Reading view
Four things AWS needs to fix at re:Invent this week
The mood among Amazon Web Services customers is shifting from curiosity to urgency as the company prepares to once again to โre:Inventโ itself at its annual customer conference this week.
After a year in which Microsoft and Google tightened their narratives around unified data, AI platforms and workflow-ready agents, AWS can no longer rely on its scale, breadth, or incremental roadmap to maintain the confidence of CIOs.
Instead, say analysts, the hyperscaler must address four key concerns at re:Invent in Las Vegas this week if it wants to retain its position as the default enterprise cloud.
Closing the integration gaps between analytics, data, and AI
Although AWS is ahead in raw capability and breadth of services, say analysts, it is falling behind in its integration and unification of data, analytics, machine learning, and AI.
โIt lags behind rivals on simplicity and integration,โ said Phil Fersht, CEO of HFS Research. โCustomers want fewer hops between analytics, machine learning, and generative AI. They want unified governance and a consistent metadata layer so agents can reason across systems,โ he said.
Microsoft, at its Ignite customer event last month, beefed up its unified data and analytics platform, Fabric IQ, with new semantic intelligence capabilities. AWS, too, has been trying its hand at unifying its AI and analytics services with the launch of SageMaker Unified Studio last year but has yet to reach the level of simplicity that Microsoftโs IQ offerings promise.
When it comes to new AI analytics services from AWS, CIOs can expect more of the same, said David Linthicum, independent consultant and retired chief cloud strategy officer at Deloitte Consulting. โRealistically, they can expect AWS to keep integrating its existing services; the key test will be whether this shows up as less complexity and faster time-to-insight, not just new service names,โ
Lack of cohesion in AI platform strategy
That complexity isnโt confined to analytics alone. The same lack of cohesion is now spilling over into AWSโs AI platform strategy, where the cloud giant risks ceding mindshare despite its compute advantage.
โSageMaker is still respected, but it no longer dominates the AI platform conversation. Open source frameworks like Ray, MLflow, and KubeRay are rapidly capturing developer mindshare because they offer flexibility and avoid lock in,โ Fersht said.
This fragmentation is exactly what partners want AWS to fix by offering clearer, more opinionated MLOps paths, deeper integration between Bedrock and SageMaker, and ready-to-use patterns that help enterprises progress from building models to deploying real agents at scale.
More plug-and-play, less build-it-yourself
AWSโs tooling shortcomings donโt end there, said Fersht. The hyperscalerโs focus on providing the parts for agentic AI and leaving others to build with them make it harder for business users to consume its services.
โAWS is giving strong primitives, but competitors are shipping business-ready agents that sit closer to workflows and outcomes. Enterprises want both power and simplicity,โ Fersht said.
Although thereโs an assumption that enterprises are big enough to build things themselves, they want more plug-and-play than AWS imagines, Fersht said: โThey do not want to engineer everything from scratch. They want reusable agent blueprints that map to sales, service, IT operations, and supply chain tasks.โ
In fact, if AWS wants to compete with rivals to become the default agent platform for enterprises, it must hide complexity behind higher-level abstractions and simplify its agent stack, double down on workflow level agents, and give customers clear guidance on safe deployment, accountability, and ROI, he said.
Vibe coding disarray
Like other hyperscalers, AWS is aggressively experimenting in the vibe coding and agentic IDE space, where thereโs no clear consensus on what developers actually want, according to Fersht.
โEveryone is experimenting because no one has cracked the next generation developer workflow. AWS is no different,โ he said, adding that in some respects AWS has been more conservative than its rivals.
AWS is sure to be dealing some new innovations at AWS re:Invent in Las Vegas this week, but despite defining the cloud computing industry in 2006, it now finds itself, in many respects, playing catch-up.

Mid-Cycle, Not Mania: Bitcoinโs Q4 Map
The protocol-level analysis indicates a base case price of approximately $129K in late November, around $200K by Christmas (or early Q1โฆ
OpenAI API User Data Exposed in Mixpanel Breach, ChatGPT Unaffected
Cyber Threats to Water Infrastructure: Insights from Josh Corman
Cyber attacks on water infrastructure are growing. Josh Corman of IAmTheCavalry joins us to discuss efforts to secure critical water systems.
The post Cyber Threats to Water Infrastructure: Insights from Josh Corman appeared first on The Security Ledger with Paul F. Roberts.
์ค๋ ธ์ฐํ๋ ์ดํฌ, ์ ๋ ํธ์คํ ์ธ์ยทยทยทAI์ ๋ฐ์ดํฐ ์ดํด๋ ๋์ธ๋ค
์ค๋ ธ์ฐํ๋ ์ดํฌ๊ฐ ์ํ๋์์ค์ฝ ๊ธฐ๋ฐ ์คํํธ์ ์ ๋ ํธ์คํ(Select Star)์ ์ปจํ ์คํธ ๋ฉํ๋ฐ์ดํฐ ํ๋ซํผ์ ์ธ์ํ๊ธฐ ์ํ ์ต์ข ๊ณ์ฝ์ ์ฒด๊ฒฐํ๋ค๊ณ ๋ฐํ๋ค. ์ด๋ฒ ์ธ์๋ ํธ๋ผ์ด์ฆ ์นดํ๋ก๊ทธ๋ฅผ ๊ฐํํ๊ธฐ ์ํ ์กฐ์น๋ก, ์ด๋ ์ค๋ ธ์ฐํ๋ ์ดํฌ ๋ฐ์ดํฐ ํด๋ผ์ฐ๋ ๋ด์์ ๋ฐ์ดํฐ ๊ฒ์, ๊ด๋ฆฌ, ๊ฑฐ๋ฒ๋์ค๋ฅผ ํตํฉ ์ ๊ณตํ๋ ์ ํ๊ตฐ์ด๋ค.
