โŒ

Reading view

There are new articles available, click to refresh the page.

Four things AWS needs to fix at re:Invent this week

The mood among Amazon Web Services customers is shifting from curiosity to urgency as the company prepares to once again to โ€œre:Inventโ€ itself at its annual customer conference this week.

After a year in which Microsoft and Google tightened their narratives around unified data, AI platforms and workflow-ready agents, AWS can no longer rely on its scale, breadth, or incremental roadmap to maintain the confidence of CIOs.

Instead, say analysts, the hyperscaler must address four key concerns at re:Invent in Las Vegas this week if it wants to retain its position as the default enterprise cloud.

Closing the integration gaps between analytics, data, and AI

Although AWS is ahead in raw capability and breadth of services, say analysts, it is falling behind in its integration and unification of data, analytics, machine learning, and AI.

โ€œIt lags behind rivals on simplicity and integration,โ€ said Phil Fersht, CEO of HFS Research. โ€œCustomers want fewer hops between analytics, machine learning, and generative AI. They want unified governance and a consistent metadata layer so agents can reason across systems,โ€ he said.

Microsoft, at its Ignite customer event last month, beefed up its unified data and analytics platform, Fabric IQ, with new semantic intelligence capabilities. AWS, too, has been trying its hand at unifying its AI and analytics services with the launch of SageMaker Unified Studio last year but has yet to reach the level of simplicity that Microsoftโ€™s IQ offerings promise.

When it comes to new AI analytics services from AWS, CIOs can expect more of the same, said David Linthicum, independent consultant and retired chief cloud strategy officer at Deloitte Consulting. โ€œRealistically, they can expect AWS to keep integrating its existing services; the key test will be whether this shows up as less complexity and faster time-to-insight, not just new service names,โ€

Lack of cohesion in AI platform strategy

That complexity isnโ€™t confined to analytics alone. The same lack of cohesion is now spilling over into AWSโ€™s AI platform strategy, where the cloud giant risks ceding mindshare despite its compute advantage.

โ€œSageMaker is still respected, but it no longer dominates the AI platform conversation. Open source frameworks like Ray, MLflow, and KubeRay are rapidly capturing developer mindshare because they offer flexibility and avoid lock in,โ€ Fersht said.

This fragmentation is exactly what partners want AWS to fix by offering clearer, more opinionated MLOps paths, deeper integration between Bedrock and SageMaker, and ready-to-use patterns that help enterprises progress from building models to deploying real agents at scale.

More plug-and-play, less build-it-yourself

AWSโ€™s tooling shortcomings donโ€™t end there, said Fersht. The hyperscalerโ€™s focus on providing the parts for agentic AI and leaving others to build with them make it harder for business users to consume its services.

โ€œAWS is giving strong primitives, but competitors are shipping business-ready agents that sit closer to workflows and outcomes. Enterprises want both power and simplicity,โ€ Fersht said.

Although thereโ€™s an assumption that enterprises are big enough to build things themselves, they want more plug-and-play than AWS imagines, Fersht said: โ€œThey do not want to engineer everything from scratch. They want reusable agent blueprints that map to sales, service, IT operations, and supply chain tasks.โ€

In fact, if AWS wants to compete with rivals to become the default agent platform for enterprises, it must hide complexity behind higher-level abstractions and simplify its agent stack, double down on workflow level agents, and give customers clear guidance on safe deployment, accountability, and ROI, he said.

Vibe coding disarray

Like other hyperscalers, AWS is aggressively experimenting in the vibe coding and agentic IDE space, where thereโ€™s no clear consensus on what developers actually want, according to Fersht.

โ€œEveryone is experimenting because no one has cracked the next generation developer workflow. AWS is no different,โ€ he said, adding that in some respects AWS has been more conservative than its rivals.

AWS is sure to be dealing some new innovations at AWS re:Invent in Las Vegas this week, but despite defining the cloud computing industry in 2006, it now finds itself, in many respects, playing catch-up.

์Šค๋…ธ์šฐํ”Œ๋ ˆ์ดํฌ, ์…€๋ ‰ํŠธ์Šคํƒ€ ์ธ์ˆ˜ยทยทยทAI์˜ ๋ฐ์ดํ„ฐ ์ดํ•ด๋„ ๋†’์ธ๋‹ค

์Šค๋…ธ์šฐํ”Œ๋ ˆ์ดํฌ๊ฐ€ ์ƒŒํ”„๋ž€์‹œ์Šค์ฝ” ๊ธฐ๋ฐ˜ ์Šคํƒ€ํŠธ์—… ์…€๋ ‰ํŠธ์Šคํƒ€(Select Star)์™€ ์ปจํ…์ŠคํŠธ ๋ฉ”ํƒ€๋ฐ์ดํ„ฐ ํ”Œ๋žซํผ์„ ์ธ์ˆ˜ํ•˜๊ธฐ ์œ„ํ•œ ์ตœ์ข… ๊ณ„์•ฝ์„ ์ฒด๊ฒฐํ–ˆ๋‹ค๊ณ  ๋ฐํ˜”๋‹ค. ์ด๋ฒˆ ์ธ์ˆ˜๋Š” ํ˜ธ๋ผ์ด์ฆŒ ์นดํƒˆ๋กœ๊ทธ๋ฅผ ๊ฐ•ํ™”ํ•˜๊ธฐ ์œ„ํ•œ ์กฐ์น˜๋กœ, ์ด๋Š” ์Šค๋…ธ์šฐํ”Œ๋ ˆ์ดํฌ ๋ฐ์ดํ„ฐ ํด๋ผ์šฐ๋“œ ๋‚ด์—์„œ ๋ฐ์ดํ„ฐ ๊ฒ€์ƒ‰, ๊ด€๋ฆฌ, ๊ฑฐ๋ฒ„๋„Œ์Šค๋ฅผ ํ†ตํ•ฉ ์ œ๊ณตํ•˜๋Š” ์ œํ’ˆ๊ตฐ์ด๋‹ค.

์Šค๋…ธ์šฐํ”Œ๋ ˆ์ดํฌ ํ˜ธ๋ผ์ด์ฆŒ๊ณผ ๋ฐ์ดํ„ฐ๋ธŒ๋ฆญ์Šค ์œ ๋‹ˆํ‹ฐ ๊ฐ™์€ ๋ฐ์ดํ„ฐ ๋ฐ ๊ฑฐ๋ฒ„๋„Œ์Šค ์นดํƒˆ๋กœ๊ทธ๋Š” ์—ฌ๋Ÿฌ ํด๋ผ์šฐ๋“œ์™€ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์— ํฉ์–ด์ง„ ๋ฐ์ดํ„ฐ๋ฅผ ํ•˜๋‚˜์˜ ์ œ์–ด ์ง€์ ์—์„œ ๊ด€๋ฆฌํ•  ์ˆ˜ ์žˆ์–ด ๊ธฐ์—… ์‚ฌ์ด์—์„œ ๋น ๋ฅด๊ฒŒ ์ฃผ๋ชฉ๋ฐ›๊ณ  ์žˆ๋‹ค.

์นดํƒˆ๋กœ๊ทธ๋Š” ๊ธฐ์—… ์ „์ฒด ๋ฐ์ดํ„ฐ ์ž์‚ฐ์— ๋Œ€ํ•œ ํ†ตํ•ฉ๋œ ์ปจํ…์ŠคํŠธ ๋ทฐ๋ฅผ ๋ณด์—ฌ์ฃผ๋Š” ๊ธฐ๋Šฅ๋„ ์ œ๊ณตํ•œ๋‹ค. ์ด๋Š” AI ๊ธฐ๋ฐ˜ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜๊ณผ ์—์ด์ „ํŠธ๋ฅผ ๊ฐœ๋ฐœํ•˜๋ ค๋Š” ๊ธฐ์—…์—๊ฒŒ ์ ์  ํ•„์ˆ˜ ์š”๊ฑด์ด ๋˜๊ณ  ์žˆ๋‹ค. ์•ˆ์ •์ ์œผ๋กœ ์ž‘๋™ํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š” ์ •์ œ๋˜๊ณ  ๋ฌธ์„œํ™”๊ฐ€ ์ž˜ ๋ผ ์žˆ์œผ๋ฉฐ ์ถ”์  ๊ฐ€๋Šฅํ•œ ์ž…๋ ฅ๊ฐ’์ด ํ•„์š”ํ•˜๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค.

์Šค๋…ธ์šฐํ”Œ๋ ˆ์ดํฌ๋Š” ์…€๋ ‰ํŠธ์Šคํƒ€์˜ ์ปจํ…์ŠคํŠธ ๋ฉ”ํƒ€๋ฐ์ดํ„ฐ ํ”Œ๋žซํผ์„ ํ™œ์šฉํ•ด ํ˜ธ๋ผ์ด์ฆŒ์˜ ๋ฐ์ดํ„ฐ ์ ‘๊ทผ ์—ญ๋Ÿ‰์„ ํ™•์žฅํ•˜๊ณ , ์‚ฌ์šฉ์ž๊ฐ€ AI ๊ธฐ๋ฐ˜ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜๊ณผ ์—์ด์ „ํŠธ๋ฅผ ๊ตฌ์ถ•ํ•  ๋•Œ ๋ฐ์ดํ„ฐ๋ฅผ ์ปจํ…์ŠคํŠธํ™”ํ•  ์ˆ˜ ์žˆ๋Š” ์„ ํƒ์ง€๋ฅผ ๋„“ํž ๊ณ„ํš์ด๋‹ค.

์…€๋ ‰ํŠธ์Šคํƒ€๋Š” ์ด๋ฏธ ํฌ์ŠคํŠธ๊ทธ๋ ˆSQL(PostgreSQL)๊ณผ ๋งˆ์ดSQL(MySQL) ๊ฐ™์€ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค๋Š” ๋ฌผ๋ก , ํƒœ๋ธ”๋กœ(Tableau), ํŒŒ์›ŒBI ๊ฐ™์€ BI ๋„๊ตฌ, ๊ทธ๋ฆฌ๊ณ  dbt์™€ ์—์–ดํ”Œ๋กœ์šฐ ๊ฐ™์€ ๋ฐ์ดํ„ฐ ํŒŒ์ดํ”„๋ผ์ธยท์˜ค์ผ€์ŠคํŠธ๋ ˆ์ด์…˜ ๋„๊ตฌ์™€ ์—ฐ๋™๋ผ ์žˆ๋‹ค.

