โŒ

Reading view

There are new articles available, click to refresh the page.

How Financial Institutions Can Future-Proof Their Security Against a New Breed of Cyber Attackers

As we look at the remainder of 2025 and beyond, the pace and sophistication of cyber attacks targeting the financial sector show no signs of slowing. In fact, based on research from Check Pointโ€™s Q2 Ransomware Report, the financial cybersecurity threat landscape is only intensifying. Gone are the days when the average hacker was a..

The post How Financial Institutions Can Future-Proof Their Security Against a New Breed of Cyber Attackers appeared first on Security Boulevard.

โ€œํ†ต์‹ ์‚ฌ ๋ณด์•ˆ ๋ฆฌ๋ถ€ํŠธโ€ ๋‚ก์€ ๊ฒฝ๊ณ„๋ฅผ ๋ฒ„๋ฆฌ๊ณ  ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋กœ ์žฌ์„ค๊ณ„ํ•ด์•ผ ํ•˜๋Š” ์ด์œ 

ํ†ต์‹  ๋„คํŠธ์›Œํฌ๋Š” ์ด์ œ ์–ด๋””์—๋‚˜ ์žˆ๋‹ค. ๋ฐ์ดํ„ฐ ๊ด€๋ฆฌ๋ถ€ํ„ฐ ๋น„์ฆˆ๋‹ˆ์Šค ๊ตฌ๋™, ๋Œ€๋ฅ™์„ ๊ฐ€๋กœ์ง€๋ฅด๋Š” ์‚ฌ๋žŒ ์—ฐ๊ฒฐ๊นŒ์ง€ ์„ธ์ƒ์„ ์›€์ง์ด๋Š” ๊ธฐ๋ฐ˜์ด ๋๋‹ค. ์˜ค๋žซ๋™์•ˆ ์ด ๋ถ„์•ผ์˜ ๋ณด์•ˆ ๋ฐฉ์‹์€ ๋น„๊ต์  ๋‹จ์ˆœํ–ˆ๋‹ค. ๋ฒฝ์„ ์„ธ์šฐ๊ณ , ์œ„ํ˜‘์€ ๋ฐ–์— ๋‘๊ณ , ๋‚ด๋ถ€๋Š” ์ „๋ถ€ ์‹ ๋ขฐํ•˜๋Š” ๋ฐฉ์‹์ด์—ˆ๋‹ค. ๋„คํŠธ์›Œํฌ๊ฐ€ ํ์‡„์ ์œผ๋กœ ์ž ๊ฒจ ์žˆ์„ ๋•Œ๋Š” ์ด๋Ÿฐ ๋ฐฉ์‹์ด๋ฉด ์ถฉ๋ถ„ํ–ˆ๋‹ค.

ํ•˜์ง€๋งŒ ๊ทธ๋Ÿฐ ์‹œ๋Œ€๋Š” ๋๋‚ฌ๋‹ค. ์ด์ œ ์›Œํฌ๋กœ๋“œ๋Š” ํ•˜์ด๋ธŒ๋ฆฌ๋“œ ํด๋ผ์šฐ๋“œ ์ „์—ญ์œผ๋กœ ํผ์ง€๊ณ  ์—ฃ์ง€ ๊ธฐ๊ธฐ๋Š” ํญ๋ฐœ์ ์œผ๋กœ ๋Š˜๊ณ , ์ˆ˜๋งŽ์€ ์„œ๋“œํŒŒํ‹ฐ ์†”๋ฃจ์…˜ ์—…์ฒด๊ฐ€ ํ†ต์‹ ๋ง์— ์—ฐ๊ฒฐ๋œ๋‹ค. ์˜ˆ์ „์˜ ๊ฒฝ๊ณ„์„  ๊ฐœ๋…์€ ์‚ฌ์‹ค์ƒ ์‚ฌ๋ผ์กŒ๋‹ค.

๊ทธ๋ž˜์„œ ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๊ฐ€ ํ•„์š”ํ•ด์กŒ๋‹ค. ๊ทธ์ € ์ตœ์‹  ์œ ํ–‰์–ด์— ๊ทธ์น˜๋Š” ๊ฒƒ์ด ์•„๋‹ˆ๋ผ ์ƒ์กด์„ ์œ„ํ•œ ํ•„์ˆ˜ ๋„๊ตฌ๊ฐ€ ๋๋‹ค. ๋งŽ์€ ๊ธฐ์—…์ด ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋ฅผ ๋งˆ์น˜ ์‚ฌ์„œ ๋„์ž…ํ•  ์ˆ˜ ์žˆ๋Š” ์ œํ’ˆ ์ •๋„๋กœ ์˜คํ•ดํ•œ๋‹ค๋Š” ์ ์ด๋‹ค. ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋Š” ๊ทธ๋Ÿฐ ๋ฐฉ์‹์œผ๋กœ ์ž‘๋™ํ•˜์ง€ ์•Š๋Š”๋‹ค.

ํ†ต์‹ ์„ ๋ฐœ๋ชฉ ์žก๋Š” ์˜คํ•ด

ํ†ต์‹  ์—…๊ณ„๋ฅผ ๋ณด๋ฉด ์–ด๋А ๊ณณ์—์„œ๋‚˜ ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋ผ๋Š” ๋‹จ์–ด๊ฐ€ ๋‚˜์˜จ๋‹ค. ์ด์‚ฌํšŒ, ์ „๋žต ๋ฌธ์„œ, ์†”๋ฃจ์…˜ ์—…์ฒด ํ”„๋ ˆ์  ํ…Œ์ด์…˜ ๋“ฑ ์–ด๋””์—๋‚˜ ๋“ฑ์žฅํ•œ๋‹ค. ๊ทธ๋Ÿฐ ๊ณผ์ •์—์„œ ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ์˜ ๋ณธ๋ž˜ ์˜๋ฏธ๊ฐ€ ๋งŽ์ด ํฌ์„๋๋‹ค. ๋งŽ์€ ๊ฒฝ์˜์ง„์ด ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋ฅผ ๊ทœ์ œ ์ค€์ˆ˜ ์ฒดํฌ๋ฆฌ์ŠคํŠธ ํ•œ ์ค„, ๋˜๋Š” ๋˜ ํ•˜๋‚˜์˜ ์†Œํ”„ํŠธ์›จ์–ด ๊ตฌ์ถ• ์‚ฌ์—… ์ •๋„๋กœ ์—ฌ๊ธด๋‹ค.