์ค๋ ธ์ฐํ๋ ์ดํฌ ํธ๋ผ์ด์ฆ๊ณผ ๋ฐ์ดํฐ๋ธ๋ฆญ์ค ์ ๋ํฐ ๊ฐ์ ๋ฐ์ดํฐ ๋ฐ ๊ฑฐ๋ฒ๋์ค ์นดํ๋ก๊ทธ๋ ์ฌ๋ฌ ํด๋ผ์ฐ๋์ ์ ํ๋ฆฌ์ผ์ด์ ์ ํฉ์ด์ง ๋ฐ์ดํฐ๋ฅผ ํ๋์ ์ ์ด ์ง์ ์์ ๊ด๋ฆฌํ ์ ์์ด ๊ธฐ์ ์ฌ์ด์์ ๋น ๋ฅด๊ฒ ์ฃผ๋ชฉ๋ฐ๊ณ ์๋ค.
์นดํ๋ก๊ทธ๋ ๊ธฐ์ ์ ์ฒด ๋ฐ์ดํฐ ์์ฐ์ ๋ํ ํตํฉ๋ ์ปจํ ์คํธ ๋ทฐ๋ฅผ ๋ณด์ฌ์ฃผ๋ ๊ธฐ๋ฅ๋ ์ ๊ณตํ๋ค. ์ด๋ AI ๊ธฐ๋ฐ ์ ํ๋ฆฌ์ผ์ด์ ๊ณผ ์์ด์ ํธ๋ฅผ ๊ฐ๋ฐํ๋ ค๋ ๊ธฐ์ ์๊ฒ ์ ์ ํ์ ์๊ฑด์ด ๋๊ณ ์๋ค. ์์ ์ ์ผ๋ก ์๋ํ๊ธฐ ์ํด์๋ ์ ์ ๋๊ณ ๋ฌธ์ํ๊ฐ ์ ๋ผ ์์ผ๋ฉฐ ์ถ์ ๊ฐ๋ฅํ ์ ๋ ฅ๊ฐ์ด ํ์ํ๊ธฐ ๋๋ฌธ์ด๋ค.
์ค๋ ธ์ฐํ๋ ์ดํฌ๋ ์ ๋ ํธ์คํ์ ์ปจํ ์คํธ ๋ฉํ๋ฐ์ดํฐ ํ๋ซํผ์ ํ์ฉํด ํธ๋ผ์ด์ฆ์ ๋ฐ์ดํฐ ์ ๊ทผ ์ญ๋์ ํ์ฅํ๊ณ , ์ฌ์ฉ์๊ฐ AI ๊ธฐ๋ฐ ์ ํ๋ฆฌ์ผ์ด์ ๊ณผ ์์ด์ ํธ๋ฅผ ๊ตฌ์ถํ ๋ ๋ฐ์ดํฐ๋ฅผ ์ปจํ ์คํธํํ ์ ์๋ ์ ํ์ง๋ฅผ ๋ํ ๊ณํ์ด๋ค.
์ ๋ ํธ์คํ๋ ์ด๋ฏธ ํฌ์คํธ๊ทธ๋ SQL(PostgreSQL)๊ณผ ๋ง์ดSQL(MySQL) ๊ฐ์ ๋ฐ์ดํฐ๋ฒ ์ด์ค๋ ๋ฌผ๋ก , ํ๋ธ๋ก(Tableau), ํ์BI ๊ฐ์ BI ๋๊ตฌ, ๊ทธ๋ฆฌ๊ณ dbt์ ์์ดํ๋ก์ฐ ๊ฐ์ ๋ฐ์ดํฐ ํ์ดํ๋ผ์ธยท์ค์ผ์คํธ๋ ์ด์ ๋๊ตฌ์ ์ฐ๋๋ผ ์๋ค.
๊ธฐ์ ์ โAI ๋ค์ดํฐ๋ธโ ๊ธฐ๋ฐ์ ๋๋ฌ์ผ ์ฃผ๋๊ถ ๊ฒฝ์
AI ๊ธฐ๋ฐ ์ ํ๋ฆฌ์ผ์ด์ ๊ณผ ์์ด์ ํธ์ ์์๊ฐ ๊ธ์ฆํ๋ ๊ฐ์ด๋ฐ, ํธ๋ผ์ด์ฆ ๊ธฐ๋ฅ ํ๋๋ ์ค๋ ธ์ฐํ๋ ์ดํฌ๊ฐ ๋ฐ์ดํฐ ๋ฐ ์ ๋๋ฆฌํฑ์ค ์ํฌ๋ก๋์์ ์ฃผ๋๊ถ์ ์ ์ ํ๋ ค๋ ์ ๋ต๊ณผ ๋ง๋ฌผ๋ ค ์๋ค.
HFS ๋ฆฌ์์น CEO ํ ํผ์คํธ๋ โAI ์ํฌ๋ก๋ ๊ฒฝ์์ ์ ์ฅ ๊ณต๊ฐ์ด ์๋๋ผ ๋ฉํ๋ฐ์ดํฐ, ๊ณ๋ณด, ์ ๋ขฐ์ฑ์์ ์น๋ถ๊ฐ ๋๋ค. ํธ๋ผ์ด์ฆ ์นดํ๋ก๊ทธ๋ ํํํ ๊ธฐ๋ฐ์ ๊ฐ์ถ๊ณ ์์ง๋ง, ์ค๋ ธ์ฐํ๋ ์ดํฌ๊ฐ ์์ง ๊ฐ์ถ์ง ๋ชปํ ์๋ ๊ฒ์, ์ปฌ๋ผ ๋จ์ ๊ณ๋ณด, ์ฌ์ฉ๋ ์ธํ ๋ฆฌ์ ์ค, ๊ทธ๋ฆฌ๊ณ ๋ฐ์ดํฐ ๋ถ์๊ฐ์ ๋ฐ๋ณต ์์ ์ ์ค์ฌ์ฃผ๋ ์ฌ์ฉ์ ๊ฒฝํ์ ์ ๋ ํธ์คํ๊ฐ ์ ๊ณตํ๋คโ๋ผ๊ณ ๋ถ์ํ๋ค.