๊ธฐ์—…์˜ โ€˜AI ๋„ค์ดํ‹ฐ๋ธŒโ€™ ๊ธฐ๋ฐ˜์„ ๋‘˜๋Ÿฌ์‹ผ ์ฃผ๋„๊ถŒ ๊ฒฝ์Ÿ

AI ๊ธฐ๋ฐ˜ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜๊ณผ ์—์ด์ „ํŠธ์˜ ์ˆ˜์š”๊ฐ€ ๊ธ‰์ฆํ•˜๋Š” ๊ฐ€์šด๋ฐ, ํ˜ธ๋ผ์ด์ฆŒ ๊ธฐ๋Šฅ ํ™•๋Œ€๋Š” ์Šค๋…ธ์šฐํ”Œ๋ ˆ์ดํฌ๊ฐ€ ๋ฐ์ดํ„ฐ ๋ฐ ์• ๋„๋ฆฌํ‹ฑ์Šค ์›Œํฌ๋กœ๋“œ์—์„œ ์ฃผ๋„๊ถŒ์„ ์„ ์ ํ•˜๋ ค๋Š” ์ „๋žต๊ณผ ๋งž๋ฌผ๋ ค ์žˆ๋‹ค.

HFS ๋ฆฌ์„œ์น˜ CEO ํ•„ ํผ์ŠคํŠธ๋Š” โ€œAI ์›Œํฌ๋กœ๋“œ ๊ฒฝ์Ÿ์€ ์ €์žฅ ๊ณต๊ฐ„์ด ์•„๋‹ˆ๋ผ ๋ฉ”ํƒ€๋ฐ์ดํ„ฐ, ๊ณ„๋ณด, ์‹ ๋ขฐ์„ฑ์—์„œ ์Šน๋ถ€๊ฐ€ ๋‚œ๋‹ค. ํ˜ธ๋ผ์ด์ฆŒ ์นดํƒˆ๋กœ๊ทธ๋Š” ํƒ„ํƒ„ํ•œ ๊ธฐ๋ฐ˜์„ ๊ฐ–์ถ”๊ณ  ์žˆ์ง€๋งŒ, ์Šค๋…ธ์šฐํ”Œ๋ ˆ์ดํฌ๊ฐ€ ์•„์ง ๊ฐ–์ถ”์ง€ ๋ชปํ•œ ์ž๋™ ๊ฒ€์ƒ‰, ์ปฌ๋Ÿผ ๋‹จ์œ„ ๊ณ„๋ณด, ์‚ฌ์šฉ๋Ÿ‰ ์ธํ…”๋ฆฌ์ „์Šค, ๊ทธ๋ฆฌ๊ณ  ๋ฐ์ดํ„ฐ ๋ถ„์„๊ฐ€์˜ ๋ฐ˜๋ณต ์ž‘์—…์„ ์ค„์—ฌ์ฃผ๋Š” ์‚ฌ์šฉ์ž ๊ฒฝํ—˜์„ ์…€๋ ‰ํŠธ์Šคํƒ€๊ฐ€ ์ œ๊ณตํ•œ๋‹คโ€๋ผ๊ณ  ๋ถ„์„ํ–ˆ๋‹ค.

ํผ์ŠคํŠธ๋Š” โ€œํ”Œ๋žซํผ์— ๋‹จ์ˆœํžˆ ์ถ”๊ฐ€ํ•˜๋Š” ๊ฒƒ์ด ์•„๋‹ˆ๋ผ ๊นŠ์ด ํ†ตํ•ฉ๋œ ํ˜•ํƒœ์˜ ํ’€ ์Šคํƒ ๋ฉ”ํƒ€๋ฐ์ดํ„ฐ ์ธํ…”๋ฆฌ์ „์Šค๋ฅผ ์ œ๊ณตํ•˜๋Š” ์—ญ๋Ÿ‰์€ ์‹œ์žฅ์— ๋ถ„๋ช…ํ•œ ๊ณต๋ฐฑ์ด ์žˆ๋‹ค. ๋ฐ์ดํ„ฐ๋ธŒ๋ฆญ์Šค๋Š” ์œ ๋‹ˆํ‹ฐ ์นดํƒˆ๋กœ๊ทธ๋ฅผ ํ†ตํ•ด ๊ฑฐ๋ฒ„๋„Œ์Šค์™€ ๊ณ„๋ณด ์ธก๋ฉด์—์„œ ๊ฒฉ์ฐจ๋ฅผ ๊ณ„์† ๋ฒŒ๋ฆฌ๊ณ  ์žˆ๋‹ค. ์Šค๋…ธ์šฐํ”Œ๋ ˆ์ดํฌ๋Š” ์ด๋ฅผ ๋น ๋ฅด๊ฒŒ ๋”ฐ๋ผ์žก์•„์•ผ ํ•œ๋‹ค๋Š” ์ ์„ ์ž˜ ์•Œ๊ณ  ์žˆ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค. ์ด์–ด ํผ์ŠคํŠธ๋Š” ์ด๋Ÿฌํ•œ ์—ญ๋Ÿ‰ ํ™•๋ณด๋ฅผ ์œ„ํ•œ ๋น„์œ ๊ธฐ์  ์ „๋žต์ด ์Šค๋…ธ์šฐํ”Œ๋ ˆ์ดํฌ ์ž…์žฅ์—์„œ ๋” ํšจ๊ณผ์ ์ผ ์ˆ˜ ์žˆ๋‹ค๊ณ  ์ง„๋‹จํ–ˆ๋‹ค.

ISG ์†Œํ”„ํŠธ์›จ์–ด ๋ฆฌ์„œ์น˜ ์ „๋ฌด ๋ฐ์ด๋น„๋“œ ๋ฉ”๋‹๊ฑฐ๋Š” ์Šค๋…ธ์šฐํ”Œ๋ ˆ์ดํฌ๊ฐ€ AI ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ์œ„ํ•œ ๋ฐ์ดํ„ฐ ๋ถ„์„ ์›Œํฌ๋กœ๋“œ ์‹œ์žฅ ์ฃผ๋„๊ถŒ์„ ๋‘๊ณ  ๊ตฌ๊ธ€, AWS, ๋งˆ์ดํฌ๋กœ์†Œํ”„ํŠธ(MS) ๋“ฑ ์ฃผ์š” ํด๋ผ์šฐ ์—…์ฒด์™€ ๊ฒฝ์Ÿํ•˜๊ณ  ์žˆ๋‹ค๊ณ  ์–ธ๊ธ‰ํ–ˆ๋‹ค.

๋ฉ”๋‹๊ฑฐ๋Š” โ€œAI๋Š” ์ง€๊ธˆ ์‹œ์žฅ์—์„œ ๊ฐ€์žฅ ํฐ ํ™”๋‘์ด๋ฉฐ, ์ „์ ์œผ๋กœ ๋ฐ์ดํ„ฐ์— ์˜์กดํ•œ๋‹ค. ์šฐ๋ฆฌ ์กฐ์‚ฌ์—์„œ๋„ ๊ธฐ์—…์ด AI์— ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๋Š” ํ˜•ํƒœ๋กœ ๋ฐ์ดํ„ฐ๋ฅผ ์ค€๋น„ํ•˜๋Š” ๊ณผ์ •์„ ๊ฐ€์žฅ ์–ด๋ ค์›Œํ•˜๋Š” ๊ฒƒ์œผ๋กœ ๋‚˜ํƒ€๋‚ฌ๋‹คโ€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

๊ทธ๊ฐ€ ์–ธ๊ธ‰ํ•œ ์‹œ์žฅ ๊ฒฝ์Ÿ์˜ ๊ฐ•๋„๋Š” ์Šค๋…ธ์šฐํ”Œ๋ ˆ์ดํฌ๊ฐ€ ์˜ฌํ•ด ์ถ”์ง„ํ•œ ์ธ์ˆ˜ ์‚ฌ๋ก€์—์„œ๋„ ๋‚˜ํƒ€๋‚œ๋‹ค. ์ง€๋‚œ 6์›” ์Šค๋…ธ์šฐํ”Œ๋ ˆ์ดํฌ๋Š” ๋ฏธ๊ตญ์˜ ํด๋ผ์šฐ๋“œ ๊ธฐ๋ฐ˜ ํฌ์ŠคํŠธ๊ทธ๋ ˆSQL ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ๊ธฐ์—… ํฌ๋Ÿฐ์น˜๋ฐ์ดํ„ฐ(Crunch Data) ์ธ์ˆ˜ ์˜ํ–ฅ์„ ๋ฐœํ‘œํ–ˆ๋‹ค. ์Šค๋…ธ์šฐํ”Œ๋ ˆ์ดํฌ๋Š” AI ๋ฐ์ดํ„ฐ ํด๋ผ์šฐ๋“œ์—์„œ โ€˜์Šค๋…ธ์šฐํ”Œ๋ ˆ์ดํฌ ํฌ์ŠคํŠธ๊ทธ๋ ˆ์Šคโ€™๋กœ ๋ถˆ๋ฆด ํฌ์ŠคํŠธ๊ทธ๋ ˆSQL ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค๋ฅผ ์ œ๊ณตํ•˜๊ณ , ๊ฐœ๋ฐœ์ž๊ฐ€ AI ๊ธฐ๋ฐ˜ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ๋ณด๋‹ค ์‰ฝ๊ฒŒ ๊ตฌ์ถ•ํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์›ํ•œ๋‹ค๋Š” ๋ชฉํ‘œ๋ฅผ ์ œ์‹œํ–ˆ๋‹ค.