ํ˜„์‹ค์€ ํ›จ์”ฌ ๋ƒ‰์ •ํ•˜๋‹ค. ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋Š” ์‚ฌ๊ณ ๋ฐฉ์‹์ด๋‹ค. ๊ฐ€์ •์„ ๋ฒ„๋ฆฌ๊ณ  ๋Š์ž„์—†์ด ๊ฒ€์ฆํ•˜๋Š” ์ชฝ์œผ๋กœ ์ „ํ™˜ํ•˜๋Š” ๊ด€์ ์ด๋‹ค. ์ด๋Ÿฐ ์‚ฌ๊ณ ๋ฐฉ์‹์ด ์กฐ์ง ๋ฌธํ™”์— ์Šค๋ฉฐ๋“ค์–ด์•ผ ๋ณด์•ˆ์ด โ€˜ํ•ด์•ผ ํ•˜๋Š” ์ผโ€™ ์ˆ˜์ค€์„ ๋ฒ—์–ด๋‚˜ ์‹ค์ œ ์šด์˜ ๋ฐฉ์‹์œผ๋กœ ์ž๋ฆฌ ์žก๋Š”๋‹ค. ํ•˜์ง€๋งŒ ๋Œ€๋ถ€๋ถ„ ํ†ต์‹ ์‚ฌ๋Š” ์ด๋Ÿฐ ์ธ์‹ ์ „ํ™˜์— ์•„์ง ์ด๋ฅด์ง€ ๋ชปํ–ˆ๋‹ค. ํ‘œ๋ฉด์ ์ธ ์•ˆ์ „๋งŒ ๋ฏฟ๊ณ  ์žˆ๊ณ , ๊ณต๊ฒฉ์ž๋Š” ์ด๋Ÿฐ ํ—ˆ์ ์„ ์ •๊ตํ•˜๊ฒŒ ํŒŒ๊ณ ๋“ ๋‹ค.

ํ”ผํ•ด๊ฐ€ ์—ฐ๊ฒฐ๋˜๋Š” IT์™€ OT

์š”์ฆ˜ OT(์šด์˜๊ธฐ์ˆ ) ํ™˜๊ฒฝ์„ ๋…ธ๋ฆฌ๋Š” ๊ณต๊ฒฉ์€ ๋Œ€๋ถ€๋ถ„ IT ํ™˜๊ฒฝ์—์„œ ์ถœ๋ฐœํ•œ๋‹ค. ๊ณต๊ฒฉ์ž๊ฐ€ ๊ด€๋ฆฌ์ž ๊ณ„์ •์„ ํƒˆ์ทจํ•˜๊ฑฐ๋‚˜ ํ—ˆ์ˆ ํ•œ ์ธํ„ฐํŽ˜์ด์Šค๋ฅผ ์ฐพ์œผ๋ฉด, ๋„คํŠธ์›Œํฌ ์žฅ๋น„๋‚˜ ๊ธฐ์ง€๊ตญ ์ปจํŠธ๋กค๋Ÿฌ ๊ฐ™์€ ํ•ต์‹ฌ ์„ค๋น„ ์ชฝ์œผ๋กœ ๋ฐ”๋กœ ์ด๋™ํ•  ์ˆ˜ ์žˆ๋‹ค.

IT์™€ OT์˜ ๊ฐ„๊ทน์„ ์ค„์ด๋Š” ํ•ด๋ฒ•์€ ์กฐ์ง๋„๋ฅผ ๋ฐ”๊พธ๋Š” ์ผ์ด ์•„๋‹ˆ๋‹ค. ๋ชจ๋“  ๊ฒƒ์„ ํ•œ๋ˆˆ์— ๋ณด๊ณ , ๋‹จ์ผํ•œ ๊ทœ์น™ ์ง‘ํ•ฉ์œผ๋กœ ๋‹ค๋ฃจ๋Š” ์ผ์ด๋‹ค. ์ ‘๊ทผ ๊ถŒํ•œ ์ •์ฑ…์„ ๊ณต์œ ํ•˜๊ณ  ํŒจ์น˜ ์šฐ์„ ์ˆœ์œ„๋ฅผ ๋ช…ํ™•ํžˆ ์ •ํ•˜๊ณ , ์œ„ํ˜‘ ํƒ์ง€๋ฅผ ํ†ตํ•ฉํ•ด์•ผ ํ•œ๋‹ค. ์ด๋Ÿฐ ์š”์†Œ๊ฐ€ ํ•˜๋‚˜๋กœ ๋งž๋ฌผ๋ ค ๋Œ์•„๊ฐˆ ๋•Œ ๋น„๋กœ์†Œ ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๊ฐ€ ํ˜„์‹ค์ ์ธ ๋ณด์•ˆ ๋ชจ๋ธ๋กœ ๊ตฌํ˜„๋œ๋‹ค.