ํผ์คํธ๋ โํ๋ซํผ์ ๋จ์ํ ์ถ๊ฐํ๋ ๊ฒ์ด ์๋๋ผ ๊น์ด ํตํฉ๋ ํํ์ ํ ์คํ ๋ฉํ๋ฐ์ดํฐ ์ธํ ๋ฆฌ์ ์ค๋ฅผ ์ ๊ณตํ๋ ์ญ๋์ ์์ฅ์ ๋ถ๋ช ํ ๊ณต๋ฐฑ์ด ์๋ค. ๋ฐ์ดํฐ๋ธ๋ฆญ์ค๋ ์ ๋ํฐ ์นดํ๋ก๊ทธ๋ฅผ ํตํด ๊ฑฐ๋ฒ๋์ค์ ๊ณ๋ณด ์ธก๋ฉด์์ ๊ฒฉ์ฐจ๋ฅผ ๊ณ์ ๋ฒ๋ฆฌ๊ณ ์๋ค. ์ค๋ ธ์ฐํ๋ ์ดํฌ๋ ์ด๋ฅผ ๋น ๋ฅด๊ฒ ๋ฐ๋ผ์ก์์ผ ํ๋ค๋ ์ ์ ์ ์๊ณ ์๋คโ๋ผ๊ณ ๋งํ๋ค. ์ด์ด ํผ์คํธ๋ ์ด๋ฌํ ์ญ๋ ํ๋ณด๋ฅผ ์ํ ๋น์ ๊ธฐ์ ์ ๋ต์ด ์ค๋ ธ์ฐํ๋ ์ดํฌ ์ ์ฅ์์ ๋ ํจ๊ณผ์ ์ผ ์ ์๋ค๊ณ ์ง๋จํ๋ค.
ISG ์ํํธ์จ์ด ๋ฆฌ์์น ์ ๋ฌด ๋ฐ์ด๋น๋ ๋ฉ๋๊ฑฐ๋ ์ค๋ ธ์ฐํ๋ ์ดํฌ๊ฐ AI ์ ํ๋ฆฌ์ผ์ด์ ์ ์ํ ๋ฐ์ดํฐ ๋ถ์ ์ํฌ๋ก๋ ์์ฅ ์ฃผ๋๊ถ์ ๋๊ณ ๊ตฌ๊ธ, AWS, ๋ง์ดํฌ๋ก์ํํธ(MS) ๋ฑ ์ฃผ์ ํด๋ผ์ฐ ์ ์ฒด์ ๊ฒฝ์ํ๊ณ ์๋ค๊ณ ์ธ๊ธํ๋ค.
๋ฉ๋๊ฑฐ๋ โAI๋ ์ง๊ธ ์์ฅ์์ ๊ฐ์ฅ ํฐ ํ๋์ด๋ฉฐ, ์ ์ ์ผ๋ก ๋ฐ์ดํฐ์ ์์กดํ๋ค. ์ฐ๋ฆฌ ์กฐ์ฌ์์๋ ๊ธฐ์ ์ด AI์ ํ์ฉํ ์ ์๋ ํํ๋ก ๋ฐ์ดํฐ๋ฅผ ์ค๋นํ๋ ๊ณผ์ ์ ๊ฐ์ฅ ์ด๋ ค์ํ๋ ๊ฒ์ผ๋ก ๋ํ๋ฌ๋คโ๋ผ๊ณ ์ค๋ช ํ๋ค.
๊ทธ๊ฐ ์ธ๊ธํ ์์ฅ ๊ฒฝ์์ ๊ฐ๋๋ ์ค๋ ธ์ฐํ๋ ์ดํฌ๊ฐ ์ฌํด ์ถ์งํ ์ธ์ ์ฌ๋ก์์๋ ๋ํ๋๋ค. ์ง๋ 6์ ์ค๋ ธ์ฐํ๋ ์ดํฌ๋ ๋ฏธ๊ตญ์ ํด๋ผ์ฐ๋ ๊ธฐ๋ฐ ํฌ์คํธ๊ทธ๋ SQL ๋ฐ์ดํฐ๋ฒ ์ด์ค ๊ธฐ์ ํฌ๋ฐ์น๋ฐ์ดํฐ(Crunch Data) ์ธ์ ์ํฅ์ ๋ฐํํ๋ค. ์ค๋ ธ์ฐํ๋ ์ดํฌ๋ AI ๋ฐ์ดํฐ ํด๋ผ์ฐ๋์์ โ์ค๋ ธ์ฐํ๋ ์ดํฌ ํฌ์คํธ๊ทธ๋ ์คโ๋ก ๋ถ๋ฆด ํฌ์คํธ๊ทธ๋ SQL ๋ฐ์ดํฐ๋ฒ ์ด์ค๋ฅผ ์ ๊ณตํ๊ณ , ๊ฐ๋ฐ์๊ฐ AI ๊ธฐ๋ฐ ์ ํ๋ฆฌ์ผ์ด์ ์ ๋ณด๋ค ์ฝ๊ฒ ๊ตฌ์ถํ ์ ์๋๋ก ์ง์ํ๋ค๋ ๋ชฉํ๋ฅผ ์ ์ํ๋ค.
