❌

Normal view

There are new articles available, click to refresh the page.
Yesterday β€” 5 December 2025Main stream

S&P Welcomes Top Exchange’s Native Token To Five Key Crypto Indices

5 December 2025 at 01:00

European exchange WhiteBIT announced the inclusion of its native token in major digital asset benchmarks by leading global provider of financial market indices, S&P Dow Jones Indices, marking a significant step for the platform and the region’s crypto infrastructure sector.

WhiteBIT Included In Major Crypto Indices

On Thursday, top crypto exchange WhiteBIT announced that its token, WBT, has been added to the S&P Cryptocurrency Broad Digital Market (BDM) Index, curated by S&P Dow Jones Indices (DJI).

The S&P BDM IndexΒ is designed to track the performance of crypto assets that meet strict institutional criteria, including liquidity, market capitalization, governance, transparency, and risk controls, and are listed on recognized open digital exchanges.

This marks an important milestone for both WhiteBIT and the broader fintech landscape in Central and Eastern Europe, the exchange noted, as it reinforces β€œthe platform’s growing role in the global crypto economy” and highlights the industry’s move toward regulated, infrastructure-level players.

In a statement, Volodymyr Nosov, CEO of WhiteBIT, affirmed that β€œbeing recognized by S&P DJI is more than an index inclusion β€” it signals that crypto infrastructure from our region has reached global institutional standards.”

The announcement also revealed that WBT was added to the other four S&P Dow Jones digital-asset indices, including the S&P Cryptocurrency Broad Digital Asset (BDA) Index, S&P Cryptocurrency Financials Index, S&P Cryptocurrency LargeCap Ex-MegaCap Index, and the S&P Cryptocurrency LargeCap Index.

Notably, index providers have been expanding coverage beyond protocol-layer tokens as the industry matures, acknowledging the systemic role of exchanges and financial infrastructure platforms, positioning these companies within the global map of institutional-grade digital asset providers.

The exchange underscored that the classifications require a remarkable record of liquidity stability, transparent price formation, and consistent market cap behavior. β€œThis is a turning point not only for our company but also for the evolution of compliant crypto services worldwide,” Nosov continued.

WhiteBIT’s Expansion And WBT’s Momentum

The S&P index inclusions follow a strong market performance from WBT, which rallied around 50% over the last three months, despite recent market volatility that sent many leading tokens to multi-month lows in the past few weeks.

In mid-November, the altcoin reached an all-time high (ATH) of $62.96, fueled by last month’s positive developments. As reported by Bitcoinist, WhiteBIT unveiled its entry into the Argentine and Brazilian markets, building on its expansion to Australia, Croatia, Italy, andΒ Kazakhstan.

The move is expected to integrate local fiat providers and add support for local currencies, aiming to further enhance accessibility and convenience for domestic users in the two largest countries in South America.

Moreover, the exchange signed a strategic cooperation agreement with Durrah AlFodah Holding, represented by His Royal Highness Prince Naif Bin Abdullah Bin Saud Bin Abdulaziz Al Saud, to drive the Kingdom’s development in blockchain technology, digital finance, and data infrastructure.

Under the strategic agreement, WhiteBIT is set to provide technological expertise and infrastructure design. Meanwhile, Durrah AlFodah will facilitate the exchange’s market entry, regulatory engagement, and partnership development across Saudi Arabia.

Now, being part of S&P’s indices offers WBT a clear benchmark, the announcement added, facilitating its use in future financial products and long-term investment strategies.

This expanded representation marks an important shift for WBT: from a utility token into a component integrated into global benchmark structures used by investment firms, ETF/ETN designers, and quantitative research platforms. Its presence in multiple institutional models means that WBT is now incorporated into the analytical frameworks that guide long-term allocation strategies, diversified exposure construction, and risk-adjusted portfolio modelling.

In the late hours of December 3, WBT rallied to a new ATH of $63.05 before stabilizing around the $62 mark, according to CoinGecko data. This represents a 14.5% increase from the recent lows and a 9% surge in the weekly timeframe.

crypto, WBT, WBTUSDT

Before yesterdayMain stream

DoD’s plan to track contractor-held property is failing, putting 2028 audit goal at risk

The Pentagon’s plan to fix its decades-old material weaknesses β€” its inability to reliably track government property in the possession of contractors β€” is failing, a new inspector general evaluation finds.

The Pentagon IG concluded that the department’s corrective action plan β€” which calls on DoD components to use a software application called the Government Furnished Property Module within the Procurement Integrated Enterprise Environment β€” has stalled due to a lack of enforcement from the Office of the Secretary of Defense and slow adoption by the military services.

Auditors warn that if DoD components don’t implement the GFP module, the department risks missing its goal of achieving a clean audit opinion by 2028.

β€œThe implementation of that GFP module is the key to getting this to work,” Mark Thomas, DoD IG’s supervisory auditor, told Federal News Network.