์ธ์ˆ˜ ๋ฐœํ‘œ ์‹œ์ ๋งŒ ๋ณด๋ฉด, ์Šค๋…ธ์šฐํ”Œ๋ ˆ์ดํฌ๊ฐ€ ๋ฐ์ดํ„ฐ๋ธŒ๋ฆญ์Šค์˜ ์˜คํ”ˆ์†Œ์Šค ์„œ๋ฒ„๋ฆฌ์Šค ํฌ์ŠคํŠธ๊ทธ๋ ˆ์Šค ๊ธฐ์—… ๋„ค์˜จ(Neon) ์ธ์ˆ˜์— ๋Œ€์‘ํ•œ ๊ฒƒ์œผ๋กœ ๋ณด์ผ ์ˆ˜ ์žˆ๋‹ค. ๋ถ„์„๊ฐ€๋“ค์€ ๋‘ ๊ธฐ์—…์ด ๋ถ„์„, ์šด์˜ํ˜• ์Šคํ† ๋ฆฌ์ง€, ๋จธ์‹ ๋Ÿฌ๋‹์„ ์•„์šฐ๋ฅด๋Š” โ€˜AI ๋„ค์ดํ‹ฐ๋ธŒ ๋ฐ์ดํ„ฐ ๊ธฐ๋ฐ˜โ€™์˜ ์„ ๋‘ ์ž๋ฆฌ๋ฅผ ์ฐจ์ง€ํ•˜๊ธฐ ์œ„ํ•ด ๊ฒฝ์Ÿํ•˜๊ณ  ์žˆ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

๋˜ํ•œ ์ด๋‹ฌ ์ดˆ ์Šค๋…ธ์šฐํ”Œ๋ ˆ์ดํฌ๋Š” ๋ฐ์ดํ† ๋ฉ”ํŠธ๋ฆฌ(Datometry)๋ฅผ ์ธ์ˆ˜ํ–ˆ๋‹ค. ์Šค๋…ธ์šฐํ”Œ๋ ˆ์ดํฌ๋Š” ์ด๋ฅผ ํ†ตํ•ด ๊ธฐ์กด์— ๋ฌด๋ฃŒ๋กœ ์ œ๊ณตํ•ด ์˜จ ๋งˆ์ด๊ทธ๋ ˆ์ด์…˜ ๋„๊ตฌ ์„ธํŠธ ๊ฐ€์šด๋ฐ ํ•˜๋‚˜์ธ โ€˜์Šค๋…ธ์šฐ์ปจ๋ฒ„ํŠธ AIโ€™๋ฅผ ๊ฐ•ํ™”ํ•˜๋ฉฐ, ๊ธฐ์กด ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ์›Œํฌ๋กœ๋“œ๋ฅผ ํด๋ผ์šฐ๋“œ๋กœ ์ด์ „ํ•˜๋ ค๋Š” ๊ธฐ์—…์„ ๋Œ€์ƒ์œผ๋กœ ๋Œ€๊ทœ๋ชจ ์ฝ”๋“œ ์žฌ์ž‘์„ฑ ๊ณผ์ •์—์„œ ๋ฐœ์ƒํ•˜๋Š” ๋ถ€๋‹ด, ๋น„์šฉ, ๋ถˆํ™•์‹ค์„ฑ์„ ์ตœ์†Œํ™”ํ•˜๊ฒ ๋‹ค๊ณ  ๋ฐํ˜”๋‹ค.
dl-ciokorea@foundryco.com

Donโ€™t Use a Ruler to Measure Wind Speed: Establishing a Standard for Competitive Solutions Testing

Competitive testing is a business-critical function for financial institutions seeking the ideal solutions provider to help optimize their risk management strategies. Donโ€™t get seduced by inflated test results or flowery marketing claims, however. Selecting the right risk solutions could be one of the most important tasks your business ever undertakes โ€“ and one of the..

The post Donโ€™t Use a Ruler to Measure Wind Speed: Establishing a Standard for Competitive Solutions Testing appeared first on Security Boulevard.

์›์ธ ๋ชจ๋ฅด๋ฉด ๋ณด์•ˆ ์นจํ•ด ๋ฐ˜๋ณต๋œ๋‹คยทยทยท์กฐ์ง ํšŒ๋ณต๋ ฅ ํ”๋“œ๋Š” โ€˜๋ถ„์„ ๋ถ€์žฌโ€™

๋Œ€๋ถ€๋ถ„์˜ ๋ณด์•ˆ ์กฐ์ง์—์„œ๋Š” ์‚ฌ๊ณ  ์ดํ›„ ๋ถ„์„์ด ์—ฌ์ „ํžˆ ์ค‘์š”ํ•œ ๊ณผ์ œ๋กœ ๋‚จ์•„ ์žˆ๋‹ค. ํŒŒ์šด๋“œ๋ฆฌ์˜ โ€˜๋ณด์•ˆ ์šฐ์„ ์ˆœ์œ„(Security Priorities)โ€™ ์กฐ์‚ฌ์— ๋”ฐ๋ฅด๋ฉด, ๋ณด์•ˆ ๋ฆฌ๋”์˜ 57%๊ฐ€ ์ง€๋‚œ 1๋…„ ๋™์•ˆ ๋ฐœ์ƒํ•œ ๋ณด์•ˆ ์‚ฌ๊ณ ์˜ ๊ทผ๋ณธ ์›์ธ์„ ํŒŒ์•…ํ•˜๋Š” ๋ฐ ์–ด๋ ค์›€์„ ๊ฒช์—ˆ๋‹ค๊ณ  ๋‹ตํ–ˆ์œผ๋ฉฐ, ์ด๋Š” ์žฌ์นจํ•ด ์œ„ํ—˜์„ ๋”์šฑ ๋†’์ด๋Š” ์š”์ธ์œผ๋กœ ๋‚˜ํƒ€๋‚ฌ๋‹ค.

๋ณด์•ˆ ์ „๋ฌธ๊ฐ€๋“ค์€ ์‚ฌ๊ณ  ๋ฐœ์ƒ ์ดํ›„ ์ฆ‰๊ฐ์ ์ธ ์ง„ํ™”์™€ ๋ณต๊ตฌ ์••๋ฐ•์ด ์ปค์ง€๋ฉด์„œ, ํ•™์Šต๊ณผ ๋ถ„์„์— ํˆฌ์ž…๋˜๋Š” ์ž์›์ด ๋ถ€์กฑํ•ด์ง€๋Š” ๊ฒƒ์ด ๋ฌธ์ œ์˜ ํ•ต์‹ฌ์ด๋ผ๊ณ  ์ง„๋‹จํ–ˆ๋‹ค. ๋ฐ˜๋ณต ์นจํ•ด ๊ฐ€๋Šฅ์„ฑ์„ ๋‚ฎ์ถ”๊ธฐ ์œ„ํ•ด์„œ๋Š” ์‚ฌ๊ณ  ๋Œ€์‘์„ ๋‹จ์ˆœํ•œ ์ผํšŒ์„ฑ ์ •๋ฆฌ ์ž‘์—…์ด ์•„๋‹ˆ๋ผ ์ง€์†์ ์ธ ํ•™์Šต ์ฃผ๊ธฐ๋กœ ์šด์˜ํ•ด์•ผ ํ•œ๋‹ค๋Š” ์„ค๋ช…์ด๋‹ค.

๊ด€๋ฆฌํ˜• ๋ณด์•ˆ ๋Œ€์‘ ๊ธฐ์—… ํ—ŒํŠธ๋ฆฌ์Šค(Huntress)์˜ ๋ณด์•ˆ ์šด์˜ ์ด๊ด„ ๋“œ๋ ˆ์ด ์•„๊ฐ€๋Š” โ€œ๋งŽ์€ ์กฐ์ง์ด ์ฆ‰๊ฐ์ ์ธ ์นจํ•ด ์ฐจ๋‹จ์—๋งŒ ์ง‘์ค‘ํ•˜๊ณ  ์žˆ๋‹ค. ์ด ๋•Œ๋ฌธ์— ์ •์ž‘ ํ•ต์‹ฌ์ ์ธ ํฌ๋ Œ์‹ ์กฐ์‚ฌ๊ฐ€ ๋’ท์ „์œผ๋กœ ๋ฐ€๋ฆฌ๊ณ , ๊ฒฐ๊ตญ ๋‹ค์Œ ๊ณต๊ฒฉ์ž๊ฐ€ ๊ทธ๋Œ€๋กœ ๋‹ค์‹œ ๋“ค์–ด์˜ฌ ์ˆ˜ ์žˆ๋Š” ์ƒํ™ฉ์„ ๋งŒ๋“ค๊ณ  ์žˆ๋‹คโ€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

์•„๊ฐ€๋Š” โ€œ๊ทผ๋ณธ ์›์ธ์„ ์ •ํ™•ํžˆ ์งš์–ด๋‚ด๋Š” ์ฒ ์ €ํ•œ ์‚ฌํ›„ ๋ถ„์„์ด ์ด๋ค„์ง€์ง€ ์•Š์œผ๋ฉด ์กฐ์ง์€ ์‚ฌ์‹ค์ƒ ๋ˆˆ์„ ๊ฐ€๋ฆฐ ์ฑ„ ๋ฐฉ์–ดํ•˜๋Š” ์…ˆ์ด๋ฉฐ, ๊ฐ™์€ ์‹ค์ˆ˜๋ฅผ ๋ฐ˜๋ณตํ•˜๊ฒŒ ๋œ๋‹คโ€๋ผ๊ณ  ์ง€์ ํ–ˆ๋‹ค.

๊ทผ๋ณธ ์›์ธ ๋ถ„์„์„ ํ†ตํ•œ ํšŒ๋ณต๋ ฅ ๊ฐ•ํ™”

์ „๋ฌธ๊ฐ€๋“ค์€ ๋งŽ์€ ๊ธฐ์—…์ด ์‚ฌ๊ณ  ๋Œ€์‘์„ ๋ถ„์„์ด ์•„๋‹Œ ์šด์˜ ์ค‘์‹ฌ์˜ ์ ˆ์ฐจ๋กœ๋งŒ ์ทจ๊ธ‰ํ•˜๊ณ  ์žˆ๋‹ค๊ณ  ์ง€์ ํ•œ๋‹ค. ์ด ๋•Œ๋ฌธ์— ์นจํ•ด ์ฐจ๋‹จ๊ณผ ๋ณต๊ตฌ ๊ฐ™์€ ์ ˆ์ฐจ๋Š” ์ถฉ๋ถ„ํžˆ ๋ฐ˜๋ณต ์—ฐ์Šต๋ผ ์žˆ์ง€๋งŒ, ์‹ฌ์ธต ํฌ๋ Œ์‹ ์กฐ์‚ฌ๋‚˜ ์‚ฌ๊ณ  ์ดํ›„์˜ ํ•™์Šต์€ ๋’ค์ฒ˜์ง€๊ณ  ์žˆ๋‹ค.