์ง„์งœ ์  : ์ง‘์š”ํ•จ๊ณผ ์ธ๋‚ด์‹ฌ

ํ†ต์‹  ์‚ฌ์—…์ž๋Š” ์ด์ œ ๊ฐœ์ธ ํ•ด์ปค๋‚˜ ๋žœ์„ฌ์›จ์–ด ๋ฒ”์ฃ„์กฐ์ง๋งŒ ์ƒ๋Œ€ํ•˜์ง€ ์•Š๋Š”๋‹ค. ์˜ค๋Š˜๋‚  ๊ฐ€์žฅ ํฐ ์œ„ํ˜‘์€ ์ถฉ๋ถ„ํ•œ ์ž๊ธˆ๊ณผ ์ธ๋ ฅ์„ ๊ฐ–์ถ˜ ์ง‘์š”ํ•œ ๊ณต๊ฒฉ ๊ทธ๋ฃน์ด๋‹ค. ๊ตญ๊ฐ€ ์ฐจ์›์˜ ๊ณต๊ฒฉ ์กฐ์ง์ด ๋ณด์ด์ง€ ์•Š๊ฒŒ ์ž ๋ณตํ•˜๋Š” ๋ฐฉ์‹์ด๋‹ค. ์†”ํŠธ ํƒ€์ดํ‘ผ(Salt Typhoon)๊ณผ ๊ฐ™์€ ๊ณต๊ฒฉ ์‚ฌ๋ก€๋Š” ์ด๋Ÿฐ ๊ทธ๋ฃน์ด ํ†ต์‹ ๋ง ์•ˆ์— ๋ช‡ ๋‹ฌ์”ฉ ๋จธ๋ฌด๋ฅด๋ฉฐ ๋ฏผ๊ฐํ•œ ๋ฐ์ดํ„ฐ๋ฅผ ๋นผ๋‚ด๊ณ , ๊ทธ ๊ฒฐ๊ณผ๊ฐ€ ์‹ค์ œ ์ง€์ •ํ•™์  ์œ„ํ—˜์œผ๋กœ ์ด์–ด์งˆ ์ˆ˜ ์žˆ์Œ์„ ๋ณด์—ฌ์คฌ๋‹ค.

๋ฏธ๊ตญ ์‚ฌ์ด๋ฒ„๋ณด์•ˆยท์ธํ”„๋ผ๋ณด์•ˆ๊ตญ(CISA)์€ 2021๋…„ ์ดํ›„ ์ „ ์„ธ๊ณ„ ํ†ต์‹  ์‚ฌ์—…์ž๋ฅผ ์นจํˆฌํ•œ ๊ณต๊ฒฉ ์‚ฌ๋ก€์™€ ๊ด€๋ จํ•ด ๋ณผํŠธ ํƒ€์ดํ‘ผ(Volt Typhoon)์„ ํฌํ•จํ•œ ์ค‘๊ตญ ์—ฐ๊ณ„ ๊ทธ๋ฃน์˜ ์œ„ํ—˜์„ ๊ณต์‹ ๊ฒฝ๊ณ ํ–ˆ๋‹ค.

์—†๋Š” ์‹ ๋ขฐ๋ฅผ ์ƒˆ๋กœ ์Œ“๋Š” ๋ฐฉ๋ฒ•

์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋Š” ๋‹จ์ˆœํ•œ ๊ธฐ์ˆ  ์—…๊ทธ๋ ˆ์ด๋“œ๊ฐ€ ์•„๋‹ˆ๋ผ ์Šต๊ด€์˜ ๋ฌธ์ œ๋‹ค. ๊ทธ ์ค‘์—์„œ๋„ ์„ธ ๊ฐ€์ง€ ์Šต๊ด€์ด ํ•ต์‹ฌ์ด๋‹ค. ํ•ญ์ƒ ๊ฒ€์ฆํ•˜๊ณ , ํ•„์š”ํ•œ ๋งŒํผ๋งŒ ๊ถŒํ•œ์„ ์ฃผ๊ณ , ๋ฌธ์ œ๊ฐ€ ํผ์ง€์ง€ ๋ชปํ•˜๊ฒŒ ๋ง‰๋Š” ์ผ์ด๋‹ค.

  • ํ•ญ์ƒ ๊ฒ€์ฆํ•˜๊ธฐ. ๋กœ๊ทธ์ธ ์ ˆ์ฐจ๊ฐ€ ๊ฒ€์ฆ์˜ ๋์ด ์•„๋‹ˆ๋‹ค. ์‚ฌ๋žŒ, ๊ธฐ๊ธฐ, ์‹œ์Šคํ…œ ๋ชจ๋‘์— ๋Œ€ํ•ด ์ ‘์† ์œ„์น˜, ์ˆ˜ํ–‰ํ•˜๋Š” ์ž‘์—…, ํ‰์†Œ์™€ ๋‹ค๋ฅธ ์ ์ด ์žˆ๋Š”์ง€ ๊ณ„์† ์‚ดํŽด์•ผ ํ•œ๋‹ค.
  • ์ตœ์†Œ ๊ถŒํ•œ ๋ถ€์—ฌ. ์‚ฌ๋žŒ์ด๋‚˜ ์‹œ์Šคํ…œ์ด ๊ฐ€์งˆ ์ˆ˜ ์žˆ๋Š” ๊ถŒํ•œ์„ ์ตœ์†Œํ™”ํ• ์ˆ˜๋ก ๋ฌธ์ œ๊ฐ€ ์ƒ๊ฒผ์„ ๋•Œ ํ”ผํ•ด ๋ฒ”์œ„๊ฐ€ ์ค„์–ด๋“ ๋‹ค. ๊ถŒํ•œ๋งŒ ์ž˜ ์ฃ„์–ด๋„ ๋ณ„๋„์˜ ํ™”๋ คํ•œ ์‹ ๊ทœ ๋„๊ตฌ ์—†์ด๋„ ์œ„ํ—˜์„ ํฌ๊ฒŒ ๋‚ฎ์ถœ ์ˆ˜ ์žˆ๋‹ค.
  • ๋„คํŠธ์›Œํฌ ๋ถ„๋ฆฌ. ๋ฌธ์ œ ํ™•์‚ฐ์„ ์ฐจ๋‹จํ•˜๋Š” ์ผ์ด๋‹ค. ๋„คํŠธ์›Œํฌ๋ฅผ ์ž‘๊ณ  ๊ณ ๋ฆฝ๋œ ์˜์—ญ์œผ๋กœ ์ž˜๊ฒŒ ๋‚˜๋ˆ„๋Š” ๋งˆ์ดํฌ๋กœ ์„ธ๊ทธ๋จผํŠธ ๊ตฌ์กฐ๋ฅผ ๋งŒ๋“ ๋‹ค. ์ด๋ ‡๊ฒŒ ๋ถ„๋ฆฌ๋œ ๋„คํŠธ์›Œํฌ์—์„œ๋Š” ์นจํ•ด ์‚ฌ๊ณ ๊ฐ€ ๋ฐœ์ƒํ•ด๋„ ํ”ผํ•ด๋ฅผ ์ตœ์†Œํ™”ํ•  ์ˆ˜ ์žˆ๋‹ค.