One of the technical challenges, Thomas said, is that each military service uses its own accountable property system of record, or APSR, to track government assets in the hands of contractors. The office of the secretary of defense, however, wants the services to connect their systems to the GFP module.Β Β 

β€œThat is something that the components have not been able to do yet. They’re still working to implement that. Each of the components has corrective action dates for that that are still into the future,” Thomas said.Β 

β€œThe goal would be to complete everything by 2028, preferably before 2028 so that the auditors, as they come in to do the work, that control environment has been established and been working before the auditors come in and start to do some of the work. That would be the best way to do it,” he added.

But some of the timelines to remediate this weakness stretch beyond the 2028 deadline.Β 

β€œUnless there’s a change in those dates, then they’ll be at risk for missing the deadline,” Thomas said.Β 

Each military service has its own reasons for lagging in implementing the department-wide solution, but most of those reasons center around the same issue β€” every component is grappling with its own longstanding material weakness in accounting for government property in the possession of contractors.Β 

β€œThey have their own systems which differ from component to component. So they have their own technical challenges and how their particular system in the Air Force functions and how it accounts for property versus how the Navy does it. Each group is kind of working on their own technical challenges and how they’re going to report this into their own APSR β€” they are busy doing that and they’re actively trying to clean that up so that they can all get opinions on their financial statements,” Thomas said.Β 

But the IG found that this component-level focus has come at the expense of the broader, department-wide effort.Β 

Thomas said the services have been receptive to adapting the department-wide solution, but each faces a number of technical challenges connecting their systems to the GFP module.Β 

β€œThey understand the importance of it, and they understand what this really would give us if there is a functioning GFP module across the department. This would really give the department a larger bird’s eye view of all of the property that they have in the possession of contractors. And it would provide that enterprise level look and ability to tell we have so much property at contractor x,” Thomas said.Β 

Meanwhile, DoD leaders have not mandated the use of the GFP module, which is stalling the department’s efforts to remediate this material weakness. The audit found that the OSD could be β€œmore forceful” in recommending and implementing the department-wide solution.

β€œThey need to be more direct in saying that we will use this module, all the components will use this module. That was one of the areas that we thought was weak, that the department could improve their messaging, and they could improve to be more direct and require the use of this module,” Thomas said.

The post DoD’s plan to track contractor-held property is failing, putting 2028 audit goal at risk first appeared on Federal News Network.

Β© The Associated Press

FILE - The Department of Defense logo is seen on the wall in the Press Briefing room at the Pentagon, Oct. 29, 2024, in Washington. (AP Photo/Kevin Wolf, File)

In comedy of errors, men accused of wiping gov databases turned to an AI tool

4 December 2025 at 16:51

Two sibling contractors convicted a decade ago for hacking into US State Department systems have once again been charged, this time for a comically hamfisted attempt to steal and destroy government records just minutes after being fired from their contractor jobs.

The Department of Justice on Thursday said that Muneeb Akhter and Sohaib Akhter, both 34, of Alexandria, Virginia, deleted databases and documents maintained and belonging to three government agencies. The brothers were federal contractors working for an undisclosed company in Washington, DC, that provides software and services to 45 US agencies. Prosecutors said the men coordinated the crimes and began carrying them out just minutes after being fired.

Using AI to cover up an alleged crimeβ€”what could go wrong?

On February 18 at roughly 4:55 pm, the men were fired from the company, according to an indictment unsealed on Thursday. Five minutes later, they allegedly began trying to access their employer’s system and access federal government databases. By then, access to one of the brothers’ accounts had already been terminated. The other brother, however, allegedly accessed a government agency’s database stored on the employer’s server and issued commands to prevent other users from connecting or making changes to the database. Then, prosecutors said, he issued a command to delete 96 databases, many of which contained sensitive investigative files and records related to Freedom of Information Act matters.

Read full article

Comments

Β© Getty Images

Lummis Bitcoin meme on X fuels talk of U.S. Strategic BTC Reserve

4 December 2025 at 04:40
Cynthia Lummis’ Bitcoin meme post on X revives speculation that the U.S. could expand BTC reserves under Trump’s Strategic Bitcoin Reserve framework. U.S. Senator Cynthia Lummis posted a Bitcoin-themed image on social media platform X, prompting speculation that the United…

Admins and defenders gird themselves against maximum-severity server vuln

3 December 2025 at 18:16

Security defenders are girding themselves in response to the disclosure of a maximum-severity vulnerability disclosed Wednesday in React Server, an open-source package that’s widely used by websites and in cloud environments.

The vulnerability is easy to exploit and allows hackers to execute malicious code on servers that run it. Exploit code is now publicly available.

React is embedded into web apps running on servers so that remote devices render JavaScript and content more quickly and with fewer resources required. React is used by an estimated 6 percent of all websites and 39 percent of cloud environments. When end users reload a page, React allows servers to re-render only parts that have changed, a feature that drastically speeds up performance and lowers the computing resources required by the server.

Read full article

Comments

Β© Getty Images

Microsoft drops AI sales targets in half after salespeople miss their quotas

3 December 2025 at 13:24

Microsoft has lowered sales growth targets for its AI agent products after many salespeople missed their quotas in the fiscal year ending in June, according to a report Wednesday from The Information. The adjustment is reportedly unusual for Microsoft, and it comes after the company missed a number of ambitious sales goals for its AI offerings.