๊ด€๋ฆฌํ˜• ๋ณด์•ˆ ์„œ๋น„์Šค ๊ธฐ์—… ๋ธ”๋ฃจ๋ณด์ด์–ธํŠธ(BlueVoyant)์˜ ๋””์ง€ํ„ธ ํฌ๋ Œ์‹ยท์‚ฌ๊ณ  ๋Œ€์‘ ๋””๋ ‰ํ„ฐ ํ†ฐ ๋ฌด์–ด๋Š” โ€œ์ฆ๊ฑฐ ๋ณด์กด๊ณผ ๊ทผ๋ณธ ์›์ธ ๋ถ„์„์ด ์ฒด๊ณ„์ ์œผ๋กœ ์ด๋ค„์ง€์ง€ ์•Š์œผ๋ฉด ์ค‘์š”ํ•œ ํ†ต์ฐฐ์ด ์‚ฌ๋ผ์ง€๊ฒŒ ๋œ๋‹ค. ๊ฒฌ๊ณ ํ•œ ์‚ฌ๊ณ  ๋Œ€์‘์€ ๋‹จ์ˆœํžˆ ์‹œ์Šคํ…œ์„ ๋‹ค์‹œ ๊ฐ€๋™ํ•˜๋Š” ๋ฐ ๊ทธ์น˜์ง€ ์•Š๋Š”๋‹ค. ์‚ฌ๊ณ ๋กœ๋ถ€ํ„ฐ ์–ป์€ ๊ตํ›ˆ์„ ํƒ์ง€ยท์˜ˆ๋ฐฉยท์œ„ํ—˜ ๊ฐ์†Œ ์ „๋žต์— ๋ฐ˜์˜ํ•˜๋Š” ๊ณผ์ •๊นŒ์ง€ ํฌํ•จํ•ด์•ผ ํ•œ๋‹คโ€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

๋ฌด์–ด๋Š” ๋˜ํ•œ โ€œ์ด ๊ฐ™์ด ์ง€์†์ ์œผ๋กœ ํ•™์Šต ๋ฐ ๊ฐœ์„ ํ•˜๋Š” ์ˆœํ™˜ ๊ตฌ์กฐ๊ฐ€ ์žฅ๊ธฐ์ ์ธ ํšŒ๋ณต๋ ฅ์„ ๊ฐ•ํ™”ํ•œ๋‹ค. ๋น ๋ฅด๊ฒŒ ๋ณ€ํ™”ํ•˜๊ณ  ์ ์‘ํ•˜๋Š” ์‚ฌ์ด๋ฒ„ ์œ„ํ˜‘ ํ™˜๊ฒฝ์—์„œ๋Š” ๊ทธ ๊ฐ€์น˜๊ฐ€ ๋”์šฑ ์ปค์ง„๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ ๊ธฐ์—… ์…ˆํŽ˜๋ฆฌ์Šค(Semperis)์˜ ์œ„๊ธฐ๊ด€๋ฆฌ ์ˆ˜์„ ์ปจ์„คํ„ดํŠธ ๋งˆ๋ฆฌ ํ•˜๊ทธ๋ ˆ์ด๋ธŒ์Šค๋„ โ€œ๋Œ€๋‹ค์ˆ˜ ์กฐ์ง์€ โ€˜๋ถˆ๊ธธ์—์„œ ๋ฌด์—‡์„ ๋ฐฐ์šธ์ง€โ€™๋ณด๋‹ค โ€˜๋ˆˆ์•ž์˜ ๋ถˆ์„ ๋„๋Š” ๋ฐโ€™ ๋” ์ง‘์ค‘ํ•˜๊ณ  ์žˆ๋‹คโ€๋ผ๊ณ  ํ‰๊ฐ€ํ–ˆ๋‹ค.

๊ทธ๋Š” ๋ชจ๋“  ์œ„๊ธฐ๊ฐ€ ๊ฐ์ง€, ๋Œ€์‘, ๊ฒ€ํ† ๋ผ๋Š” 3๋‹จ๊ณ„๋กœ ๊ตฌ์„ฑ๋œ๋‹ค๊ณ  ์–ธ๊ธ‰ํ•˜๋ฉฐ, โ€œํšŒ๋ณต๋ ฅ์ด ๊ตฌ์ถ•๋˜๋Š” ์ง€์ ์€ 3๋ฒˆ์งธ ๋‹จ๊ณ„์ธ ์‚ฌํ›„ ๊ฒ€ํ†  ๊ณผ์ •์ด๋‹ค. ์‹ค์‹œ๊ฐ„ ๋ฐ์ดํ„ฐ๋ฅผ ์ˆ˜์ง‘ํ•˜๊ณ  ์ด๋ฅผ ๋ฉด๋ฐ€ํžˆ ๋ถ„์„ํ•ด, ๋„์ถœ๋œ ๊ตํ›ˆ์„ ์‹ค์ œ ์กฐ์น˜๋กœ ์—ฐ๊ฒฐํ•˜๋Š” ์กฐ์ง์€ ๋” ๋น ๋ฅด๊ฒŒ ํšŒ๋ณตํ•˜๊ณ  ๋” ๊ฐ•ํ•ด์ง„๋‹ค. ์‚ฌ๊ณ  ๋Œ€์‘์€ ๋‹จ์ˆœํžˆ ์‚ด์•„๋‚จ๋Š” ๊ฒƒ์ด ์•„๋‹ˆ๋ผ, ๋ณ€ํ™”์— ์ ์‘ํ•˜๋ฉฐ ํšŒ๋ณต๋ ฅ์„ ์Œ“๋Š” ๊ณผ์ •โ€์ด๋ผ๊ณ  ์กฐ์–ธํ–ˆ๋‹ค.

๊ณต๊ฒฉ ๊ฒฝ๋กœ ์ถ”์ 

์ถฉ๋ถ„ํ•œ ์‚ฌ์ „ ๋Œ€๋น„๊ฐ€ ํ•„์ˆ˜์ด๊ธฐ ๋•Œ๋ฌธ์—, ๊ธฐ์—…์€ SIEM(๋ณด์•ˆ ์‚ฌ๊ณ  ๋ฐ ์ด๋ฒคํŠธ ๊ด€๋ฆฌ) ๊ฐ™์€ ๊ธฐ์ˆ ์„ ํ†ตํ•ด ๋””์ง€ํ„ธ ํฌ๋ Œ์‹์— ํ•„์š”ํ•œ ์ „์šฉ ๋„๊ตฌ์™€ ์—ญ๋Ÿ‰์„ ๊ฐ–์ถฐ์•ผ ํ•œ๋‹ค.

SIEM์ด ์ค‘์š”ํ•œ ์ด์œ ๋Š” ๊ฒŒ์ดํŠธ์›จ์ด์™€ VPN ์žฅ๋น„ ์ƒ๋‹น์ˆ˜๊ฐ€ ๋ช‡ ์‹œ๊ฐ„ ๋‚ด์— ์ž์ฒด ์ €์žฅ ๊ณต๊ฐ„์„ ๋ฎ์–ด์“ฐ๋„๋ก ์„ค๊ณ„๋ผ ์žˆ๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค.

ํ—ŒํŠธ๋ฆฌ์Šค์˜ ์•„๊ฐ€๋Š” โ€œ๊ณต๊ฒฉ์ž๊ฐ€ VPN์„ ํ†ตํ•ด ์นจํˆฌํ•œ ๋’ค ํ•˜๋ฃจ ์ •๋„ ๋‚ด๋ถ€์— ๋จธ๋ฌผ๋‹ค๊ฐ€ ํ•ต์‹ฌ ์„œ๋ฒ„๋กœ ์ด๋™ํ•˜๋ฉด, ๊ทธ ์‚ฌ์ด์— VPN ํ…”๋ ˆ๋ฉ”ํŠธ๋ฆฌ ์ •๋ณด๋Š” ์ด๋ฏธ ์‚ฌ๋ผ์กŒ์„ ๊ฐ€๋Šฅ์„ฑ์ด ํฌ๋‹ค. SIEM์ฒ˜๋Ÿผ VPN ๋กœ๊ทธ๋ฅผ ์ค‘์•™์—์„œ ์ˆ˜์ง‘ยท๋ณด์กดํ•˜๋Š” ์ฒด๊ณ„๋ฅผ ๋งˆ๋ จํ•˜๋ฉด ์‚ฌ๊ณ  ์ดํ›„ ํƒ์ง€๋Š” ๋ฌผ๋ก , ์ดˆ๊ธฐ ์นจํ•ด๊ฐ€ ์–ด๋–ป๊ฒŒ ๋ฐœ์ƒํ–ˆ๋Š”์ง€ ๊ทผ๋ณธ ์›์ธ์„ ๋ถ„์„ํ•˜๋Š” ๋ฐ ํ•„์š”ํ•œ ํ•ต์‹ฌ ๋ฐ์ดํ„ฐ๋ฅผ ํ™•๋ณดํ•  ์ˆ˜ ์žˆ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

ํ—ŒํŠธ๋ฆฌ์Šค์˜ ํ†ต๊ณ„์— ๋”ฐ๋ฅด๋ฉด, ์ˆ™๋ จ๋„ ๋†’์€ ์‚ฌ์ด๋ฒ„ ๋ฒ”์ฃ„์ž์˜ ์•ฝ 70%๊ฐ€ VPN์„ ํ†ตํ•ด ์นจ์ž…ํ•˜๋Š” ๊ฒƒ์œผ๋กœ ๋‚˜ํƒ€๋‚ฌ๋‹ค. ์•„๊ฐ€๋Š” โ€œSIEM์„ ๋„์ž…ํ•œ ํ™˜๊ฒฝ์—์„œ๋Š” ๊ณต๊ฒฉ ๊ฒฝ๋กœ ์ดˆ๊ธฐ์— ์œ„ํ˜‘์„ ํฌ์ฐฉํ•  ์ˆ˜ ์žˆ์„ ๋ฟ ์•„๋‹ˆ๋ผ, ์‚ฌํ›„ ๋ถ„์„์„ ํ†ตํ•ด ์นจํ•ด๋กœ ์ด์–ด์ง„ ์ •ํ™•ํ•œ ๊ทผ๋ณธ ์›์ธ์„ ๊ทœ๋ช…ํ•˜๋Š” ์ž‘์—…๋„ ๊ฐ€๋Šฅํ•˜๋‹คโ€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