์ธ์ ๋ฐํ ์์ ๋ง ๋ณด๋ฉด, ์ค๋ ธ์ฐํ๋ ์ดํฌ๊ฐ ๋ฐ์ดํฐ๋ธ๋ฆญ์ค์ ์คํ์์ค ์๋ฒ๋ฆฌ์ค ํฌ์คํธ๊ทธ๋ ์ค ๊ธฐ์ ๋ค์จ(Neon) ์ธ์์ ๋์ํ ๊ฒ์ผ๋ก ๋ณด์ผ ์ ์๋ค. ๋ถ์๊ฐ๋ค์ ๋ ๊ธฐ์ ์ด ๋ถ์, ์ด์ํ ์คํ ๋ฆฌ์ง, ๋จธ์ ๋ฌ๋์ ์์ฐ๋ฅด๋ โAI ๋ค์ดํฐ๋ธ ๋ฐ์ดํฐ ๊ธฐ๋ฐโ์ ์ ๋ ์๋ฆฌ๋ฅผ ์ฐจ์งํ๊ธฐ ์ํด ๊ฒฝ์ํ๊ณ ์๋ค๊ณ ์ค๋ช ํ๋ค.
๋ํ ์ด๋ฌ ์ด ์ค๋
ธ์ฐํ๋ ์ดํฌ๋ ๋ฐ์ดํ ๋ฉํธ๋ฆฌ(Datometry)๋ฅผ ์ธ์ํ๋ค. ์ค๋
ธ์ฐํ๋ ์ดํฌ๋ ์ด๋ฅผ ํตํด ๊ธฐ์กด์ ๋ฌด๋ฃ๋ก ์ ๊ณตํด ์จ ๋ง์ด๊ทธ๋ ์ด์
๋๊ตฌ ์ธํธ ๊ฐ์ด๋ฐ ํ๋์ธ โ์ค๋
ธ์ฐ์ปจ๋ฒํธ AIโ๋ฅผ ๊ฐํํ๋ฉฐ, ๊ธฐ์กด ๋ฐ์ดํฐ๋ฒ ์ด์ค ์ํฌ๋ก๋๋ฅผ ํด๋ผ์ฐ๋๋ก ์ด์ ํ๋ ค๋ ๊ธฐ์
์ ๋์์ผ๋ก ๋๊ท๋ชจ ์ฝ๋ ์ฌ์์ฑ ๊ณผ์ ์์ ๋ฐ์ํ๋ ๋ถ๋ด, ๋น์ฉ, ๋ถํ์ค์ฑ์ ์ต์ํํ๊ฒ ๋ค๊ณ ๋ฐํ๋ค.
dl-ciokorea@foundryco.com

AI Cybercriminals Target Black Friday and Cyber Monday

AI-enabled cybercriminals are exploiting the holiday shopping season with precision phishing, account takeovers, payment skimming and ransomware, forcing retailers to adopt real-time, adaptive defenses to keep pace.
The post AI Cybercriminals Target Black Friday and Cyber Monday appeared first on Security Boulevard.
Donโt Use a Ruler to Measure Wind Speed: Establishing a Standard for Competitive Solutions Testing

Competitive testing is a business-critical function for financial institutions seeking the ideal solutions provider to help optimize their risk management strategies. Donโt get seduced by inflated test results or flowery marketing claims, however. Selecting the right risk solutions could be one of the most important tasks your business ever undertakes โ and one of the..
The post Donโt Use a Ruler to Measure Wind Speed: Establishing a Standard for Competitive Solutions Testing appeared first on Security Boulevard.
Securing GenAI in Enterprises: Lessons from the Field

Enterprise GenAI success depends on more than modelsโsecurity, observability, evaluation, and integration are critical to move from fragile pilots to reliable, scalable AI.
The post Securing GenAI in Enterprises: Lessons from the Field appeared first on Security Boulevard.
์์ธ ๋ชจ๋ฅด๋ฉด ๋ณด์ ์นจํด ๋ฐ๋ณต๋๋คยทยทยท์กฐ์ง ํ๋ณต๋ ฅ ํ๋๋ โ๋ถ์ ๋ถ์ฌโ
๋๋ถ๋ถ์ ๋ณด์ ์กฐ์ง์์๋ ์ฌ๊ณ ์ดํ ๋ถ์์ด ์ฌ์ ํ ์ค์ํ ๊ณผ์ ๋ก ๋จ์ ์๋ค. ํ์ด๋๋ฆฌ์ โ๋ณด์ ์ฐ์ ์์(Security Priorities)โ ์กฐ์ฌ์ ๋ฐ๋ฅด๋ฉด, ๋ณด์ ๋ฆฌ๋์ 57%๊ฐ ์ง๋ 1๋ ๋์ ๋ฐ์ํ ๋ณด์ ์ฌ๊ณ ์ ๊ทผ๋ณธ ์์ธ์ ํ์ ํ๋ ๋ฐ ์ด๋ ค์์ ๊ฒช์๋ค๊ณ ๋ตํ์ผ๋ฉฐ, ์ด๋ ์ฌ์นจํด ์ํ์ ๋์ฑ ๋์ด๋ ์์ธ์ผ๋ก ๋ํ๋ฌ๋ค.
๋ณด์ ์ ๋ฌธ๊ฐ๋ค์ ์ฌ๊ณ ๋ฐ์ ์ดํ ์ฆ๊ฐ์ ์ธ ์งํ์ ๋ณต๊ตฌ ์๋ฐ์ด ์ปค์ง๋ฉด์, ํ์ต๊ณผ ๋ถ์์ ํฌ์ ๋๋ ์์์ด ๋ถ์กฑํด์ง๋ ๊ฒ์ด ๋ฌธ์ ์ ํต์ฌ์ด๋ผ๊ณ ์ง๋จํ๋ค. ๋ฐ๋ณต ์นจํด ๊ฐ๋ฅ์ฑ์ ๋ฎ์ถ๊ธฐ ์ํด์๋ ์ฌ๊ณ ๋์์ ๋จ์ํ ์ผํ์ฑ ์ ๋ฆฌ ์์ ์ด ์๋๋ผ ์ง์์ ์ธ ํ์ต ์ฃผ๊ธฐ๋ก ์ด์ํด์ผ ํ๋ค๋ ์ค๋ช ์ด๋ค.