AI agents are specialized implementations of AI language models designed to perform multistep tasks autonomously rather than simply responding to single prompts. So-called β€œagentic” features have been central to Microsoft’s 2025 sales pitch: At its Build conference in May, the company declared that it has entered β€œthe era of AI agents.”

The company has promised customers that agents could automate complex tasks, such as generating dashboards from sales data or writing customer reports. At its Ignite conference in November, Microsoft announced new features like Word, Excel, and PowerPoint agents in Microsoft 365 Copilot, along with tools for building and deploying agents through Azure AI Foundry and Copilot Studio. But as the year draws to a close, that promise has proven harder to deliver than the company expected.

Read full article

Comments

Β© Wong Yu Liang via Getty Images

Fraudulent gambling network may actually be something more nefarious

3 December 2025 at 12:23

A sprawling infrastructure that has been bilking unsuspecting people through fraudulent gambling websites for 14 years is likely a dual operation run by a nation-state-sponsored group that is targeting government and private-industry organizations in the US and Europe, researchers said Wednesday.

Researchers have previously tracked smaller pieces of the enormous infrastructure. Last month, security firm Sucuri reported that the operation seeks out and compromises poorly configured websites running the WordPress CMS. Imperva in January said the attackers also scan for and exploit web apps built with the PHP programming language that have existing webshells or vulnerabilities. Once the weaknesses are exploited, the attackers install a GSocket, a backdoor that the attackers use to compromise servers and host gambling web content on them.

All of the gambling sites target Indonesian-speaking visitors. Because Indonesian law prohibits gambling, many people in that country are drawn to illicit services. Most of the 236,433 attacker-owned domains hosting the gambling sites are hosted on Cloudflare. Most of the 1,481 hijacked subdomains were hosted on Amazon Web Services, Azure, and GitHub.

Read full article

Comments

Β© Getty Images

Arizona Attorney General Sues Chinese Online Retailer Temu Over Data Theft Claims

3 December 2025 at 07:24

Arizona is the latest state to sue Temu and its parent company PDD Holdings over allegations that the Chinese online retailer is stealing customers’ data.

The post Arizona Attorney General Sues Chinese Online Retailer Temu Over Data Theft Claims appeared first on SecurityWeek.

OpenAI CEO declares β€œcode red” as Gemini gains 200 million users in 3 months

2 December 2025 at 17:42

The shoe is most certainly on the other foot. On Monday, OpenAI CEO Sam Altman reportedly declared a β€œcode red” at the company to improve ChatGPT, delaying advertising plans and other products in the process, Β The Information reported based on a leaked internal memo. The move follows Google’s release of its Gemini 3 model last month, which has outperformed ChatGPT on some industry benchmark tests and sparked high-profile praise on social media.

In the memo, Altman wrote, β€œWe are at a critical time for ChatGPT.” The company will push back work on advertising integration, AI agents for health and shopping, and a personal assistant feature called Pulse. Altman encouraged temporary team transfers and established daily calls for employees responsible for enhancing the chatbot.

The directive creates an odd symmetry with events from December 2022, when Google management declared its own β€œcode red” internal emergency after ChatGPT launched and rapidly gained in popularity. At the time, Google CEO Sundar Pichai reassigned teams across the company to develop AI prototypes and products to compete with OpenAI’s chatbot. Now, three years later, the AI industry is in a very different place.

Read full article

Comments

Β© Anadolu via Getty Images

Syntax hacking: Researchers discover sentence structure can bypass AI safety rules

2 December 2025 at 07:15

Researchers from MIT, Northeastern University, and Meta recently released a paper suggesting that large language models (LLMs) similar to those that power ChatGPT may sometimes prioritize sentence structure over meaning when answering questions. The findings reveal a weakness in how these models process instructions that may shed light on why some prompt injection or jailbreaking approaches work, though the researchers caution their analysis of some production models remains speculative since training data details of prominent commercial AI models are not publicly available.

The team, led by Chantal Shaib and Vinith M. Suriyakumar, tested this by asking models questions with preserved grammatical patterns but nonsensical words. For example, when prompted with β€œQuickly sit Paris clouded?” (mimicking the structure of β€œWhere is Paris located?”), models still answered β€œFrance.”

This suggests models absorb both meaning and syntactic patterns, but can overrely on structural shortcuts when they strongly correlate with specific domains in training data, which sometimes allows patterns to override semantic understanding in edge cases. The team plans to present these findings at NeurIPS later this month.

