a practical threat. - IBM Watson X **Code Assistant for Z** is introduced as a developer‑focused AI tool to help programmers, architects, and system designers work more efficiently with the Z programming environment. ## Sections - [00:00:00](https://www.youtube.com/watch?v=Lp8Ta02wDhE&t=0s) **IBM Launches Cyber Exposure Insights** - IBM xForce’s new Cyber Exposure Insights service monitors the surface, deep, and dark web for brand impersonation, stolen credentials, and data leaks, offering early warnings that enable enterprises to shift from reactive to proactive cyber defense amid rising credential‑based attacks. ## Full Transcript
0:00cyber exposure insights nist postquantum 0:03cryptography standards and Watson X code 0:06assistant for Z 2.1 all on this episode 0:09of IBM Tech 0:13now cyber security is becoming more and 0:16more challenging for Enterprises with a 0:1871% year-over-year increase in cyber 0:21attacks that use stolen or compromised 0:23credentials and one in three data 0:25breaches involving Shadow data the 0:27proliferation of data is making it 0:29harder to trade track and Safeguard 0:31that's why IBM xforce launched cyber 0:33exposure insights as part of its threat 0:35intelligence services this new service 0:38allows you to understand your cyber 0:40exposure to strengthen defenses before 0:43an attack occurs with cyber exposure 0:45insights you can monitor the surface 0:47deep and dark web to detect potential 0:50safety risks and identify atrisk 0:52credentials before criminals do identify 0:55instances of brand impersonation and 0:57monitor social media for signs of 0:59forthcoming attacks 1:00monitor suspicious domains to identify 1:03ones associated with malicious 1:04activities such as fishing attacks or 1:06driveby downloads and Implement 1:08takedowns to minimize Digital Risk 1:11essentially cyber exposure insights 1:13provides comprehensive monitoring of 1:16brand impersonation stolen credentials 1:18data exposure and dark web threats 1:20across the entire web it's an early 1:23warning system that can help you move 1:24from reactive to proactive empowering 1:27you to take preventative actions before 1:29or a potential breach reeks Havoc to 1:32learn more check out the link in the 1:34description of this 1:35video next up the US National Institute 1:39of Standards and technology or nist has 1:41released federal information processing 1:43standards Publications for three Quantum 1:46resistant cryptographic algorithms this 1:49announcement serves as an inflection 1:50point in modern cyber security as the 1:53global Benchmark for cryptography the 1:55NIS standard signals that the time has 1:58come to make the world's information 1:59security systems resistant to Future 2:02cryptographically relevant quantum 2:04computers nist finalized the following 2:06three pqc standards to strengthen modern 2:09public key cryptography infrastructure 2:11for the quantum era first is mlkm a key 2:15encapsulation mechanism selected for 2:17General encryption such as for accessing 2:19secured websites second is mlda a 2:23lattice-based algorithm chosen for 2:25general purpose digital signature 2:27protocols and third is slh diesa a 2:30stateless hash-based digital signature 2:32scheme those first two standards were 2:35developed by IBM research cryptography 2:37researchers in Zurich with external 2:39collaborators and the third was 2:40co-developed by a scientist who has 2:42since joined IBM research nist has been 2:45encouraging organizations to plan and 2:47prepare for the quantum safe migration 2:49in advance of this moment however the 2:52release of the standards gives 2:53organizations the assurance and guidance 2:55they need to begin the transition to 2:58postquantum cryptography to learn more 3:01hit the link 3:02below to finish things up today let's 3:04talk a little about IBM Watson X code 3:07assistant for Z which is built to assist 3:09developers Architects and system 3:11programmers in modernizing their 3:13Mainframe applications through the use 3:15of generative Ai and 3:17automation available now code assistant 3:19for Z 2.1 further assists developers and 3:22system programmers in optimizing Cobalt 3:25application performance and 3:27understanding JCL code the First new 3:29feature is code optimization advice 3:31which is designed to streamline cobal 3:33application development and enhance 3:35performance this capability addresses 3:38the challenges faced by developers 3:39working with cobal applications and 3:41empowers them to deliver efficient and 3:43modern code the second new feature is 3:46that code explanation is now enhanced to 3:48include support for JCL enabling system 3:51programmers to gain knowledge of JCL and 3:54Z automation assets faster to learn more 3:57about code assistant 2.1 and the new 3:59features hit the link below thanks so 4:02much for joining me today for this 4:03episode of IBM Tech now if you're 4:04interested in learning more about the 4:06topics I've covered make sure you 4:07explore the links in the description of 4:09this video and of course please don't 4:11forget to subscribe to our channel to 4:12stay up Tod dat on what's going on in 4:14Tech now 4:16[Music]