๋˜ํ•œ MDR(๊ด€๋ฆฌํ˜• ํƒ์ง€ยท๋Œ€์‘), XDR(ํ™•์žฅํ˜• ํƒ์ง€ยท๋Œ€์‘) ๊ฐ™์€ ๋‹ค์–‘ํ•œ ์„œ๋น„์Šค์— ํฌ๋ Œ์‹ ์บก์ฒ˜ ์†Œํ”„ํŠธ์›จ์–ด๋ฅผ ํฌํ•จํ•  ์ˆ˜๋„ ์žˆ๋‹ค. ์ด๋Ÿฐ ๊ธฐ์ˆ ์€ ๋ฒค๋”์™€ ํฌ๋ Œ์‹ ์กฐ์‚ฌ ์ „๋ฌธ๊ฐ€๊ฐ€ ํ˜‘๋ ฅํ•ด ์นจํ•ด์˜ ์ถœ๋ฐœ์ ์„ ์‹๋ณ„ํ•˜๊ณ  ์ด๋ฅผ ํ•ด๊ฒฐํ•˜๋Š” ๋ฐ ํ•„์š”ํ•œ ๋ถ„์„๊ณผ ์กฐ์น˜๋ฅผ ์ˆ˜ํ–‰ํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์›ํ•œ๋‹ค.

์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๊ธฐ์—… ์‹œํ๋Ÿฌ์Šค ์ปค๋ฎค๋‹ˆ์ผ€์ด์…˜(Securus Communication)์˜ CTO ๋กญ ๋”๋น„์…”๋Š” โ€œ์ด๋Ÿฐ ๋„๊ตฌ๊ฐ€ ๊ฐ–์ถฐ์ ธ ์žˆ์ง€ ์•Š์œผ๋ฉด ์นจํ•ด๊ฐ€ ์–ด๋–ป๊ฒŒ ๋ฐœ์ƒํ–ˆ๋Š”์ง€ ์‚ฌํ›„์— ํŒŒ์•…ํ•˜๊ธฐ๊ฐ€ ํ›จ์”ฌ ์–ด๋ ค์›Œ์ง„๋‹ค. ์นจํ•ด๊ฐ€ ๋ฐœ์ƒํ–ˆ์„ ๋•Œ ์‚ฌ๊ณ  ๋Œ€์‘ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜๋Š” ๊ธฐ์—…๋„ ์žˆ์ง€๋งŒ, ์นจํ•ด๋ฅผ ์‹ ์†ํžˆ ์ •๋ฆฌํ•˜๊ณ  ์žฌ๋ฐœ์„ ๋ง‰๋Š” ํ•ต์‹ฌ์€ ๋Œ€์‘์„ ํ›จ์”ฌ ํšจ์œจ์ ์œผ๋กœ ์ˆ˜ํ–‰ํ•˜๋Š” ๋„๊ตฌ์™€ ์ ˆ์ฐจ๋ฅผ ๋ฏธ๋ฆฌ ๊ฐ–์ถ”๋Š” ๋ฐ ์žˆ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

์—ํด๋ ‰ํ‹ฑIQ(EclecticIQ)์˜ ์‹œ๋‹ˆ์–ด ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค ์• ๋„๋ฆฌ์ŠคํŠธ ์•„๋ฅด๋‹ค ๋ท”์œ…์นด์•ผ๋Š” โ€œ๊ทผ๋ณธ ์›์ธ ๋ถ„์„์ด ์ถฉ๋ถ„ํžˆ ์ด๋ค„์ง€์ง€ ์•Š์œผ๋ฉด ์‹ค์ œ ๊ณต๊ฒฉ ์›์ธ์ด ์—ฌ์ „ํžˆ ํŒŒ์•…๋˜์ง€ ์•Š์€ ์ƒํƒœ๋กœ ๋‚จ์•„ ์žˆ์„ ์ˆ˜ ์žˆ๊ณ , ์‹ฌ์ง€์–ด ํ™œ์„ฑ ์ƒํƒœ์ผ ๊ฐ€๋Šฅ์„ฑ๋„ ์žˆ๋‹คโ€๋ผ๊ณ  ์ง€์ ํ–ˆ๋‹ค.

๋ท”์œ…์นด์•ผ๋Š” โ€œ๋””์ง€ํ„ธ ํฌ๋ Œ์‹ ์ „๋ฌธ์„ฑ, ๊ทผ๋ณธ ์›์ธ ๋ถ„์„ ์ ˆ์ฐจ, ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค ํ†ตํ•ฉ์„ ํ†ตํ•ด ๊ฐœ๋ณ„ ์‚ฌ๊ณ ๋ฅผ ๊ณต๊ฒฉ์ž์˜ ์ „์ˆ  ๋ฐ ์บ ํŽ˜์ธ๊ณผ ์—ฐ๊ฒฐํ•˜๋Š” ์ ‘๊ทผ์ด ํ•„์š”ํ•˜๋‹ค. ์ด๋Ÿฐ ๋ฐฉ์‹์€ ์กฐ์ง์ด ๊ฒฝํ—˜ํ•˜๋Š” ๋ชจ๋“  ์‚ฌ๊ณ ๋ฅผ ํšŒ๋ณต๋ ฅ ๊ฐ•ํ™”์˜ ๊ณ„๊ธฐ๋กœ ์‚ผ๋Š” ๊ธฐ๋ฐ˜์ด ๋œ๋‹คโ€๋ผ๊ณ  ์กฐ์–ธํ–ˆ๋‹ค.

์ฒด๊ณ„์ ์ธ ๊ณ„ํš ์ˆ˜๋ฆฝ

์‚ฌ๊ณ ๊ฐ€ ๋ฐœ์ƒํ–ˆ์„ ๋•Œ ์ƒํ™ฉ์„ ์ด๊ด„ํ•˜๋Š” ๋Œ€์‘ํŒ€์€ ์ผ๋ฐ˜์ ์œผ๋กœ CISO๊ฐ€ ์ฃผ๋„๊ถŒ์„ ํ–‰์‚ฌํ•˜๋„๋ก ํ•ด์•ผ ํ•œ๋‹ค. ๋˜ํ•œ IT ๋‹ด๋‹น์ž๋ถ€ํ„ฐ ๋ฒ•๋ฅ  ์ž๋ฌธ๊นŒ์ง€ ๊ฐ ์ดํ•ด๊ด€๊ณ„์ž์˜ ์—ญํ• ๊ณผ ์ฑ…์ž„์ด ๊ณ„ํš์„œ์— ๋ช…ํ™•ํžˆ ์ •์˜๋ผ ์žˆ์–ด์•ผ ํ•œ๋‹ค.

์ „๋ฌธ๊ฐ€๋“ค์€ ์‚ฌ๊ณ  ๋Œ€์‘ ํ”Œ๋ ˆ์ด๋ถ์ด ์ผ๋ฐ˜์ ์œผ๋กœ ๋‹ค์Œ ํ•ต์‹ฌ ๋‹จ๊ณ„๋ฅผ ์ด๋ฃฌ๋‹ค๊ณ  ์„ค๋ช…ํ•œ๋‹ค.

  • ์ค€๋น„ ๋‹จ๊ณ„: ๊ฒ€์ฆ๋œ ์‚ฌ๊ณ  ๋Œ€์‘ ๊ณ„ํš์„ ์œ ์ง€ํ•˜๊ณ , ์—ญํ• ๊ณผ ๋ณด๊ณ  ์ฒด๊ณ„๋ฅผ ๋ช…ํ™•ํžˆ ํ•œ๋‹ค.
  • ํƒ์ง€ ๋ฐ ๋ถ„์„: ๋ชจ๋‹ˆํ„ฐ๋ง์„ ์ค‘์•™ํ™”ํ•˜๊ณ , ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค๋ฅผ ํ™œ์šฉํ•˜๋ฉฐ ํฌ๋ Œ์‹ ์—ญ๋Ÿ‰์„ ํ™•๋ณดํ•œ๋‹ค.
  • ์ฐจ๋‹จ ๋ฐ ๋ณต๊ตฌ: ์‹ ์†ํ•˜๊ฒŒ ๋Œ€์‘ํ•˜๋˜ ์ฆ๊ฑฐ๋ฅผ ๋ณด์กดํ•˜๊ณ , ๋ณต๊ตฌ ์ „์— ์‹œ์Šคํ…œ์„ ๊ฒ€์ฆํ•œ๋‹ค.
  • ์‚ฌํ›„ ๋ถ„์„: ๊ตฌ์กฐํ™”๋œ ๊ฒ€ํ† ๋ฅผ ์ˆ˜ํ–‰ํ•ด ๊ฒฐ๊ณผ๋ฅผ ๋ฌธ์„œํ™”ํ•˜๊ณ , ์ด๋ฅผ ๋ณด์•ˆ ์•„ํ‚คํ…์ฒ˜์™€ ๊ต์œก์— ๋ฐ˜์˜ํ•œ๋‹ค.
  • ์ง€์†์  ๊ฐœ์„ : ์œ„ํ˜‘ ๋ชจ๋ธ๋ง์„ ํ†ตํ•ฉํ•˜๊ณ , ๋Œ€์‘ ์ž๋™ํ™”๋ฅผ ํ™•๋Œ€ํ•˜๋ฉฐ, ์—ญ๋Ÿ‰ ๊ฐœ๋ฐœ์— ํˆฌ์žํ•œ๋‹ค.