๊ด๋ฆฌํ ๋ณด์ ๋์ ๊ธฐ์ ํํธ๋ฆฌ์ค(Huntress)์ ๋ณด์ ์ด์ ์ด๊ด ๋๋ ์ด ์๊ฐ๋ โ๋ง์ ์กฐ์ง์ด ์ฆ๊ฐ์ ์ธ ์นจํด ์ฐจ๋จ์๋ง ์ง์คํ๊ณ ์๋ค. ์ด ๋๋ฌธ์ ์ ์ ํต์ฌ์ ์ธ ํฌ๋ ์ ์กฐ์ฌ๊ฐ ๋ท์ ์ผ๋ก ๋ฐ๋ฆฌ๊ณ , ๊ฒฐ๊ตญ ๋ค์ ๊ณต๊ฒฉ์๊ฐ ๊ทธ๋๋ก ๋ค์ ๋ค์ด์ฌ ์ ์๋ ์ํฉ์ ๋ง๋ค๊ณ ์๋คโ๋ผ๊ณ ์ค๋ช ํ๋ค.
์๊ฐ๋ โ๊ทผ๋ณธ ์์ธ์ ์ ํํ ์ง์ด๋ด๋ ์ฒ ์ ํ ์ฌํ ๋ถ์์ด ์ด๋ค์ง์ง ์์ผ๋ฉด ์กฐ์ง์ ์ฌ์ค์ ๋์ ๊ฐ๋ฆฐ ์ฑ ๋ฐฉ์ดํ๋ ์ ์ด๋ฉฐ, ๊ฐ์ ์ค์๋ฅผ ๋ฐ๋ณตํ๊ฒ ๋๋คโ๋ผ๊ณ ์ง์ ํ๋ค.
๊ทผ๋ณธ ์์ธ ๋ถ์์ ํตํ ํ๋ณต๋ ฅ ๊ฐํ
์ ๋ฌธ๊ฐ๋ค์ ๋ง์ ๊ธฐ์ ์ด ์ฌ๊ณ ๋์์ ๋ถ์์ด ์๋ ์ด์ ์ค์ฌ์ ์ ์ฐจ๋ก๋ง ์ทจ๊ธํ๊ณ ์๋ค๊ณ ์ง์ ํ๋ค. ์ด ๋๋ฌธ์ ์นจํด ์ฐจ๋จ๊ณผ ๋ณต๊ตฌ ๊ฐ์ ์ ์ฐจ๋ ์ถฉ๋ถํ ๋ฐ๋ณต ์ฐ์ต๋ผ ์์ง๋ง, ์ฌ์ธต ํฌ๋ ์ ์กฐ์ฌ๋ ์ฌ๊ณ ์ดํ์ ํ์ต์ ๋ค์ฒ์ง๊ณ ์๋ค.
๊ด๋ฆฌํ ๋ณด์ ์๋น์ค ๊ธฐ์ ๋ธ๋ฃจ๋ณด์ด์ธํธ(BlueVoyant)์ ๋์งํธ ํฌ๋ ์ยท์ฌ๊ณ ๋์ ๋๋ ํฐ ํฐ ๋ฌด์ด๋ โ์ฆ๊ฑฐ ๋ณด์กด๊ณผ ๊ทผ๋ณธ ์์ธ ๋ถ์์ด ์ฒด๊ณ์ ์ผ๋ก ์ด๋ค์ง์ง ์์ผ๋ฉด ์ค์ํ ํต์ฐฐ์ด ์ฌ๋ผ์ง๊ฒ ๋๋ค. ๊ฒฌ๊ณ ํ ์ฌ๊ณ ๋์์ ๋จ์ํ ์์คํ ์ ๋ค์ ๊ฐ๋ํ๋ ๋ฐ ๊ทธ์น์ง ์๋๋ค. ์ฌ๊ณ ๋ก๋ถํฐ ์ป์ ๊ตํ์ ํ์งยท์๋ฐฉยท์ํ ๊ฐ์ ์ ๋ต์ ๋ฐ์ํ๋ ๊ณผ์ ๊น์ง ํฌํจํด์ผ ํ๋คโ๋ผ๊ณ ์ค๋ช ํ๋ค.
๋ฌด์ด๋ ๋ํ โ์ด ๊ฐ์ด ์ง์์ ์ผ๋ก ํ์ต ๋ฐ ๊ฐ์ ํ๋ ์ํ ๊ตฌ์กฐ๊ฐ ์ฅ๊ธฐ์ ์ธ ํ๋ณต๋ ฅ์ ๊ฐํํ๋ค. ๋น ๋ฅด๊ฒ ๋ณํํ๊ณ ์ ์ํ๋ ์ฌ์ด๋ฒ ์ํ ํ๊ฒฝ์์๋ ๊ทธ ๊ฐ์น๊ฐ ๋์ฑ ์ปค์ง๋คโ๋ผ๊ณ ๋งํ๋ค.
ํด๋ผ์ฐ๋ ๋ณด์ ๊ธฐ์ ์ ํ๋ฆฌ์ค(Semperis)์ ์๊ธฐ๊ด๋ฆฌ ์์ ์ปจ์คํดํธ ๋ง๋ฆฌ ํ๊ทธ๋ ์ด๋ธ์ค๋ โ๋๋ค์ ์กฐ์ง์ โ๋ถ๊ธธ์์ ๋ฌด์์ ๋ฐฐ์ธ์งโ๋ณด๋ค โ๋์์ ๋ถ์ ๋๋ ๋ฐโ ๋ ์ง์คํ๊ณ ์๋คโ๋ผ๊ณ ํ๊ฐํ๋ค.