์™ธ๋ฉดํ•˜๊ธฐ ์–ด๋ ค์šด ์กด์žฌ, ๋ ˆ๊ฑฐ์‹œ ๊ธฐ์ˆ 

์†”์งํžˆ ๋งํ•ด ๋ ˆ๊ฑฐ์‹œ ์ธํ”„๋ผ๋Š” ์‚ฌ๋ผ์ง€์ง€ ์•Š๋Š”๋‹ค. ์ˆ˜์‹ญ ๋…„ ์ „์— ๊ตฌ์ถ•ํ•œ ๋„คํŠธ์›Œํฌ ํ•˜๋“œ์›จ์–ด๊ฐ€ ์ง€๊ธˆ๋„ ํ†ต์‹ ๋ง์„ ์ง€ํƒฑํ•œ๋‹ค. ๋‹น์‹œ ์žฅ๋น„๋Š” 24์‹œ๊ฐ„ ๊ฐ€๋™๊ณผ ๋‚ด๋ถ€ ์ž๋™ ์‹ ๋ขฐ๋ฅผ ์ „์ œ๋กœ ์„ค๊ณ„๋๋‹ค. ์ „๋ถ€ ์ƒˆ ์žฅ๋น„๋กœ ๊ต์ฒดํ•˜๋Š” ์ผ์€ ์œ„ํ—˜ ๋ถ€๋‹ด์ด ํฌ๊ณ  ๋น„์šฉ๋„ ๋ง‰๋Œ€ํ•˜๋‹ค. ๊ทธ๋Œ€๋กœ ๋‘๋Š” ์„ ํƒ์ง€๊ฐ€ ์กฐ๊ธˆ ๋” ์œ„ํ—˜ํ•  ๋ฟ์ด๋‹ค.

ํ˜„์‹ค์ ์ธ ํ•ด๋ฒ•์€ ๊ธฐ์กด ์‹œ์Šคํ…œ์„ ํ˜„๋Œ€์ ์ธ โ€˜๋ณด์•ˆ ์…ธโ€™๋กœ ๊ฐ์‹ธ๋Š” ์ผ์ด๋‹ค. ๋ณด์•ˆ ๊ฒŒ์ดํŠธ์›จ์ด, ์ค‘์•™์ง‘์ค‘ํ˜• ์ธ์ฆ, ์„ธ์…˜ ๋ชจ๋‹ˆํ„ฐ๋ง ๊ฐ™์€ ๊ณ„์ธต์„ ๋ง์”Œ์šฐ๋Š” ๋ฐฉ์‹์ด๋‹ค. ์ด๋Ÿฐ ๊ณ„์ธต์„ ์ถ”๊ฐ€ํ•˜๋ฉด ๋Œ€๊ทœ๋ชจ ๊ต์ฒด๋กœ ์ธํ•œ ์„œ๋น„์Šค ์ค‘๋‹จ ์œ„ํ—˜ ์—†์ด๋„ ์ง€๊ธˆ ๋‹น์žฅ ๋ณด์•ˆ ์ˆ˜์ค€์„ ๋Œ์–ด์˜ฌ๋ฆด ์ˆ˜ ์žˆ๋‹ค.

์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ์˜ ๋ชฉํ‘œ๋Š” ์™„๋ฒฝํ•œ ์ด์ƒํ–ฅ์„ ์ข‡๋Š” ์ผ์ด ์•„๋‹ˆ๋‹ค. ์ „์ฒด ๋ณด์•ˆ ์ˆ˜์ค€์„ ํ•œ ๋‹จ๊ณ„์”ฉ ๋Œ์–ด์˜ฌ๋ฆฌ๋Š” ๊ณผ์ •์ด๋‹ค. ๋งค ์—ฐ๊ฒฐ์„ ๊ฒ€์ฆํ•˜๊ณ , ํ•˜๋‚˜์”ฉ ์›Œํฌ๋กœ๋“œ๋ฅผ ๋ถ„๋ฆฌํ•  ๋•Œ๋งˆ๋‹ค ๋„คํŠธ์›Œํฌ๋Š” ์กฐ๊ธˆ์”ฉ ๋” ๋‹จ๋‹จํ•ด์ง„๋‹ค.

๊ตญ๊ฒฝ์„ ๋„˜๋‚˜๋“œ๋Š” ์‹ค์งˆ์  ์ปดํ”Œ๋ผ์ด์–ธ์Šค

์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋Š” ๊ธฐ์กด ์ปดํ”Œ๋ผ์ด์–ธ์Šค ๊ทœ์ •์„ ๋ฌด์‹œํ•˜๋Š” ๊ฐœ๋…์ด ์•„๋‹ˆ๋‹ค. ๊ทธ๋Ÿฐ ๊ทœ์ •์„ ํ† ๋Œ€๋กœ ์Œ“์•„ ์˜ฌ๋ฆฌ๋Š” ์ „๋žต์ด๋‹ค. ISO 27001, ๋ฏธ๊ตญ ๊ตญ๋ฆฝํ‘œ์ค€๊ธฐ์ˆ ์—ฐ๊ตฌ์†Œ์˜ ์‚ฌ์ด๋ฒ„๋ณด์•ˆ ํ”„๋ ˆ์ž„์›Œํฌ(NIST Cybersecurity Framework), ์œ ๋Ÿฝ์—ฐํ•ฉ์˜ NIS2 ์ง€์นจ(EU NIS2 Directive), ๊ฐ๊ตญ ํ†ต์‹  ๊ทœ์ œ ๋“ฑ ์–ด๋–ค ๊ทœ์ œ๋ฅผ ์ ์šฉํ•˜๋”๋ผ๋„ ํ•ต์‹ฌ์€ ๊ฐ™๋‹ค. ์œ„ํ—˜์„ ๊ณ„์† ์ ๊ฒ€ํ•˜๊ณ , ๋ˆ„๊ฐ€ ๋“ค์–ด์˜ค๋Š”์ง€ ํ†ต์ œํ•˜๊ณ , ๊ด€๋ฆฌ ์ƒํƒœ๋ฅผ ์ฆ๋ช…ํ•˜๋Š” ์ผ์ด๋‹ค.