๋งŽ์€ ์กฐ์ง์ด ISO ๋“ฑ ์ด๋ฏธ ๊ฒ€์ฆ๋œ ํ”„๋ ˆ์ž„์›Œํฌ๋ฅผ ์‚ฌ๊ณ  ๋Œ€์‘ ์ฒด๊ณ„์˜ ํ…œํ”Œ๋ฆฟ์œผ๋กœ ํ™œ์šฉํ•˜๊ณ  ์žˆ๋‹ค. ์ธํ‹ฐ๊ทธ๋ฆฌํ‹ฐ360(Integrity360)์˜ CTO ๋ฆฌ์ฒ˜๋“œ ํฌ๋“œ๋Š” โ€œ์ด๋Ÿฐ ํ”„๋ ˆ์ž„์›Œํฌ๋Š” ๊ฑฐ๋ฒ„๋„Œ์Šค๋ถ€ํ„ฐ ๊ธฐ์ˆ ์  ๋Œ€์‘๊นŒ์ง€ ๋ชจ๋“  ํ•ต์‹ฌ ์š”์†Œ๋ฅผ ์ฒด๊ณ„์ ์œผ๋กœ ๊ตฌ์„ฑํ•  ์ˆ˜ ์žˆ๋„๋ก ์„น์…˜ ๋‹จ์œ„๋กœ ์ •๋ฆฌ๋ผ ์žˆ๋‹ค. ๋„๋ฆฌ ์•Œ๋ ค์ง„ ํ”„๋ ˆ์ž„์›Œํฌ๋ฅผ ์‚ฌ์šฉํ•˜๋ฉด ์™„์„ฑ๋„๋ฅผ ๋†’์ผ ์ˆ˜ ์žˆ์„ ๋ฟ ์•„๋‹ˆ๋ผ, ํ•ด๋‹น ๊ธฐ์ค€์— ์ต์ˆ™ํ•œ ์™ธ๋ถ€ ์ดํ•ด๊ด€๊ณ„์ž์™€์˜ ์†Œํ†ต๋„ ํ›จ์”ฌ ์ˆ˜์›”ํ•ด์ง„๋‹คโ€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

์กฐ์ง ํšŒ๋ณต๋ ฅ ๊ตฌ์ถ•

ํšจ๊ณผ์ ์ธ ์‚ฌ๊ณ  ๋Œ€์‘์€ ์‹œ๊ฐ„์ด ์ง€๋‚ ์ˆ˜๋ก ์กฐ์ง์˜ ํšŒ๋ณต๋ ฅ์„ ๋†’์ผ ์ˆ˜ ์žˆ๋„๋ก, ์ฒด๊ณ„์ ์œผ๋กœ ๊ตฌ์กฐํ™”๋˜๊ณ  ๋ฐ˜๋ณต์ ์œผ๋กœ ์‹คํ–‰ ๊ฐ€๋Šฅํ•˜๋ฉฐ ์ธํ…”๋ฆฌ์ „์Šค๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ์šด์˜๋˜๋Š” ํ”„๋กœ์„ธ์Šค๋ฅผ ๊ตฌ์ถ•ํ•˜๋Š” ๋ฐ ์ดˆ์ ์„ ๋‘ฌ์•ผ ํ•œ๋‹ค.

์‚ฌ๊ณ  ๋Œ€์‘ ๊ณ„ํš์€ ๋ชจ์˜ ํ›ˆ๋ จ์ด๋‚˜ ํ…Œ์ด๋ธ”ํƒ‘ ํ›ˆ๋ จ ๋“ฑ์„ ํ†ตํ•ด ์ •๊ธฐ์ ์œผ๋กœ ํ…Œ์ŠคํŠธํ•˜๊ณ  ๋ณด์™„ํ•˜๋ฉฐ ์—…๋ฐ์ดํŠธํ•ด์•ผ ํ•œ๋‹ค. ์ด๋Š” ๋” ๋„“์€ ์ฐจ์›์˜ ๋น„์ฆˆ๋‹ˆ์Šค ์—ฐ์†์„ฑ ๋ฐ ์กฐ์ง ํšŒ๋ณต ์ „๋žต์˜ ์ผ๋ถ€๋กœ ์ˆ˜ํ–‰๋ผ์•ผ ํ•œ๋‹ค.

์‚ฌ์ด๋ฒ„ ๋ณด์•ˆ ๊ธฐ์—… ํŠธ๋ Œ๋“œ๋งˆ์ดํฌ๋กœ(Trend Micro)์˜ ํ•„๋“œ CTO ๋ฐ”๋ผํŠธ ๋ฏธ์ŠคํŠธ๋ฆฌ๋Š” ๋งŽ์€ ์กฐ์ง์ด ์—ฌ์ „ํžˆ ์‚ฌ๊ณ  ๋Œ€์‘ ์ฒด๊ณ„๊ฐ€ ์ถฉ๋ถ„ํžˆ ์„ฑ์ˆ™ํ•œ ์ˆ˜์ค€์— ์ด๋ฅด์ง€ ๋ชปํ•˜๊ณ  ์žˆ๋‹ค๊ณ  ์ง€์ ํ•œ๋‹ค. ๊ทธ๋Š” ์‚ฌ๊ณ  ๋Œ€์‘์ด ๋‹จ์ˆœํ•œ ์ฐจ๋‹จ๊ณผ ๋ณต๊ตฌ์— ๊ทธ์ณ์„œ๋Š” ์•ˆ ๋˜๋ฉฐ, ํฌ๋ Œ์‹ ๋ถ„์„๊ณผ ์‚ฌํ›„ ๊ฒ€ํ† ๊นŒ์ง€ ํ™•์žฅ๋ผ์•ผ ํ•œ๋‹ค๊ณ  ๊ฐ•์กฐํ–ˆ๋‹ค.

๋ฏธ์ŠคํŠธ๋ฆฌ๋Š” โ€œ๊ทผ๋ณธ ์›์ธ ๋ถ„์„์„ ๊ฑด๋„ˆ๋›ฐ๋ฉด ๊ฒฐ๊ตญ ๊ฒ‰์œผ๋กœ ๋“œ๋Ÿฌ๋‚œ ์ฆ์ƒ๋งŒ ํ•ด๊ฒฐํ•˜๋Š” ์…ˆ์ด๋‹ค. ์ด๋Ÿฐ ๋ฌธ์ œ๋Š” ์—ฌ๋Ÿฌ ์š”์ธ์ด ๊ฒน์ณ ๋ฐœ์ƒํ•œ๋‹ค. ๊ณต๊ฒฉ ๊ณผ์ •์„ ์ •ํ™•ํžˆ ์žฌ๊ตฌ์„ฑํ•˜๊ธฐ ์–ด๋ ต๊ฒŒ ๋งŒ๋“œ๋Š”, ๋„๊ตฌ ๊ฐ„ ๋‹จ์ ˆ๋กœ ์ธํ•œ ๊ฐ€์‹œ์„ฑ ๋ถ€์กฑ, ํฌ๋ Œ์‹๊ณผ ์œ„ํ˜‘ ํ—ŒํŒ… ์—ญ๋Ÿ‰์ด ๋ถ€์กฑํ•œ ์ธ์žฌ ๊ฒฉ์ฐจ, ๊ทธ๋ฆฌ๊ณ  ์‚ฌํ›„ ๋ถ„์„์ด ํ˜•์‹์ ์œผ๋กœ ๋๋‚˜๊ฑฐ๋‚˜ ์•„์˜ˆ ์ƒ๋žต๋˜๋Š” ํ”„๋กœ์„ธ์Šค ์ทจ์•ฝ์ ์ด ๋Œ€ํ‘œ์  ์š”์ธ์ด๋‹คโ€๋ผ๊ณ  ์ง€์ ํ–ˆ๋‹ค.

โ€˜์นจํ•ดโ€“๋ณต๊ตฌโ€“์žฌ์นจํ•ดโ€™์˜ ์•…์ˆœํ™˜ ๋Š๊ธฐ

๋งŽ์€ ๊ฒฝ์šฐ ์šด์˜์„ ์‹ ์†ํžˆ ๋ณต๊ตฌํ•˜๋Š” ๋ฐ๋งŒ ์ง‘์ค‘ํ•˜๋‹ค ๋ณด๋‹ˆ, ์„œ๋ฒ„ ์ดˆ๊ธฐํ™”๋‚˜ ๋กœ๊ทธ ์†์‹ค, ํฌ๋ Œ์‹ ํ”์  ์†Œ์‹ค ๋“ฑ ํ•ต์‹ฌ ์ฆ๊ฑฐ๊ฐ€ ์˜๋„์น˜ ์•Š๊ฒŒ ์‚ฌ๋ผ์ง€๊ณค ํ•œ๋‹ค.

๋ฏธ์ŠคํŠธ๋ฆฌ๋Š” โ€œ์—ฌ๊ธฐ์— ์—…๋ฌด ์••๋ฐ•, ์‹œ๊ฐ„ ์ œ์•ฝ, ์ œํ•œ๋œ ์ž์› ๋“ฑ์ด ๊ฒน์น˜๋ฉด์„œ, ์‚ฌ๊ณ ๋กœ๋ถ€ํ„ฐ ๋ฌด์—‡์„ ๋ฐฐ์šธ์ง€๋ณด๋‹ค ๋‹ค์Œ ๊ธด๊ธ‰ ์—…๋ฌด๋ฅผ ์ฒ˜๋ฆฌํ•˜๋Š” ๋ฐ ๋” ๋ชฐ๋‘ํ•˜๊ฒŒ ๋œ๋‹ค. ๊ทธ ๊ฒฐ๊ณผ, ์‚ฌํ›„ ์Šค์บ”์ด๋‚˜ ๊ทผ๋ณธ ์›์ธ ๋ถ„์„, ์ ˆ์ฐจ ์—…๋ฐ์ดํŠธ ๊ฐ™์€ ํ•„์ˆ˜ ์ž‘์—…์ด ์ž์ฃผ ๊ฑด๋„ˆ๋›ฐ์–ด์ง„๋‹คโ€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

์ด๋ ‡๊ฒŒ ๋˜๋ฉด ์ดˆ๊ธฐ ๊ณต๊ฒฉ ๊ฒฝ๋กœ์™€ ๋‚ด๋ถ€ ํ™•์‚ฐ ๋ฐฉ์‹์ด ๋๋‚ด ๊ทœ๋ช…๋˜์ง€ ๋ชปํ•œ ์ฑ„ ์ทจ์•ฝ์ ์ด ๋‚จ๊ฒŒ ๋˜๊ณ , ์ด๋Š” โ€˜์นจํ•ด-๋ณต๊ตฌ-์žฌ์นจํ•ดโ€™๊ฐ€ ๋ฐ˜๋ณต๋˜๋Š” ์•…์ˆœํ™˜์„ ๋งŒ๋“ ๋‹ค.