๊ทธ๋ ๋ชจ๋ ์๊ธฐ๊ฐ ๊ฐ์ง, ๋์, ๊ฒํ ๋ผ๋ 3๋จ๊ณ๋ก ๊ตฌ์ฑ๋๋ค๊ณ ์ธ๊ธํ๋ฉฐ, โํ๋ณต๋ ฅ์ด ๊ตฌ์ถ๋๋ ์ง์ ์ 3๋ฒ์งธ ๋จ๊ณ์ธ ์ฌํ ๊ฒํ ๊ณผ์ ์ด๋ค. ์ค์๊ฐ ๋ฐ์ดํฐ๋ฅผ ์์งํ๊ณ ์ด๋ฅผ ๋ฉด๋ฐํ ๋ถ์ํด, ๋์ถ๋ ๊ตํ์ ์ค์ ์กฐ์น๋ก ์ฐ๊ฒฐํ๋ ์กฐ์ง์ ๋ ๋น ๋ฅด๊ฒ ํ๋ณตํ๊ณ ๋ ๊ฐํด์ง๋ค. ์ฌ๊ณ ๋์์ ๋จ์ํ ์ด์๋จ๋ ๊ฒ์ด ์๋๋ผ, ๋ณํ์ ์ ์ํ๋ฉฐ ํ๋ณต๋ ฅ์ ์๋ ๊ณผ์ โ์ด๋ผ๊ณ ์กฐ์ธํ๋ค.
๊ณต๊ฒฉ ๊ฒฝ๋ก ์ถ์
์ถฉ๋ถํ ์ฌ์ ๋๋น๊ฐ ํ์์ด๊ธฐ ๋๋ฌธ์, ๊ธฐ์ ์ SIEM(๋ณด์ ์ฌ๊ณ ๋ฐ ์ด๋ฒคํธ ๊ด๋ฆฌ) ๊ฐ์ ๊ธฐ์ ์ ํตํด ๋์งํธ ํฌ๋ ์์ ํ์ํ ์ ์ฉ ๋๊ตฌ์ ์ญ๋์ ๊ฐ์ถฐ์ผ ํ๋ค.
SIEM์ด ์ค์ํ ์ด์ ๋ ๊ฒ์ดํธ์จ์ด์ VPN ์ฅ๋น ์๋น์๊ฐ ๋ช ์๊ฐ ๋ด์ ์์ฒด ์ ์ฅ ๊ณต๊ฐ์ ๋ฎ์ด์ฐ๋๋ก ์ค๊ณ๋ผ ์๊ธฐ ๋๋ฌธ์ด๋ค.
ํํธ๋ฆฌ์ค์ ์๊ฐ๋ โ๊ณต๊ฒฉ์๊ฐ VPN์ ํตํด ์นจํฌํ ๋ค ํ๋ฃจ ์ ๋ ๋ด๋ถ์ ๋จธ๋ฌผ๋ค๊ฐ ํต์ฌ ์๋ฒ๋ก ์ด๋ํ๋ฉด, ๊ทธ ์ฌ์ด์ VPN ํ ๋ ๋ฉํธ๋ฆฌ ์ ๋ณด๋ ์ด๋ฏธ ์ฌ๋ผ์ก์ ๊ฐ๋ฅ์ฑ์ด ํฌ๋ค. SIEM์ฒ๋ผ VPN ๋ก๊ทธ๋ฅผ ์ค์์์ ์์งยท๋ณด์กดํ๋ ์ฒด๊ณ๋ฅผ ๋ง๋ จํ๋ฉด ์ฌ๊ณ ์ดํ ํ์ง๋ ๋ฌผ๋ก , ์ด๊ธฐ ์นจํด๊ฐ ์ด๋ป๊ฒ ๋ฐ์ํ๋์ง ๊ทผ๋ณธ ์์ธ์ ๋ถ์ํ๋ ๋ฐ ํ์ํ ํต์ฌ ๋ฐ์ดํฐ๋ฅผ ํ๋ณดํ ์ ์๋คโ๋ผ๊ณ ๋งํ๋ค.
ํํธ๋ฆฌ์ค์ ํต๊ณ์ ๋ฐ๋ฅด๋ฉด, ์๋ จ๋ ๋์ ์ฌ์ด๋ฒ ๋ฒ์ฃ์์ ์ฝ 70%๊ฐ VPN์ ํตํด ์นจ์ ํ๋ ๊ฒ์ผ๋ก ๋ํ๋ฌ๋ค. ์๊ฐ๋ โSIEM์ ๋์ ํ ํ๊ฒฝ์์๋ ๊ณต๊ฒฉ ๊ฒฝ๋ก ์ด๊ธฐ์ ์ํ์ ํฌ์ฐฉํ ์ ์์ ๋ฟ ์๋๋ผ, ์ฌํ ๋ถ์์ ํตํด ์นจํด๋ก ์ด์ด์ง ์ ํํ ๊ทผ๋ณธ ์์ธ์ ๊ท๋ช ํ๋ ์์ ๋ ๊ฐ๋ฅํ๋คโ๋ผ๊ณ ์ค๋ช ํ๋ค.
๋ํ MDR(๊ด๋ฆฌํ ํ์งยท๋์), XDR(ํ์ฅํ ํ์งยท๋์) ๊ฐ์ ๋ค์ํ ์๋น์ค์ ํฌ๋ ์ ์บก์ฒ ์ํํธ์จ์ด๋ฅผ ํฌํจํ ์๋ ์๋ค. ์ด๋ฐ ๊ธฐ์ ์ ๋ฒค๋์ ํฌ๋ ์ ์กฐ์ฌ ์ ๋ฌธ๊ฐ๊ฐ ํ๋ ฅํด ์นจํด์ ์ถ๋ฐ์ ์ ์๋ณํ๊ณ ์ด๋ฅผ ํด๊ฒฐํ๋ ๋ฐ ํ์ํ ๋ถ์๊ณผ ์กฐ์น๋ฅผ ์ํํ ์ ์๋๋ก ์ง์ํ๋ค.