Read full article

Comments

Β© EasternLightcraft via Getty Images

ν΄λΌμš°λ“œ 주ꢌ만으둠 λΆ€μ‘±ν•˜λ‹€Β·Β·Β·κ³΅κ³΅ λΆ€λ¬Έμ˜ μƒˆλ‘œμš΄ μŸμ μ€ β€˜μ’…λ‹¨ κ°„ μ•”ν˜Έν™”β€™

2 December 2025 at 00:49

λ°μ΄ν„°μ˜ μœ„μΉ˜ μ§€μ •λ§ŒμœΌλ‘œλŠ” 더 이상 μΆ©λΆ„ν•˜μ§€ μ•Šλ‹€λŠ” 인식이 ν™•μ‚°λ˜κ³  μžˆλ‹€. μ •λΆ€κ°€ 자ꡭ 내에 데이터λ₯Ό λ³΄κ΄€ν•˜λ”λΌλ„ μ„œλ“œνŒŒν‹° μ„œλ²„μ— μ˜¬λ €λ‘λ©΄ μ‹€μ œ μ£ΌκΆŒμ„ 보μž₯ν•˜μ§€ λͺ»ν•œλ‹€λŠ” μš°λ €κ°€ μ»€μ§€λ©΄μ„œ, 규제 당ꡭ은 보닀 근본적인 쑰치λ₯Ό μš”κ΅¬ν•˜κ³  μžˆλ‹€. λ°”λ‘œ 데이터 μ•”ν˜Έν™” 킀에 λŒ€ν•œ ν†΅μ œκΆŒμ΄λ‹€.

μŠ€μœ„μŠ€ μ§€λ°©μ •λΆ€ κ°œμΈμ •λ³΄λ³΄ν˜Έ μ±…μž„μž ν˜‘μ˜μ²΄μΈ ν”„λ¦¬λ°”νŒ€(Privatim)은 졜근 κ²°μ˜λ¬Έμ„ 톡해, λ―Όκ°ν•œ μ •λΆ€ 데이터λ₯Ό λ‹€λ£° λ•Œ 기관이 직접 쒅단 κ°„(E2E) μ•”ν˜Έν™”λ₯Ό κ΅¬ν˜„ν•˜μ§€ μ•ŠλŠ” ν•œ κΈ€λ‘œλ²Œ μ„œλΉ„μŠ€ν˜• μ†Œν”„νŠΈμ›¨μ–΄(SaaS) μ‚¬μš©μ„ ν”Όν•΄μ•Ό ν•œλ‹€κ³  μ΄‰κ΅¬ν–ˆλ‹€. κ²°μ˜λ¬Έμ€ μ΄λŸ¬ν•œ 기쀀에 λ―ΈμΉ˜μ§€ λͺ»ν•˜λŠ” μ‚¬λ‘€λ‘œ λ§ˆμ΄ν¬λ‘œμ†Œν”„νŠΈ 365λ₯Ό λͺ…μ‹œμ μœΌλ‘œ μ–ΈκΈ‰ν–ˆλ‹€.

κ²°μ˜λ¬Έμ€ β€œλŒ€λ‹€μˆ˜ SaaS μ†”λ£¨μ…˜μ€ 업체가 평문 데이터에 μ ‘κ·Όν•˜μ§€ λͺ»ν•˜λ„둝 보μž₯ν•˜λŠ” μ§„μ •ν•œ 쒅단 κ°„ μ•”ν˜Έν™”λ₯Ό 아직 μ§€μ›ν•˜μ§€ μ•ŠλŠ”λ‹€. λ”°λΌμ„œ SaaS μ• ν”Œλ¦¬μΌ€μ΄μ…˜ μ‚¬μš©μ€ κΈ°κ΄€μ˜ ν†΅μ œλ ₯을 μƒλ‹Ήνžˆ μ•½ν™”μ‹œν‚€λŠ” κ²°κ³Όλ₯Ό μ΄ˆλž˜ν•œλ‹€β€λΌκ³  λ°ν˜”λ‹€.

뢄석가듀은 이런 ν†΅μ œλ ₯ 상싀이 데이터 주ꢌ의 핡심 κ°œλ…μ„ ν›Όμ†ν•œλ‹€κ³  μ§€μ ν–ˆλ‹€. κ·Έλ ˆμ΄ν•˜μš΄λ“œλ¦¬μ„œμΉ˜(Greyhound Research) 졜고 μ• λ„λ¦¬μŠ€νŠΈ μ‚°μΉ˜νŠΈ λΉ„λ₯΄ κ³ κΈ°μ•„λŠ” β€œν΄λΌμš°λ“œ 업체가 법적 μ ˆμ°¨λ“  λ‚΄λΆ€ λ©”μ»€λ‹ˆμ¦˜μ΄λ“  μ–΄λ–€ λ°©μ‹μœΌλ‘œλ“  고객 데이터λ₯Ό λ³΅ν˜Έν™”ν•  수 μžˆλŠ” λŠ₯λ ₯을 κ°–κ³  μžˆλ‹€λ©΄, κ·Έ λ°μ΄ν„°λŠ” 더 이상 μ§„μ •ν•œ 의미의 μ£ΌκΆŒμ„ μ§€λ‹Œ 것이 μ•„λ‹ˆλ‹€β€λΌκ³  λ§ν–ˆλ‹€.