์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ ๊ด€์ ์„ ์ด๋Ÿฐ ํ”„๋ ˆ์ž„์›Œํฌ์— ๋…น์—ฌ ๋„ฃ์œผ๋ฉด ์ปดํ”Œ๋ผ์ด์–ธ์Šค๋Š” ๊ณจ์นซ๊ฑฐ๋ฆฌ๊ฐ€ ๋˜์ง€ ์•Š๋Š”๋‹ค. ๋‹จ์ˆœํžˆ ์š”๊ฑด์„ ์ฑ„์šฐ๋Š” ์ž‘์—…์ด ์•„๋‹ˆ๋ผ ์ผ์ƒ์ ์ธ ๋ณด์•ˆ ํ™œ๋™์˜ ์ผ๋ถ€๊ฐ€ ๋œ๋‹ค. ์œ„ํ˜‘ ์–‘์ƒ์ด ๋ฐ”๋€Œ๋ฉด ๋ณดํ˜ธ ์ฒด๊ณ„๋„ ํ•จ๊ป˜ ๋ฐ”๋€๋‹ค. ๋„คํŠธ์›Œํฌ๊ฐ€ ์–ด๋””์— ์œ„์น˜ํ•˜๋“  ์ ๊ฒ€์„ ๋ฐ›๊ธฐ์— ์ถฉ๋ถ„ํ•œ ์ค€๋น„ ์ƒํƒœ๋ฅผ ์œ ์ง€ํ•  ์ˆ˜ ์žˆ๋‹ค.

์„ฑ๊ณผ๊ฐ€ ๋ณด์ด๋Š” ์ „ํ™˜ : ์ฒซ 180์ผ ๋™์•ˆ ํ™•์ธํ•  6๊ฐ€์ง€ KPI

๊ฒฝ์˜์ง„์€ ๋ง‰์—ฐํ•œ ์•ฝ์†์ด ์•„๋‹ˆ๋ผ ์ฆ๊ฑฐ๋ฅผ ์›ํ•œ๋‹ค. ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋ฅผ ๋„์ž…ํ•ด ์ฒ˜์Œ 6๊ฐœ์›” ๋™์•ˆ ์‹ค์ œ๋กœ ์‚ดํŽด๋ด์•ผ ํ•  ์ง€ํ‘œ๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™๋‹ค.

  • ํ•„์š” ์ด์ƒ์œผ๋กœ ๋‚จ์•„ ์žˆ๋˜ ๊ณ ๊ธ‰ ๊ถŒํ•œ ๊ณ„์ • ์ˆ˜๊ฐ€ ์ค„์–ด๋“ ๋‹ค.
  • ์ด์ƒ ์ง•ํ›„๋ฅผ ํฌ์ฐฉํ•˜๋Š” ์†๋„๊ฐ€ ๋นจ๋ผ์ง„๋‹ค.
  • ์ ‘๊ทผ ์Šน์ธ ์ ˆ์ฐจ๊ฐ€ ์ง€์—ฐ๋˜์ง€ ์•Š๊ณ , ๊ฑฐ๋ฒ„๋„Œ์Šค๊ฐ€ ๋น„์ฆˆ๋‹ˆ์Šค ์†๋„์— ๋งž์ถฐ ์›€์ง์ธ๋‹ค.
  • ๋” ๋งŽ์€ ์—”๋“œํฌ์ธํŠธ์™€ ์›Œํฌ๋กœ๋“œ๊ฐ€ ๋ชจ๋‹ˆํ„ฐ๋ง ๋Œ€์ƒ์— ์˜ฌ๋ผ๊ฐ„๋‹ค.
  • ๋„คํŠธ์›Œํฌ ๋‚ด๋ถ€๋ฅผ ๋ชฐ๋ž˜ ๋Œ์•„๋‹ค๋‹ˆ๋Š” ์นจ์ž… ํ–‰์œ„๊ฐ€ ์ค„์–ด๋“ ๋‹ค.
  • IT์™€ OT ํŒ€์ด ๊ณต๋™ ๋Œ€์‘ ํ›ˆ๋ จ์„ ์‹ค์ œ๋กœ ์ˆ˜ํ–‰ํ•œ๋‹ค.

์ด๋“ค ์ง€ํ‘œ๋Š” ๋ณด์—ฌ์ฃผ๊ธฐ์šฉ ์ˆ˜์น˜๊ฐ€ ์•„๋‹ˆ๋‹ค. ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๊ฐ€ ์œ ํ–‰์–ด๋ฅผ ๋„˜์–ด ์‹ค์ œ๋กœ ํšจ๊ณผ๋ฅผ ๋‚ด๊ณ  ์žˆ์Œ์„ ์ฆ๋ช…ํ•˜๋Š” ์ง€ํ‘œ๋‹ค. ์ดํ›„ ์ „๋žต์„ ๊ณ„์† ๊ณ ๋„ํ™”ํ•  ์ˆ˜ ์žˆ๋Š” ๊ธฐ๋ฐ˜์ด ๋œ๋‹ค.

์œ ํ–‰์–ด์—์„œ ๊ธฐ๋ณธ ์›์น™์œผ๋กœ

์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋Š” ๋” ์ด์ƒ ๋ง๋ฟ์ธ ๊ฐœ๋…์ด ์•„๋‹ˆ๋‹ค. ๋„คํŠธ์›Œํฌ ๋ณด์•ˆ ์ˆ˜์ค€์„ ํ‰๊ฐ€ํ•˜๋Š” ๊ธฐ์ค€์œผ๋กœ ์ž๋ฆฌ ์žก์•˜๋‹ค. ํ†ต์‹  ์‚ฐ์—…์—์„œ ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ ๋„์ž…์€ ์ด๋ฏธ์ง€ ๊ด€๋ฆฌ๊ฐ€ ์•„๋‹ˆ๋ผ ์ƒ์กด ์ „๋žต์ด๋‹ค.