์ฌ์ด๋ฒ ๋ณด์ ๊ธฐ์ ์ํ๋ฌ์ค ์ปค๋ฎค๋์ผ์ด์ (Securus Communication)์ CTO ๋กญ ๋๋น์ ๋ โ์ด๋ฐ ๋๊ตฌ๊ฐ ๊ฐ์ถฐ์ ธ ์์ง ์์ผ๋ฉด ์นจํด๊ฐ ์ด๋ป๊ฒ ๋ฐ์ํ๋์ง ์ฌํ์ ํ์ ํ๊ธฐ๊ฐ ํจ์ฌ ์ด๋ ค์์ง๋ค. ์นจํด๊ฐ ๋ฐ์ํ์ ๋ ์ฌ๊ณ ๋์ ์๋น์ค๋ฅผ ์ ๊ณตํ๋ ๊ธฐ์ ๋ ์์ง๋ง, ์นจํด๋ฅผ ์ ์ํ ์ ๋ฆฌํ๊ณ ์ฌ๋ฐ์ ๋ง๋ ํต์ฌ์ ๋์์ ํจ์ฌ ํจ์จ์ ์ผ๋ก ์ํํ๋ ๋๊ตฌ์ ์ ์ฐจ๋ฅผ ๋ฏธ๋ฆฌ ๊ฐ์ถ๋ ๋ฐ ์๋คโ๋ผ๊ณ ๋งํ๋ค.
์ํด๋ ํฑIQ(EclecticIQ)์ ์๋์ด ์ํ ์ธํ ๋ฆฌ์ ์ค ์ ๋๋ฆฌ์คํธ ์๋ฅด๋ค ๋ท์ ์นด์ผ๋ โ๊ทผ๋ณธ ์์ธ ๋ถ์์ด ์ถฉ๋ถํ ์ด๋ค์ง์ง ์์ผ๋ฉด ์ค์ ๊ณต๊ฒฉ ์์ธ์ด ์ฌ์ ํ ํ์ ๋์ง ์์ ์ํ๋ก ๋จ์ ์์ ์ ์๊ณ , ์ฌ์ง์ด ํ์ฑ ์ํ์ผ ๊ฐ๋ฅ์ฑ๋ ์๋คโ๋ผ๊ณ ์ง์ ํ๋ค.
๋ท์ ์นด์ผ๋ โ๋์งํธ ํฌ๋ ์ ์ ๋ฌธ์ฑ, ๊ทผ๋ณธ ์์ธ ๋ถ์ ์ ์ฐจ, ์ํ ์ธํ ๋ฆฌ์ ์ค ํตํฉ์ ํตํด ๊ฐ๋ณ ์ฌ๊ณ ๋ฅผ ๊ณต๊ฒฉ์์ ์ ์ ๋ฐ ์บ ํ์ธ๊ณผ ์ฐ๊ฒฐํ๋ ์ ๊ทผ์ด ํ์ํ๋ค. ์ด๋ฐ ๋ฐฉ์์ ์กฐ์ง์ด ๊ฒฝํํ๋ ๋ชจ๋ ์ฌ๊ณ ๋ฅผ ํ๋ณต๋ ฅ ๊ฐํ์ ๊ณ๊ธฐ๋ก ์ผ๋ ๊ธฐ๋ฐ์ด ๋๋คโ๋ผ๊ณ ์กฐ์ธํ๋ค.
์ฒด๊ณ์ ์ธ ๊ณํ ์๋ฆฝ
์ฌ๊ณ ๊ฐ ๋ฐ์ํ์ ๋ ์ํฉ์ ์ด๊ดํ๋ ๋์ํ์ ์ผ๋ฐ์ ์ผ๋ก CISO๊ฐ ์ฃผ๋๊ถ์ ํ์ฌํ๋๋ก ํด์ผ ํ๋ค. ๋ํ IT ๋ด๋น์๋ถํฐ ๋ฒ๋ฅ ์๋ฌธ๊น์ง ๊ฐ ์ดํด๊ด๊ณ์์ ์ญํ ๊ณผ ์ฑ ์์ด ๊ณํ์์ ๋ช ํํ ์ ์๋ผ ์์ด์ผ ํ๋ค.
์ ๋ฌธ๊ฐ๋ค์ ์ฌ๊ณ ๋์ ํ๋ ์ด๋ถ์ด ์ผ๋ฐ์ ์ผ๋ก ๋ค์ ํต์ฌ ๋จ๊ณ๋ฅผ ์ด๋ฃฌ๋ค๊ณ ์ค๋ช ํ๋ค.
- ์ค๋น ๋จ๊ณ: ๊ฒ์ฆ๋ ์ฌ๊ณ ๋์ ๊ณํ์ ์ ์งํ๊ณ , ์ญํ ๊ณผ ๋ณด๊ณ ์ฒด๊ณ๋ฅผ ๋ช ํํ ํ๋ค.
- ํ์ง ๋ฐ ๋ถ์: ๋ชจ๋ํฐ๋ง์ ์ค์ํํ๊ณ , ์ํ ์ธํ ๋ฆฌ์ ์ค๋ฅผ ํ์ฉํ๋ฉฐ ํฌ๋ ์ ์ญ๋์ ํ๋ณดํ๋ค.
- ์ฐจ๋จ ๋ฐ ๋ณต๊ตฌ: ์ ์ํ๊ฒ ๋์ํ๋ ์ฆ๊ฑฐ๋ฅผ ๋ณด์กดํ๊ณ , ๋ณต๊ตฌ ์ ์ ์์คํ ์ ๊ฒ์ฆํ๋ค.
- ์ฌํ ๋ถ์: ๊ตฌ์กฐํ๋ ๊ฒํ ๋ฅผ ์ํํด ๊ฒฐ๊ณผ๋ฅผ ๋ฌธ์ํํ๊ณ , ์ด๋ฅผ ๋ณด์ ์ํคํ ์ฒ์ ๊ต์ก์ ๋ฐ์ํ๋ค.