κ³ κΈ°μ•„λŠ” 유럽 κ΅­κ°€ μ „λ°˜μ—μ„œ 이와 μœ μ‚¬ν•œ 의견이 μ œμ‹œλ˜κ³  μžˆλ‹€κ³  μ–ΈκΈ‰ν–ˆλ‹€. 그에 λ”°λ₯΄λ©΄ μœ λŸ½μ—μ„œλŠ” 독일, ν”„λž‘μŠ€, 덴마크, μœ λŸ½μ—°ν•© μ§‘ν–‰μœ„μ›νšŒ 등이 ν΄λΌμš°λ“œ μ—…μ²΄μ˜ 쀑립성에 λŒ€ν•œ μ‹ λ’°κ°€ μ•½ν™”λ˜κ³  μžˆλ‹€λ©° κ²½κ³ ν•˜κ±°λ‚˜ 쑰치λ₯Ό μ·¨ν•˜κ³  μžˆλ‹€. κ·ΈλŠ” β€œμŠ€μœ„μŠ€λŠ” λ‹€λ₯Έ 유럽 ꡭ가듀이 μ•”μ‹œμ μœΌλ‘œ μ–ΈκΈ‰ν•΄μ˜¨ λ‚΄μš©μ„ λͺ…ν™•νžˆ ν–ˆλ‹€. κ²°μ˜λ¬Έμ€ λ―Έκ΅­ ν΄λΌμš°λ“œ 법과 ν•΄μ™Έ κ°μ‹œ μœ„ν—˜ λ•Œλ¬Έμ— 쒅단 κ°„ μ•”ν˜Έν™”κ°€ μ μš©λ˜μ§€ μ•Šμ€ ν΄λΌμš°λ“œ μ†”λ£¨μ…˜μ€ λ―Όκ°ν•œ 곡곡 λΆ€λ¬Έ 업무에 μ ν•©ν•˜μ§€ μ•Šλ‹€κ³  κ·œμ •ν•˜κ³  μžˆλ‹€β€λΌκ³  λ§ν–ˆλ‹€.

μ•”ν˜Έν™”μ™€ β€˜μœ„μΉ˜β€™μ˜ ν•œκ³„

ν”„λ¦¬λ°”νŒ€μ€ κ²°μ˜λ¬Έμ—μ„œ 데이터 μœ„μΉ˜ κ·œμ •λ§ŒμœΌλ‘œλŠ” ν•΄κ²°ν•  수 μ—†λŠ” 리슀크λ₯Ό μ§€μ ν•˜λ©΄μ„œ, 당ꡭ이 κΈ€λ‘œλ²Œ κΈ°μ—…μ˜ 계약 의무 μ€€μˆ˜ μ—¬λΆ€λ₯Ό 검증할 수 μžˆμ„ μ •λ„λ‘œ μΆ©λΆ„ν•œ 투λͺ…성을 μ œκ³΅λ°›μ§€ λͺ»ν•˜κ³  μžˆλ‹€κ³  μ§„λ‹¨ν–ˆλ‹€. 이런 뢈투λͺ…성이 기술의 μ‹€μ œ κ΅¬ν˜„ 방식, μ‹œμŠ€ν…œμ„ λ³€κ²½ 관리, 그리고 직원과 ν•˜μ²­ 업체λ₯Ό μ–΄λ–»κ²Œ κ°λ…ν•˜λŠ”μ§€κΉŒμ§€ 이어지며, μ™ΈλΆ€ μ„œλΉ„μŠ€ μ œκ³΅μžκ°€ μ—¬λŸ¬ λ‹¨κ³„λ‘œ μ–½νžˆλŠ” λ³΅μž‘ν•œ ꡬ쑰둜 ν™•λŒ€λœλ‹€κ³  κ°•μ‘°ν–ˆλ‹€.

κ°€νŠΈλ„ˆ(Gartner) μˆ˜μ„ μ• λ„λ¦¬μŠ€νŠΈ μ•„μ‹œμ‹œ λ°°λ„ˆμ§€λŠ” 데이터가 νŠΉμ • ꡭ가에 μ €μž₯돼 μžˆμ–΄λ„ λ―Έκ΅­ ν΄λΌμš°λ“œ λ²•μ²˜λŸΌ μ΄ˆκ΅­κ°€μ  적용이 κ°€λŠ₯ν•œ 법λ₯ μ— 따라 μ™Έκ΅­ μ •λΆ€κ°€ μ ‘κ·Όν•  수 μžˆλ‹€κ³  λ§ν–ˆλ‹€. κ·ΈλŠ” λ˜ν•œ μ†Œν”„νŠΈμ›¨μ–΄ 벀더가 계약 쑰건을 주기적으둜 μˆ˜μ •ν•  수 μžˆμ–΄ 고객의 ν†΅μ œκΆŒμ΄ 더 μ•½ν™”λœλ‹€κ³  λΆ„μ„ν–ˆλ‹€.

λ°°λ„ˆμ§€λŠ” β€œμ€‘λ™κ³Ό 유럽의 μ—¬λŸ¬ 고객이 β€˜λ°μ΄ν„°κ°€ 어디에 μ €μž₯돼 μžˆλ“ , λŒ€λΆ€λΆ„ λ―Έκ΅­ 기반인 ν΄λΌμš°λ“œ 업체가 μ—¬μ „νžˆ μ ‘κ·Όν•  수 μžˆλ‹€β€™λŠ” 점을 μš°λ €ν•˜κ³  μžˆλ‹€β€λΌκ³  λ§ν–ˆλ‹€.