์‹œ์žฅ์กฐ์‚ฌ๊ธฐ๊ด€ ๊ฐ€ํŠธ๋„ˆ๋Š” 2027๋…„๊นŒ์ง€ ๊ธฐ์—…์˜ 70%๊ฐ€ ๋ณด์•ˆ ์ „๋žต ์ˆ˜๋ฆฝ์„ ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ ๊ด€์ ์—์„œ ์‹œ์ž‘ํ•  ๊ฒƒ์œผ๋กœ ์ „๋งํ•œ๋‹ค. ํ˜„์žฌ ์ˆ˜์น˜๋Š” 20%์—๋„ ๋ชป ๋ฏธ์นœ๋‹ค.

์—ฌ์ „ํžˆ ๋‚ก์€ ๊ฒฝ๊ณ„ ๋ฐฉ์–ด์— ๋งค๋‹ฌ๋ฆฌ๋ฉด ๊ณผ๊ฑฐ ์ „์Ÿ์„ ์น˜๋ฅด๋Š” ์…ˆ์ด๋‹ค. ์„ ๋„ ์‚ฌ์—…์ž๋Š” ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋ฅผ ์—ฌ์ •์œผ๋กœ ๋ฐ›์•„๋“ค์ด๊ณ  ์žˆ๋‹ค. ์ด ๊ธฐ์—…์ด ์•ž์œผ๋กœ ๋ชจ๋‘๊ฐ€ ์˜์กดํ•˜๊ฒŒ ๋  ํ†ต์‹  ๋„คํŠธ์›Œํฌ๋ฅผ ์ฐจ๊ทผ์ฐจ๊ทผ ๊ตฌ์ถ•ํ•˜๊ณ  ์žˆ๋‹ค.
dl-ciokorea@foundryco.com

Why trust is the new currency in the agentic era โ€” and what itโ€™s worth

The World Economic Forum calls trust โ€œthe new currencyโ€ in the agentic AI era and thatโ€™s not just a metaphor: An increase of 10 percentage points in trust directly translates to 0.5% GDP growth. But hereโ€™s what makes trust as a currency fundamentally different from any thatโ€™s come before: you canโ€™t borrow it, you canโ€™t buy it and you canโ€™t simply mint more.

When it comes to AI, trust used to mean one thing โ€” accuracy. Does the model predict correctly? Then we started asking harder questions about bias, transparency and whether we could explain the AIโ€™s reasoning. Agentic AI changes the equation entirely. When a system doesnโ€™t just analyze or recommend, but actually takes action, trust shifts from โ€œDo I believe this answer?โ€ to โ€œAm I still in full control of what this system does?โ€

In the agentic era, trust must evolve from ensuring accurate results to building systems that can ensure continuous control and reliability of AI agents. As a result, trust is now the foundational architecture that separates organizations capable of deploying autonomous agents from those perpetually managing the consequences of systems they cannot safely control. My question for enterprise leaders is: Are you building that infrastructure now or will you spend next several years explaining why you didnโ€™t?

The growing trust deficit

The numbers tell a story of eroding confidence at precisely the moment when trust matters most. According to Stanford Universityโ€™s Institute for Human-Centered Artificial Intelligence, globally, as AI-related incidents surged 56.4%, confidence that AI companies protect personal data fell from 50% in 2023 to 47% in 2024.

This isnโ€™t just a perception problem. One out of six enterprise security breaches now involves AI, yet 97% of affected companies lacked proper access controls. By 2028, Gartner estimates a quarter of enterprise breaches will trace to AI agent abuse.

Hereโ€™s the paradox: while 79% of companies have already adopted AI agents and another 15% are exploring possibilities, according to PwC, most companies have no AI-specific controls in place. In short, as companies rush to adopt agentic AI, weโ€™re witnessing a fundamental readiness gap between vulnerabilities and defenses. Trust is eroding faster than companies can catch up.

The economics of trust infrastructure

Ironically, AI will also be your best defense, whether itโ€™s against AI-amplified attacks by external parties or against AI agents behaving maliciously. An IBM report found that โ€œorganizations using AI and automation extensively throughout their security operations saved an averageย $1.9 millionย in breach costs and reduced the breach lifecycle by an average of 80 days.โ€ Leveraging AI to enhance security delivers both monetary and efficiency ROI, with breaches solved an average of 80 days faster than non-automated operations. Thatโ€™s not hypothetical risk management but measurable competitive advantage, especially because it enables use cases that competitors canโ€™t risk deploying.

Traditional security was built on static trust: verify identity at the gate, then assume good behavior inside the walls. Agentic AI demands we go further. Unlike traditional applications, AI agents adapt autonomously, modify their own behavior and operate at machine speed across enterprise systems; this means yesterdayโ€™s trusted agent could potentially be todayโ€™s compromised threat that immediately reverts to normal behavior to evade detection.

Trust cannot be established and maintained just at the perimeter; our focus must shift to inside the walls as well. Securing these dynamic actors requires treating them less like software and more like a workforce, with continuous identity verification, behavioral monitoring and adaptive governance frameworks.

Successful trust architecture rests on three foundational pillars, each addressing distinct operational requirements while integrating into a cohesive security posture.

Pillar 1: Verifiable identity

Every AI agent requires cryptographic identity verification comparable to employee credentials. Industry leaders recognize this imperative: Microsoft developed Entra Agent ID for agent authentication, while Oktaโ€™s acquisition of Axiom and Palo Alto Networksโ€™ $25 billion CyberArk purchase signal market recognition that agent identity management is critical.

Organizations must register agents in configuration management databases with the same rigor applied to employee vetting and physical infrastructure, establishing clear accountability for every autonomous actor operating within enterprise boundaries.

Pillar 2: Comprehensive visibility and continuous monitoring

Traditional security tools monitor network perimeters and user behavior but lack mechanisms to detect anomalous agent activity. Effective trust infrastructure requires purpose-built observability platforms capable of tracking API call patterns, execution frequencies and behavioral deviations in real time.

Gartner predicts guardian agents, which are AI systems specifically designed to monitor other AI systems, will capture 10% to 15% of the agentic AI market by 2030, underscoring the necessity of layered oversight mechanisms.

Pillar 3: Governance as executable architecture

Effective governance transforms policies from static documents into executable specifications that define autonomy boundaries, such as which actions agents can execute independently, which operations require human approval and which capabilities remain permanently restricted. Organizations with mature responsible AI frameworks achieve 42% efficiency gains, according to McKinsey, demonstrating that governance enables innovation rather than constraining it โ€” provided the governance operates as an architectural principle rather than a compliance afterthought.