๋ฏธ์ŠคํŠธ๋ฆฌ๋Š” โ€œ์ด ์•…์ˆœํ™˜์„ ๋Š๊ธฐ ์œ„ํ•ด์„œ๋Š” ์กฐ์ง์ด ์‚ฌ๊ณ  ๋Œ€์‘ ์ „๋žต์— ํฌ๋ Œ์‹ ์ค€๋น„ํƒœ์„ธ๋ฅผ ๋ฐ˜๋“œ์‹œ ํฌํ•จํ•ด์•ผ ํ•œ๋‹ค. ์ฆ๊ฑฐ ๋ณด์กด, ์ฒด๊ณ„์ ์ธ ์‚ฌํ›„ ๋ถ„์„, ํ•™์Šต ๋‚ด์šฉ์„ ๋ณด์•ˆ ์•„ํ‚คํ…์ฒ˜์™€ ๊ต์œก์— ๋ฐ˜์˜ํ•˜๋Š” ๊ณผ์ •์ด ํ•„์ˆ˜โ€๋ผ๊ณ  ์กฐ์–ธํ–ˆ๋‹ค.
dl-ciokorea@foundryco.com

Why Network Monitoring Matters: How Seceon Enables Proactive, Intelligent Cyber Defence

In todayโ€™s fast-evolving digital world, organizations increasingly rely on hybrid workforces, cloud-first strategies, and distributed infrastructures to gain agility and scalability. This transformation has expanded the network into a complex ecosystem spanning on-premises, cloud, and remote endpoints, vastly increasing the attack surface. Cyber adversaries exploit this complexity using stealth techniques like encrypted tunnels, credential misuse,

The post Why Network Monitoring Matters: How Seceon Enables Proactive, Intelligent Cyber Defence appeared first on Seceon Inc.

The post Why Network Monitoring Matters: How Seceon Enables Proactive, Intelligent Cyber Defence appeared first on Security Boulevard.

What is NVIDIAโ€™s CUDA and How is it Used in Cybersecurity?

By: OTW

Welcome back my aspiring cyberwarriors!

You have likely heard of the company NVIDIA. Not only are the dominant company in computer graphics adapters (if you are gamer, you likely have one) and now, artificial intelligence. In recent weeks, they have become the most valuable company in the world ($5 trillion).

The two primary reasons that Nvidia has become so important to artificial intelligence are:

  1. Nvidia chips can process data in multiple threads, in some cases, thousands of threads. This makes doing complex calculations in parallel possible, making them much faster.
  2. Nvidia created a development environment named CUDA for harnessing the power of these powerful CPUโ€™s. This development environment is a favorite among artificial intelligence, data analytics, and cybersecurity professionals.

Letโ€™s a brief moment to examine this powerful environment.

What is CUDA?

Most computers have two main processors:

CPU (Central Processing Unit): General-purpose, executes instructions sequentially or on a small number of cores. These CPUโ€™s such as Intel and AMD provide the flexibility to run many different applications on your computer.

GPU (Graphics Processing Unit): These GPUโ€™s were originally designed to draw graphics for applications such as games and VR environments. These GPUโ€™s contain hundreds or thousands of small cores that excel at doing the same thing many times in parallel.

CUDA (Compute Unified Device Architecture) is NVIDIAโ€™s framework that lets you take control of the GPU for general computing tasks. In other words, CUDA lets you write code that doesnโ€™t just render graphicsโ€”it crunches numbers at massive scale. Thatโ€™s why itโ€™s a favorite for machine learning, password cracking, and scientific computing.

Why Should Hackers & Developers Care?

CUDA matters as an important tool in your cybersecurity toolkit because:

Speed: A GPU can run password hashes or machine learning models orders of magnitude faster than a CPU.

Parallelism: If you need to test millions of combinations, analyze huge datasets, or simulate workloads, CUDA gives you raw power.

Applications in Hacking: Tools like Hashcat and Pyrit use CUDA to massively accelerate brute-force and dictionary attacks. Security researchers who understand CUDA can customize or write their own GPU-accelerated tools.

The CUDA environment sees the GPU as a device with:

Threads: The smallest execution unit (like a tiny worker).

Blocks: Groups of threads.

Grids: Groups of blocks.

Think of it like this:

  • A CPU worker can cook one meal at a time.
  • A GPU is like a kitchen with thousands of cooksโ€”we split the work (threads), organize them into brigades (blocks), and assign the whole team to the job (grid).

Coding With CUDA

CUDA extends C/C++ with some keywords.
Hereโ€™s the simple workflow:

  1. You write a kernel function (runs on the GPU).
  2. You call it from the host code (the CPU side).
  3. Launch thousands of threads in parallel โ†’ GPU executes them fast.

Example skeleton code:

c__global__ void add(int *a, int *b, int *c) {
    int idx = threadIdx.x;
    c[idx] = a[idx] + b[idx];
}

int main() {
    // Allocate memory on host and device
    // Copy data to GPU
    // Run kernel with N threads
    add<<<1, N>>>(dev_a, dev_b, dev_c);
    // Copy results back to host
}

The keywords:

  • __global__ โ†’ A function (kernel) run on the GPU.
  • threadIdx โ†’ Built-in variable identifying which thread you are.
  • <<<1, N>>> โ†’ Tells CUDA to launch 1 block of N threads.

This simple example adds two arrays in parallel. Imagine scaling this to millions of operations at once!

The CUDA Toolchain Setup

If you want to try CUDA make certain you have the following items:

1. an NVIDIA GPU.

2. the CUDA Toolkit (contains compiler nvcc).

3. Write your CUDA programs in C/C++ and compile it with nvcc.

Run and watch your GPU chew through problems.

To install the CUDA toolkit in Kali Linux, simply enter;

kali > sudo apt install nvidia-cuda-toolkit

Next, write your code and compile it with nvcc, such as;

kali > nvcc hackersarise.cu -o hackersarise

Practical Applications of CUDA

CUDA is already excelling at hacking and computing applications such as;

  1. Password cracking (Hashcat, John the Ripper with GPU support).
  2. AI & ML (TensorFlow/PyTorch use CUDA under the hood). Our application of using Wi-Fi to see through walls uses CUDA.
  3. Cryptanalysis (breaking encryption) & simulation tasks.
  4. Network packet analysis at high scale.

As a beginner, start with small projectsโ€”then explore how to take compute-heavy tasks and offload them to the GPU.

Summary

CUDA is NVIDIAโ€™s way of letting you program GPUs for general-purpose computing. To the hacker or cybersecurity pro, itโ€™s a way to supercharge computation-heavy tasks.

Learn the thread-block-grid model, write simple kernels, and then think: what problems can I solve dramatically faster if run in parallel?


Data Dilemmas: Balancing Privacy Rights in the Age of Big Tech

By: galidon

The world is becoming increasingly more digital and, whilst this is a good thing for a number of different reasons, this huge shift brings with it questions and scrutiny as to what exactly these huge tech companies are doing with such vast amounts of data.

The leading tech companies, including Google, Apple, Meta, Amazon and Microsoft โ€“ giants within the tech world โ€“ have all recently been accused of following unethical practices.

From Meta being questioned in courts over its advertising regime, to Amazon facing concerns over the fact that their Echo devices are potentially recording private conversations within the home, itโ€™s not surprising that users are looking for more information as to how their data is being used.

With this comes the counterargument that big tech companies are doing what they can to strike the balance between privacy rights and ensuring that their product and the experience users get from using them donโ€™t change.ย  But, how exactly are the big tech companies using and utilising sensitive and personal data while ensuring they still meet and adhere to the ever-expanding list of privacy rights? Letโ€™s take a look.

Is Our Data The Price We Pay For Free?

In marketplaces and stores, we exchange legitimate currency for goods and services. But, with social media and other online platforms, weโ€™re instead paying with our attention. A lot of online users are unaware of the expansive trail of browsing and search history that they leave behind.

Almost everything is logged and monitored online, right from the very first interaction and, depending on the web browser you use, some will collect more information than others. There are costs involved in almost every digital and online service we use and it costs money to host servers and sites โ€“ so why do we get to browse for free?

Simply because the cost is being underwritten in other ways. The most common form is through advertising, but the ways that only a few people think about, or want to think about, is through the harvesting and use of our data. Every single website is tracked or recorded in different ways and by different people, from marketing agencies who analyze the performance of a website to broadband providers who check connections.

Users will struggle to understand why companies want their data, but thatโ€™s simply because they donโ€™t quite understand the value behind it. Data is currently considered to be one of the most valuable assets, mainly because it is a non-rival entity โ€“ this means that it can be replicated for free and with little to no impact on the quality. The nature of data means that it can be used for product research, market analysis or to train and better inform AI systems. All companies want more data in order to have as many financial and legal incentives and rights as they can.

What Are Cookies?

Data tracking is done through cookies, which are small files of letters and numbers which are downloaded onto your computer when you visit a website. They are used by almost all websites for a number of reasons, such as remembering your browsing preferences, keeping a record of what youโ€™ve added to your shopping basket or counting how many people visit the site. Cookies are why you might see ads online months after visiting a website or get emails when youโ€™ve left something in a shopping basket online.

Why Do Big Tech Companies Want User Data?

How Laws Have Changed How Companies Use Your Data

In the EU, data is more heavily protected than it is in the US, for example. EU laws have taken a more hardline stance against the big tech companies when it comes to protecting users, with the General Data Protection Regulation, or GDPR, in place to offer the โ€œtoughest privacy and security law in the worldโ€.

This law makes it compulsory for companies, particularly big tech companies, to outline specifically what it is they are using data for. This law was passed in 2016 and any company which violates it is subjected to fines which either total 4% of the companyโ€™s overall revenue, or โ‚ฌ20 million โ€“ whichever is greater. In 2019, Google was fined a huge โ‚ฌ57 million for violating GDPR laws, citing that they posed huge security risks.

Unlike the EU, the US does not have comprehensive laws to protect online users, which is what allows these companies to have access to data that they can then use to take advantage of said data. Following the EUโ€™s introduction of GDPR, both Facebook and Google had to change and update their privacy rights and laws, but in the US, there is still some way to go.