μ—λ² λ ˆμŠ€νŠΈκ·Έλ£Ή(Everest Group) μˆ˜μ„ μ• λ„λ¦¬μŠ€νŠΈ ν”„λΌλΈŒμ£ νŠΈ 카우λ₯΄λŠ” μŠ€μœ„μŠ€μ˜ μž…μž₯이 기술 μ£ΌκΆŒμ„ κ°•ν™”ν•˜λ €λŠ” 규제 λ³€ν™” 흐름을 λ”μš± κ°€μ†ν•œλ‹€κ³  μ„€λͺ…ν–ˆλ‹€. 카우λ₯΄λŠ” β€œμŠ€μœ„μŠ€μ˜ 기쀀이 λ‹€λ₯Έ ꡭ가보닀 μ—„κ²©ν•œ 것은 μ‚¬μ‹€μ΄μ§€λ§Œ, κ²°μ½” νŠΉλ³„ν•œ μ‚¬λ‘€λŠ” μ•„λ‹ˆλ‹€. κ³„μ•½μ΄λ‚˜ 절차적 μ•ˆμ „μž₯μΉ˜μ— μ˜μ‘΄ν•˜λŠ” μ‹œμž₯μ—μ„œλ„ 기술 μ£ΌκΆŒμ„ κ°•ν™”ν•˜λŠ” λ°©ν–₯으둜 μ „ν™˜μ΄ 빨라지고 μžˆλ‹€β€λΌκ³  μ–ΈκΈ‰ν–ˆλ‹€.

ν”„λ¦¬λ°”νŒ€μ€ 이런 ν•œκ³„λ₯Ό κ³ λ €ν•΄ λͺ¨λ“  곡곡 λΆ€λ¬Έμ—μ„œ ν΄λΌμš°λ“œ μ‚¬μš© 기쀀을 κ°•ν™”ν•΄μ•Ό ν•œλ‹€κ³  μ œμ‹œν–ˆλ‹€. κ²°μ˜λ¬Έμ€ β€œνŠΉνžˆ λ―Όκ°ν•œ κ°œμΈμ •λ³΄λ‚˜ 법적 λΉ„λ°€ μœ μ§€ μ˜λ¬΄κ°€ μ μš©λ˜λŠ” 데이터λ₯Ό λ‹€λ£¨λŠ” 곡곡기관은 데이터λ₯Ό 직접 μ•”ν˜Έν™”ν•˜κ³ , ν΄λΌμš°λ“œ 업체가 μ•”ν˜Έ 킀에 μ ‘κ·Όν•  수 μ—†λŠ” κ²½μš°μ—λ§Œ κΈ€λ‘œλ²Œ SaaS μ†”λ£¨μ…˜μ„ μ‚¬μš©ν•΄μ•Ό ν•œλ‹€β€λΌκ³  λ°ν˜”λ‹€.

μ΄λŠ” ν˜„μž¬μ˜ κ΄€ν–‰κ³Ό ν™•μ—°νžˆ λ‹€λ₯Έ 접근이닀. μ§€κΈˆκΉŒμ§€ λ§Žμ€ μ •λΆ€ 기관은 ν΄λΌμš°λ“œ 업체가 기본으둜 μ œκ³΅ν•˜λŠ” μ•”ν˜Έν™” κΈ°λŠ₯에 μ˜μ‘΄ν•΄ μ™”λ‹€. λ§ˆμ΄ν¬λ‘œμ†Œν”„νŠΈ 365와 같은 μ„œλΉ„μŠ€λŠ” μ €μž₯ 및 전솑 λ‹¨κ³„μ—μ„œ μ•”ν˜Έν™”λ₯Ό μ œκ³΅ν•˜μ§€λ§Œ, μš΄μ˜μƒ ν•„μš”λ‚˜ 규제 μ€€μˆ˜, 법적 μš”μ²­μ— λŒ€μ‘ν•˜κΈ° μœ„ν•΄ λ§ˆμ΄ν¬λ‘œμ†Œν”„νŠΈκ°€ 데이터λ₯Ό λ³΅ν˜Έν™”ν•  수 μžˆλŠ” κΆŒν•œμ„ μ—¬μ „νžˆ λ³΄μœ ν•˜κ³  μžˆλ‹€.

λ³΄μ•ˆμ€ κ°•ν™”λ˜μ§€λ§Œ 톡찰λ ₯은 κ°μ†Œ

λ‹€λ§Œ 전문가듀은 고객이 ν†΅μ œν•˜λŠ” 쒅단 κ°„ μ•”ν˜Έν™”κ°€ μƒλ‹Ήν•œ νƒ€ν˜‘μ μ„ μˆ˜λ°˜ν•œλ‹€κ³  μ§€μ ν–ˆλ‹€.