Research from ServiceNow and Oxford Economicsโ€™ AI Maturity Index reveals that pacesetter organizations that are achieving measurable AI benefits have established cross-functional governance councils with genuine executive authority, not technical committees relegated to advisory roles.

In sum, trust infrastructure isnโ€™t defensive. Itโ€™s the prerequisite for deploying AI agents in high-value workflows where competitive advantage actually resides, separating organizations capable of strategic deployment from those perpetually constrained by risks they cannot adequately manage.

The 2027 divide

Gartner predicts 40% of agentic AI projects will be canceled by 2027, citing inadequate risk controls as a main factor. By then, there will be a clear divide between organizations that can safely deploy ambitious agentic use cases and those that cannot afford to. The former will have built trust as infrastructure; the latter will be retrofitting security onto systems already deployed and discovering problems through costly incidents.

Trust canโ€™t be borrowed from consultants or bought from vendors. Unlike traditional currencies that flow freely, trust in the age of agentic AI must be earned through verifiable governance, transparent operations and systems designed with security as a core principle, not an afterthought. As the gap between those who have it and those who donโ€™t widens, the architectural decisions you make today will determine which side of the divide youโ€™re on.

This article is published as part of the Foundry Expert Contributor Network.
Want to join?

The Death of Legacy MFA and What Must Rise in Its Place

Tycoon 2FA proves that the old promises of โ€œstrong MFAโ€ came with fine print all along: when an attacker sits invisibly in the middle, your codes, pushes, and one-time passwords become their codes, pushes, and one-time passwords too. Tycoon 2FA: Industrial-Scale Phishing Comes of Age Tycoon 2FA delivers a phishing-as-a-service kit that hands even modestly..

The post The Death of Legacy MFA and What Must Rise in Its Place appeared first on Security Boulevard.

8 Things to Avoid In Azure Active Directory

By: tribe47

Organizations that donโ€™t put in the extra effort needed to secure their Azure Active Directory leave themselves vulnerable and open to data leaks, unauthorized data access, and cyberattacks targeting their infrastructure.

Cybercriminals can decrypt user passwords and compromise administrator accounts by hacking into Azure AD Connect, the service that synchronizes Azure AD with Windows AD servers. Once inside the system, the attackers can exfiltrate and encrypt an organizationโ€™s most sensitive data.

Azure AD users often overlook crucial steps, such as implementing multi-factor authentication for all users joining the Active Directory with a device. Failure to require MFA makes it easier for an attacker to join a malicious device to an organization using the credentials of a compromised account.

Increased security risk isnโ€™t the only consequence of a poorly set up AD. Misconfigurations can cause process bottlenecks leading to poor performance. The following guide was created by CQUREโ€™s cybersecurity expert โ€“ Michael Graffneter specialized in securing Azure Active Directory, to help you detect and remedy some of the most common Azure AD misconfiguration mistakes.

8 Things to Avoid In Azure Active Directory

ย 

1. Production Tenants Used for Tests

During security assessments, we often see production tenants being used by developers for testing their โ€œHello Worldโ€ apps. We recommend that companies have standalone tenants for testing new apps and settings. Needless to say, the amount of PII accessible through such tenants should be minimized.

2. Overpopulated Global Admins

User accounts that are assigned the Global Adminโ€™s role have unlimited control over your Azure AD tenant and in many cases also over your on-prem AD forest. Consider using less privileged roles to delegate permissions. As an example, security auditors should be fine with the Security Reader or Global Reader role.

3. Not Enforcing MFA

Company administrators tend to create โ€œtemporaryโ€ MFA exclusions for selected accounts and then forget about them, making them permanent. And due to misconfigurations, trusted IP address ranges sometimes include guest WiFi networks. Even with the free tier of Azure AD, one can use Security defaults to enable multi-factor authentication for all users. And users assigned the Global Administrator role can be configured to use multi-factor authentication at all times.

4. Overprivileged Applications

Many applications registered in Azure AD are assigned much stronger privileges than they actually require. It is also not obvious that app owners can impersonate their applications, which sometimes leads to privilege escalation. Registered applications and service principals should be regularly audited, as they can be used by malicious actors as persistent backdoors to the tenant.

5. Fire-and-Forget Approach to Configuration

Azure AD is constantly evolving and new security features are introduced regularly. But many of these newly added features need to be enabled and configured before they can be used, including the super-cool passwordless authentication methods. Azure AD deployment should therefore not be considered a one-time operation but rather a continuous process.

6. Insecure Azure AD Connect Servers

Azure AD Connect servers are used to synchronize Azure AD with on-premises AD, for which they need permissions to perform modifications in both environments. This fact is well-known to hackers, who might misuse AAD Connect to compromise the entire organization. These servers should therefore be considered Tier 0 resources and only Domain Admins should have administrative rights on them.

7. Lack of Monitoring

Even with an Azure AD Premium plan, user activity logs are only stored for 30 days. Is this default behavior really enough for your organization? Luckily, custom retention policies can be configured when Azure AD logs are forwarded to the Azure Log Analytics service, to the Unified Audit Log feature of Microsoft 365, or to 3rd-party SIEM solutions. And components like Azure AD Identity Protection or Azure Sentinel can automatically detect anomalies in user activity.

8. Default Settings

Not all default settings provide the highest security possible. Users can register 3rd party applications in Azure AD, passwordless authentication methods are disabled and ADFS endpoints with NTLM authentication that bypasses the Extranet Smart Lockout feature are published on proxies. These and other settings should be reviewed during Azure AD deployment and adjusted to fit organizational security policies.

Azure AD is a critical attack surface that needs continuous monitoring for misconfigurations. We hope this guide makes managing the security of your AD easier by helping you to detect and resolve vulnerabilities.

The post 8 Things to Avoid In Azure Active Directory appeared first on CQURE Academy.