This is because Google makes a lot of money from their user data. Over 80% of Googleโ€™s revenue comes from the advertising aspect of its business, which allows advertisers to target ads for services and products based on what users are searching for, with this information gathered from Google. Google is the largest search engine in the world, so all of these userโ€™s data quickly adds up. Itโ€™s been said that โ€œGoogle sells the data that they collect so the ads can be better suited to userโ€™s interests.โ€.

Advertisers will also make use of Googleโ€™s Analytic data, which is a service that gives companies insight into their website activity by tracking users who land on there. A few years ago, there were rumours that Google Analytics wrongly gave U.S intelligence agencies access to data from French users, whilst Google hadnโ€™t done enough in order to ensure privacy when this data was transferred between the US and Europe.

Reasons Why Big Tech Companies Want Your User Data

  • Social media apps want information on how you use their platform in order to give you content that you actually want. TikTok in particular works to build you a customised and personalised algorithm to try and show you videos that you will actually engage with to keep you on the app for longer based on ads and content that you have previously watched and engaged with.
  • Big tech companies will be interested in your data so that they can show you relevant ads. Most of the big tech companies make a lot of money through advertising on their platform, so they want to ensure that they keep advertisers happy by showing their services or products to the consumers who are more likely to convert.
  • Your data will be used to personalise your browsing and platform experience to keep you coming back.

How Is Data Collection Changing?

One of the biggest reasons why companies are using your data is in order to serve you better when you are online. But, in terms of big tech companies, these reasons are often very different. With more and more people relying on technology provided by the likes of Google, Apple, Microsoft and Amazon, these companies need to be more reliable and be held to accountability more so that the rights of consumers are protected.

Changes and popularity in technology such as AI and cryptocurrency are becoming increasingly more common, and with these technologies comes the increase in risks of scams and fraud, such as the recent Hyperverse case. It is important now more than ever for these companies to put userโ€™s minds at ease and improve their privacy rights.

Originally posted 2024-04-13 23:13:36. Republished by Blog Post Promoter

The post Data Dilemmas: Balancing Privacy Rights in the Age of Big Tech first appeared on Information Technology Blog.

Worry-free Pentesting: Continuous Oversight In Offensive Security Testing

In your cybersecurity practice, do you ever worry that youโ€™ve left your back door open and an intruder might sneak inside? If you answered yes, youโ€™re not alone. The experience can be a common one, especially for security leaders of large organizations with multiple layers of tech and cross-team collaboration to accomplish live, continuous security workflows.

At Synack, the better way to pentest is one thatโ€™s always on, can scale to test for urgent vulnerabilities or compliance needs, and provides transparent, thorough reporting and coverage insight.

Know whatโ€™s being tested, where itโ€™s happening and how often itโ€™s occurringย 

With Synack365, our Premier Security Testing Platform, you can find relief in the fact that weโ€™re always checking for unlocked doors. To provide better testing oversight, we maintain reports that list all web assets being tested, which our customers have praised. Customer feedback indicated that adding continuous oversight into host assets would also help to know which host or web assets are being tested, when and where theyโ€™re being tested, and how much testing has occurred.ย 

Synackโ€™s expanded Coverage Analytics tells you all that and more for host assets, in addition to our previous coverage details on web applications and API endpoints, all found within the Synack platform. With Coverage Analytics, Synack customers are able to identify which web or host assets have been tested and the nature of the testing performed. This is helpful for auditing purposes and provides proof of testing activity, not just that an asset is in scope. Additionally, Coverage Analytics gives customers an understanding of areas that havenโ€™t been tested as heavily for vulnerabilities and can provide internal red team leaders with direction for supplemental testing and prioritization.ย 

Unmatched Oversight of Coverageย 

Other forms of security testing are unable to provide the details and information Synack Coverage Analytics does. Bug bounty testing typically goes through the untraceable public internet or via tagged headers, which require security researcher cooperation. The number of researchers and hours that they are testing are not easily trackable via these methods, if at all. Traditional penetration testing doesnโ€™t have direct measurement capabilities. Our LaunchPoint infrastructure stands between the Synack Red Team, our community of 1,500 security researchers, and customer assets, so customers have better visibility of the measurable traffic during a test. More and more frequently, we hear that customers are required to provide this kind of information to their auditors in financial services and other industries.ย 

A look at the Classified Traffic & Vulnerabilities view in Synackโ€™s Coverage Analytics. Sample data has been used for illustration purposes.

Benefits of Coverage Analyticsย 

  • Know whatโ€™s being tested within your web and host assets: where, when and how muchย 
  • View the traffic generated by the Synack Red Team during pentesting
  • Take next steps with confidence; identify where you may need supplemental testing and how to prioritize such testing

Starting today, security leaders can reduce their teamsโ€™ fears of pentesting in the dark by knowing whatโ€™s being tested, where and how much at any time across both web and host assets. Coverage Analytics makes sharing findings with executive leaders, board members or auditors simple and painless.

Current Synack customers can log in to the Synack Platform to explore Coverage Analytics today. If you have questions or are interested in learning more about Coverage Analytics, part of Synackโ€™s Better Way to Pentest, donโ€™t hesitate to contact us today!

The post Worry-free Pentesting: Continuous Oversight In Offensive Security Testing appeared first on Synack.

The Case for Integrating Dark Web Intelligence Into Your Daily Operations

Some of the best intelligence an operator or decision-maker can obtain comes straight from the belly of the beast. Thatโ€™s why dark web intelligence can be incredibly valuable to your security operations center (SOC). By leveraging this critical information, operators can gain a better understanding of the tactics, techniques and procedures (TTPs) employed by threat actors. With that knowledge in hand, decision-makers can better position themselves to protect their organizations.

This is in line with the classic teachings from Sun Tzu about knowing your enemy, and the entire passage containing that advice is particularly relevant to cybersecurity:

โ€œIf you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.โ€

Letโ€™s translate the middle section of this passage into colloquial cybersecurity talk: You can have the best security operations center in the world with outstanding cyber hygiene, but if you arenโ€™t feeding it the right information, you may suffer defeats โ€” and much of that information comes from dark web intelligence.

Completing Your Threat Intelligence Picture

To be candid, if youโ€™re not looking at the dark web, there is a big gap in your security posture. Why? Because thatโ€™s where a lot of serious action happens. To paraphrase Sir Winston Churchill, the greatest defense against a cyber menace is to attack the enemyโ€™s operations as near as possible to the point of departure.

Now, this is not a call to get too wrapped up in the dark web. Rather, a solid approach would be to go where the nefarious acts are being discussed and planned so you can take the appropriate proactive steps to prevent an attack on your assets.

The first step is to ensure that you have a basic understanding of the dark web. One common way to communicate over the dark web involves using peer-to-peer networks on Tor and I2P (Invisible Internet Project). In short, both networks are designed to provide secure communications and hide all types of information. Yes, this is only a basic illustration of dark web communications, but if your security operations center aims to improve its capabilities in the dark web intelligence space, you must be able to explain the dark web in these simple terms for two reasons:

  1. You cannot access these sites as you would any other website.
  2. Youโ€™re going to have to warn your superiors what youโ€™re up to. The dark web is an unsavory place, full of illegal content. Your decision-makers need to know what will be happening with their assets at a high level, which makes it vitally important to speak their language.

And this part is critical: If you want to get the most out of dark web intelligence, you may have to put on a mask and appear to โ€œbe one of the bad guys.โ€ You will need to explain to your decision-makers why full-time staff might have to spend entire days as someone else. This is necessary because when you start searching for granular details related to your organization, you may have to secure the trust of malicious actors to gain entry into their circles. Thatโ€™s where the truly rich intelligence is.

This could involve transacting in bitcoins or other cryptocurrencies, stumbling upon things the average person would rather not see, trying to decipher between coded language and broken language, and the typical challenges that come with putting up an act โ€” all so you can become a trusted persona. Just like any other relationship you develop in life, this doesnโ€™t happen overnight.

Of course, there are organizations out there that can provide their own โ€œpersonasโ€ for a fee and do the work for you. Using these services can be advantageous for small and medium businesses that may not have the resources to do all of this on their own. But the bigger your enterprise is, the more likely it becomes that you will want these capabilities in-house. In general, itโ€™s also a characteristic of good operational security to be able to do this in-house.

Determining What Intelligence You Need

One of the most difficult challenges you will face when you decide to integrate dark web intelligence into your daily operations is figuring out what intelligence could help your organization. A good start is to cluster the information you might collect into groups. Here are some primer questions you can use to develop these groups:

  • What applies to the cybersecurity world in general?
  • What applies to your industry?
  • What applies to your organization?
  • What applies to your people?

For the first question, there are plenty of service providers who make it their business to scour the dark web and collect such information. This is an area where it may make more sense to rely on these service providers and integrate their knowledge feeds into existing ones within your security operations center. With the assistance of artificial intelligence (AI) to manage and make sense of all these data points, you can certainly create a good defensive perimeter and take remediation steps if you identify gaps in your network.

Itโ€™s the second, third and fourth clusters that may require some tailoring and additional resources. Certain service providers can provide industry-specific dark web intelligence โ€” and you would be wise to integrate that into your workflow โ€” but at the levels of your organization and its people, you will need to do the work on your own. Effectively, you would be doing human intelligence work on the dark web.

Why Human Operators Will Always Be Needed

No matter how far technological protections advance, when places like the dark web exist, there will always be the human element to worry about. Weโ€™re not yet at the stage where machines are deciding what to target โ€” itโ€™s still humans who make those decisions.

Therefore, having top-level, industrywide information feeds can be great and even necessary, but it may not be enough. You need to get into the weeds here because when malicious actors move on a specific target, that organization has to play a large role in protecting itself with specific threat intelligence. A key component of ensuring protections are in place is knowing what people are saying about you, even on the dark web.

As Sun Tzu said: โ€œIf you know the enemy and know yourself, you need not fear the result of a hundred battles.โ€ Thereโ€™s a lot of wisdom in that, even if it was said some 2,500 years ago.

The post The Case for Integrating Dark Web Intelligence Into Your Daily Operations appeared first on Security Intelligence.

โŒ