카우λ₯΄λŠ” β€œμ—…μ²΄κ°€ 평문 데이터λ₯Ό μ „ν˜€ λ³Ό 수 μ—†κ²Œ 되면, μ •λΆ€λŠ” 검색과 인덱싱 κΈ°λŠ₯ μ €ν•˜, ν˜‘μ—… κΈ°λŠ₯ μ œν•œ, μžλ™ν™”λœ μœ„ν˜‘ νƒμ§€λ‚˜ 데이터 유좜 λ°©μ§€ 도ꡬ ν™œμš© μ œμ•½μ— μ§λ©΄ν•˜κ²Œ λœλ‹€β€λΌκ³  λ§ν–ˆλ‹€. κ·ΈλŠ” 이어 β€œμ½”νŒŒμΌλŸΏκ³Ό 같은 AI 기반 생산성 κΈ°λŠ₯도 업체 μΈ‘ 데이터 처리λ₯Ό μ „μ œλ‘œ ν•˜κΈ° λ•Œλ¬Έμ—, μ—„κ²©ν•œ 쒅단 κ°„ μ•”ν˜Έν™” ν™˜κ²½μ—μ„œλŠ” 사싀상 ν™œμš©μ΄ λΆˆκ°€λŠ₯ν•˜λ‹€β€λΌκ³  μ„€λͺ…ν–ˆλ‹€.

κΈ°λŠ₯적 μ œμ•½ 외에 인프라와 λΉ„μš© 뢀담도 λ¬Έμ œκ°€ 될 수 μžˆλ‹€. 기관은 자체 ν‚€ 관리 μ‹œμŠ€ν…œμ„ μš΄μ˜ν•΄μ•Ό ν•˜λ©°, μ΄λŠ” μƒˆλ‘œμš΄ κ±°λ²„λ„ŒμŠ€ 업무와 인λ ₯ μˆ˜μš”λ₯Ό μœ λ°œν•œλ‹€. λ°°λ„ˆμ§€λŠ” λŒ€κ·œλͺ¨ μ•”ν˜Έν™” 및 λ³΅ν˜Έν™” μž‘μ—…μ΄ μΆ”κ°€ ν•˜λ“œμ›¨μ–΄ μžμ›μ„ μš”κ΅¬ν•˜κ³  지연을 μ¦κ°€μ‹œμΌœ μ‹œμŠ€ν…œ μ„±λŠ₯에 영ν–₯을 쀄 수 μžˆλ‹€κ³  λΆ„μ„ν–ˆλ‹€.

λ°°λ„ˆμ§€λŠ” β€œμΆ”κ°€ ν•˜λ“œμ›¨μ–΄κ°€ ν•„μš”ν•΄μ§€κ³  μ‚¬μš©μž κ²½ν—˜μ—μ„œλ„ 지연이 λ°œμƒν•  수 있으며, 전체 μ†”λ£¨μ…˜ λΉ„μš©λ„ 더 λ†’μ•„μ§ˆ 수 μžˆλ‹€β€λΌκ³  λ§ν–ˆλ‹€.

κ³ κΈ°μ•„λŠ” μ΄λŸ¬ν•œ μ œμ•½μœΌλ‘œ 인해 λŒ€λΆ€λΆ„μ˜ μ •λΆ€κ°€ 전면적인 μ•”ν˜Έν™” λŒ€μ‹  단계적 μ ‘κ·Ό 방식을 택할 것이라고 μ „λ§ν–ˆλ‹€. κ·ΈλŠ” β€œκΈ°λ°€ λ¬Έμ„œ, 법적 쑰사 자료, κ΅­κ°€μ•ˆλ³΄ κ΄€λ ¨ λ¬Έμ„œ λ“± κ³ λ„μ˜ 민감 데이터λ₯Ό 별도 ν…Œλ„ŒνŠΈλ‚˜ 주ꢌ ν™˜κ²½μ— 두고 μ™„μ „ν•œ 쒅단 κ°„ μ•”ν˜Έν™”λ₯Ό μ μš©ν•˜λŠ” 방식이 ν˜„μ‹€μ μΈ 선택지가 될 것”이라고 λ§ν–ˆλ‹€. 반면 ν–‰μ • λ¬Έμ„œλ‚˜ μ‹œλ―Ό μ„œλΉ„μŠ€ λ“± 폭넓은 곡곡 μ—…λ¬΄λŠ” ν†΅μ œλœ μ•”ν˜Έν™”μ™€ κ°•ν™”λœ 감사 κΈ°λŠ₯을 μ μš©ν•œ μ£Όμš” ν΄λΌμš°λ“œ ν”Œλž«νΌμ„ 계속 ν™œμš©ν•  κ²ƒμœΌλ‘œ 보인닀고 μ§„λ‹¨ν–ˆλ‹€.