Astrix Security emerges from stealth to help organizations spot rogue third-party apps

Astrix Security, an Israeli cybersecurity startup that provides access management for third-party app integrations, has emerged from stealth with $15 million in funding. The startup was co-founded in 2021 by CEO Alon Jackson and CTO Idan Gour, both former members of Israelโ€™s famed intelligence division Unit 8200, to help organizations monitor and control the complex [โ€ฆ]

What Is the Biggest Challenge Facing Endpoint Security? Hint: Itโ€™s Not Malware

The need to achieve responsible enterprise security has taken center stage in enterprise IT management in recent years, precipitated by a deluge of public data breaches that damaged company reputations. However, lacking information on the most critical modern attack vectors, many organizations continue to rely solely on traditional virus scanning tools as their sole method of enabling endpoint security.

Many business professionals seem to cling to a common misconception that the implementation of a malware protection tool provides blanket protection against all potential security risks. The broad availability of free scanning tools and Windowโ€™s native Defender software has lulled individuals who are not particularly risk-conscious into a false sense of security when it comes to protecting their IT resources.

To be clear, it is certainly true that scanning and remediation tools for malware โ€” including viruses, Trojans, ransomware and adware โ€” continue to be critical components of any security arsenal. According to Enterprise Management Associates (EMA) research, 73 percent of surveyed organizations indicated they have been affected by a malware attack, and only 58 percent reported a high level of confidence that they can detect a malware incident before it causes a business-impacting event.

These challenges are only accelerating due to a new generation of advanced malware attacks that are designed to target specific environments or conditions and are more resistant to removal or cleanup. However, it is important to recognize that these threats represent only a portion of the total risks posed by the use of endpoint devices in modern business environments.

Learn more about endpoint security and mobile threat defense

Modern Endpoint Security Attack Vectors

Beyond the threat of malware infection, the broad reliance on distributed endpoint devices โ€” including desktops, laptops, tablets, smartphones and wearables โ€” poses a number of challenges to enterprise security assuredness. In traditional environments, endpoint devices (primarily desktops) and the applications and data they utilized were kept contained on controlled business networks.

Today, however, critical business IT services are distributed across numerous public and private cloud, web, and server-hosting environments. Additionally, the โ€œmobile revolution,โ€ which began a decade ago, introduced more portable endpoint devices, allowing users to access business IT services from any location at any time. The consequence of these foundational changes to IT service delivery is that there is no longer a secure perimeter within which business devices, applications and data can be protected. Instead, all IT services must be considered continuously at risk.

Unfortunately, many bad actors are far ahead of the curve in figuring out how to exploit a world of interconnected and poorly secured software and devices. Cryptojacking is a prime example of this. It occurred to some resourceful individuals that it would be much cheaper and easier to secretly leverage the processing power of millions of end-user devices by embedding code in common websites to perform free cryptocurrency mining activities, rather than to purchase and manage a dedicated server farm for this purpose.

As a result, the performance of business devices and, by extension, the productivity of business workers are being diminished to line the pockets of clandestine entrepreneurs. Additionally, the eminent portability of the most commonly used endpoint devices (tablets and smartphones) further reduces their inherent security. EMA research indicated that one out of every eight mobile devices and one out of every 20 laptops containing business data ends up lost or stolen.

These are only two examples of rapidly evolving endpoint security challenges that plague enterprise operations teams, and this trend is expected to accelerate with cyberterrorists leveraging the power of intelligence technologies such as machine learning to identify new weaknesses they can exploit.

The Biggest Threat to Endpoint Security

EMA recently noted that the most frequent consequence of a security breach is not a malware infection, but compromised business data. We live in an age when information is a commodity that can be bought and sold through both legal markets and shadowy outlets. The latter, of course, is the greater concern with critical data โ€” such as user access credentials, Social Security numbers, bank account information and other sensitive information โ€” regularly being auctioned on the dark web. Cyberattacks are no longer designed just to be a nuisance; they are the cornerstone of a high revenue-generating industry.

There are three principal methods through which data is compromised on an endpoint:

  1. The first is through the use of invasive software, such as hidden code in applications and websites that collect and distribute data to remote systems without the knowledge of the users.
  2. The second involves manipulating users into unwittingly granting nefarious actorsโ€™ access to devices and IT resources. This is most frequently accomplished with the use of phishing schemes that employ psychological inventiveness rather than technological proficiency.
  3. The final method for compromising data on endpoint devices occurs when the user distributes the information themselves in an unsecure manner.

A Responsible Approach to Endpoint Security

Antivirus and other malware protection solutions can certainly help protect endpoint devices from related attacks, but they do very little natively to prevent data loss from other attack vectors. To responsibly ensure endpoint devices can securely perform business tasks, organizations must adopt a multifaceted approach to security that continuously monitors for inappropriate device activities and effectively controls access to enterprise data and resources.

To enable holistic visibility, configuration, status and contextual information should be collected on devices, processes and network activities. Intelligence technologies, such as analytics, language processing and machine learning, should be applied to collected details so that any potential security risks can be rapidly identified, and policy-based automated responses can be immediately implemented.

Of course, enterprise data is not a risk at all if it is never removed from secured locations in the first place. This can be accomplished with the use of resource isolation technologies, such as containerization, app wrapping, virtualization and browser isolation solutions. Data access and distribution controls are also enhanced with the introduction of strong identity and access management (IAM) capabilities. IAM platforms that are risk-based and governed by policy controls provide a strong first line of defense in any security implementation, particularly if they holistically leverage device information collected by endpoint and security management tools, as well as common intelligence technologies to accurately determine the level of risk associated with allowing an access event to occur.

Unified endpoint management (UEM) solutions designed to support all endpoints across an entire IT ecosystem offer the optimal platform from which to manage a diverse range of security processes. Comprehensive UEM solutions centrally support capabilities for data collection, reporting and alarming, data analysis, and automated response that are the hallmark of a responsible endpoint security approach. Solutions in this field are greatly advantaged if they can extend their security management capabilities through direct integrations with related platforms or by enabling integrations with the use of an API.

Effective endpoint security management requires a broad spectrum of key functionality that goes far beyond just malware detection, but with the right resources in place, organizations can ensure the secure utilization of enterprise IT services without unnecessarily limiting workforce productivity.

Discover new approaches to endpoint security

The post What Is the Biggest Challenge Facing Endpoint Security? Hint: Itโ€™s Not Malware appeared first on Security Intelligence.

โŒ