ν΄λΌμš°λ“œ μ»΄ν“¨νŒ… μ—­λŸ‰μ˜ λ³€ν™”

카우λ₯΄λŠ” μŠ€μœ„μŠ€μ˜ μ ‘κ·Ό 방식이 ꡭ제적으둜 확산될 경우, μ£Όμš” ν΄λΌμš°λ“œ 업체가 계약상 λ˜λŠ” μ§€μ—­ 보μž₯에 머무λ₯΄μ§€ λͺ»ν•˜κ³  기술 μ£ΌκΆŒμ„ κ°•ν™”ν•΄μ•Ό ν•  것이라고 μ „λ§ν–ˆλ‹€. κ·ΈλŠ” β€œλ³€ν™” 쑰짐은 이미 λ‚˜νƒ€λ‚˜κ³  μžˆλ‹€. 특히 λ§ˆμ΄ν¬λ‘œμ†Œν”„νŠΈκ°€ 고객 ν†΅μ œ μ•”ν˜Έν™”μ™€ κ΄€ν• κΆŒ 기반 μ ‘κ·Ό μ œν•œμ„ κ°•ν™”ν•˜λŠ” 보닀 μ—„κ²©ν•œ λͺ¨λΈμ„ λ„μž…ν•˜κΈ° μ‹œμž‘ν–ˆλ‹€β€λΌκ³  λ§ν–ˆλ‹€.

κ³ κΈ°μ•„λŠ” 이런 λ³€ν™”κ°€ ν΄λΌμš°λ“œ 업체가 μ •λΆ€ 고객을 λŒ€ν•˜λŠ” 방식을 근본적으둜 흔든닀고 λΆ„μ„ν–ˆλ‹€. κ·ΈλŠ” β€œλ°μ΄ν„°μ„Όν„° μœ„μΉ˜, μ§€μ—­ 지원, 계약 기반 뢄리 등을 μ£Όμš” 보증 μˆ˜λ‹¨μœΌλ‘œ μ‚Όμ•˜λ˜ κΈ°μ‘΄ μ •λΆ€ ν΄λΌμš°λ“œ μ „λž΅μ˜ 상당 뢀뢄이 더 이상 μœ νš¨ν•˜μ§€ μ•Šκ²Œ 됐닀”라고 λ§ν–ˆλ‹€. λ˜ν•œ β€œν΄λΌμ΄μ–ΈνŠΈ μΈ‘ μ•”ν˜Έν™”, κΈ°λ°€ μ»΄ν“¨νŒ…, μ™ΈλΆ€ ν‚€ κ΄€λ¦¬λŠ” 선택적 κΈ°λŠ₯이 μ•„λ‹ˆλΌ 고규제 μ‹œμž₯의 곡곡 λΆ€λ¬Έ κ³„μ•½μ—μ„œ λ°˜λ“œμ‹œ κ°–μΆ°μ•Ό ν•  κΈ°λ³Έ μš”κ±΄μ΄ 됐닀”라고 κ°•μ‘°ν–ˆλ‹€.

λ°°λ„ˆμ§€λŠ” 이둜 인해 μ‹œμž₯ ꡬ쑰도 크게 재편될 수 μžˆλ‹€κ³  μ „λ§ν–ˆλ‹€. κ·ΈλŠ” 주ꢌ λ¬Έμ œμ— μƒλŒ€μ μœΌλ‘œ λ―Όκ°ν•˜μ§€ μ•Šμ€ 상업 고객을 μœ„ν•œ κΈ€λ‘œλ²Œ ν΄λΌμš°λ“œμ™€, μ™„μ „ν•œ ν†΅μ œλ₯Ό μš”κ΅¬ν•˜λŠ” μ •λΆ€λ₯Ό μœ„ν•œ 프리미엄 주ꢌ ν΄λΌμš°λ“œλΌλŠ” β€˜μ΄μ›ν™” ꡬ쑰’가 생길 수 μžˆλ‹€κ³  μ§„λ‹¨ν–ˆλ‹€. 이어 β€œμœ λŸ½ λ“±μ§€μ—μ„œ λΆ€μƒν•˜λŠ” μ‹ ν₯ ν΄λΌμš°λ“œ 업체와 μ§€μ—­ 벀더듀이 μ—„κ²©ν•œ μ•”ν˜Έν™” μš”κ±΄μ„ μΆ©μ‘±ν•˜λŠ” 주ꢌ 기반 μ†”λ£¨μ…˜μ„ μ œκ³΅ν•˜λ©΄μ„œ μ‹œμž₯ μ μœ μœ¨μ„ ν™•λŒ€ν•  κ°€λŠ₯성이 μžˆλ‹€β€λΌκ³  λΆ„μ„ν–ˆλ‹€.

ν”„λ¦¬λ°”νŒ€μ˜ κΆŒκ³ μ•ˆμ€ μŠ€μœ„μŠ€ 곡곡 κΈ°κ΄€μ—λ§Œ μ μš©λ˜λŠ” μ§€μΉ¨μ΄μ§€λ§Œ, 이번 λ…ΌμŸμ€ 기술 정책을 λ‘˜λŸ¬μ‹Ό 지정학적 경쟁이 κ²©ν™”ν•˜λŠ” μƒν™©μ—μ„œ λ‹¨μˆœνžˆ 데이터 μœ„μΉ˜λ₯Ό ν†΅μ œν•˜λŠ” κ²ƒλ§ŒμœΌλ‘œλŠ” 더 이상 규제 λ‹Ήκ΅­μ˜ 주ꢌ μš”κ΅¬λ₯Ό μΆ©μ‘±μ‹œν‚€κΈ° μ–΄λ ΅λ‹€λŠ” 점을 보여쀀닀.
dl-ciokorea@foundryco.com

❌
❌