- ์ง์์ ๊ฐ์ : ์ํ ๋ชจ๋ธ๋ง์ ํตํฉํ๊ณ , ๋์ ์๋ํ๋ฅผ ํ๋ํ๋ฉฐ, ์ญ๋ ๊ฐ๋ฐ์ ํฌ์ํ๋ค.
๋ง์ ์กฐ์ง์ด ISO ๋ฑ ์ด๋ฏธ ๊ฒ์ฆ๋ ํ๋ ์์ํฌ๋ฅผ ์ฌ๊ณ ๋์ ์ฒด๊ณ์ ํ ํ๋ฆฟ์ผ๋ก ํ์ฉํ๊ณ ์๋ค. ์ธํฐ๊ทธ๋ฆฌํฐ360(Integrity360)์ CTO ๋ฆฌ์ฒ๋ ํฌ๋๋ โ์ด๋ฐ ํ๋ ์์ํฌ๋ ๊ฑฐ๋ฒ๋์ค๋ถํฐ ๊ธฐ์ ์ ๋์๊น์ง ๋ชจ๋ ํต์ฌ ์์๋ฅผ ์ฒด๊ณ์ ์ผ๋ก ๊ตฌ์ฑํ ์ ์๋๋ก ์น์ ๋จ์๋ก ์ ๋ฆฌ๋ผ ์๋ค. ๋๋ฆฌ ์๋ ค์ง ํ๋ ์์ํฌ๋ฅผ ์ฌ์ฉํ๋ฉด ์์ฑ๋๋ฅผ ๋์ผ ์ ์์ ๋ฟ ์๋๋ผ, ํด๋น ๊ธฐ์ค์ ์ต์ํ ์ธ๋ถ ์ดํด๊ด๊ณ์์์ ์ํต๋ ํจ์ฌ ์์ํด์ง๋คโ๋ผ๊ณ ์ค๋ช ํ๋ค.
์กฐ์ง ํ๋ณต๋ ฅ ๊ตฌ์ถ
ํจ๊ณผ์ ์ธ ์ฌ๊ณ ๋์์ ์๊ฐ์ด ์ง๋ ์๋ก ์กฐ์ง์ ํ๋ณต๋ ฅ์ ๋์ผ ์ ์๋๋ก, ์ฒด๊ณ์ ์ผ๋ก ๊ตฌ์กฐํ๋๊ณ ๋ฐ๋ณต์ ์ผ๋ก ์คํ ๊ฐ๋ฅํ๋ฉฐ ์ธํ ๋ฆฌ์ ์ค๋ฅผ ๊ธฐ๋ฐ์ผ๋ก ์ด์๋๋ ํ๋ก์ธ์ค๋ฅผ ๊ตฌ์ถํ๋ ๋ฐ ์ด์ ์ ๋ฌ์ผ ํ๋ค.
์ฌ๊ณ ๋์ ๊ณํ์ ๋ชจ์ ํ๋ จ์ด๋ ํ ์ด๋ธํ ํ๋ จ ๋ฑ์ ํตํด ์ ๊ธฐ์ ์ผ๋ก ํ ์คํธํ๊ณ ๋ณด์ํ๋ฉฐ ์ ๋ฐ์ดํธํด์ผ ํ๋ค. ์ด๋ ๋ ๋์ ์ฐจ์์ ๋น์ฆ๋์ค ์ฐ์์ฑ ๋ฐ ์กฐ์ง ํ๋ณต ์ ๋ต์ ์ผ๋ถ๋ก ์ํ๋ผ์ผ ํ๋ค.
์ฌ์ด๋ฒ ๋ณด์ ๊ธฐ์ ํธ๋ ๋๋ง์ดํฌ๋ก(Trend Micro)์ ํ๋ CTO ๋ฐ๋ผํธ ๋ฏธ์คํธ๋ฆฌ๋ ๋ง์ ์กฐ์ง์ด ์ฌ์ ํ ์ฌ๊ณ ๋์ ์ฒด๊ณ๊ฐ ์ถฉ๋ถํ ์ฑ์ํ ์์ค์ ์ด๋ฅด์ง ๋ชปํ๊ณ ์๋ค๊ณ ์ง์ ํ๋ค. ๊ทธ๋ ์ฌ๊ณ ๋์์ด ๋จ์ํ ์ฐจ๋จ๊ณผ ๋ณต๊ตฌ์ ๊ทธ์ณ์๋ ์ ๋๋ฉฐ, ํฌ๋ ์ ๋ถ์๊ณผ ์ฌํ ๊ฒํ ๊น์ง ํ์ฅ๋ผ์ผ ํ๋ค๊ณ ๊ฐ์กฐํ๋ค.
๋ฏธ์คํธ๋ฆฌ๋ โ๊ทผ๋ณธ ์์ธ ๋ถ์์ ๊ฑด๋๋ฐ๋ฉด ๊ฒฐ๊ตญ ๊ฒ์ผ๋ก ๋๋ฌ๋ ์ฆ์๋ง ํด๊ฒฐํ๋ ์ ์ด๋ค. ์ด๋ฐ ๋ฌธ์ ๋ ์ฌ๋ฌ ์์ธ์ด ๊ฒน์ณ ๋ฐ์ํ๋ค. ๊ณต๊ฒฉ ๊ณผ์ ์ ์ ํํ ์ฌ๊ตฌ์ฑํ๊ธฐ ์ด๋ ต๊ฒ ๋ง๋๋, ๋๊ตฌ ๊ฐ ๋จ์ ๋ก ์ธํ ๊ฐ์์ฑ ๋ถ์กฑ, ํฌ๋ ์๊ณผ ์ํ ํํ ์ญ๋์ด ๋ถ์กฑํ ์ธ์ฌ ๊ฒฉ์ฐจ, ๊ทธ๋ฆฌ๊ณ ์ฌํ ๋ถ์์ด ํ์์ ์ผ๋ก ๋๋๊ฑฐ๋ ์์ ์๋ต๋๋ ํ๋ก์ธ์ค ์ทจ์ฝ์ ์ด ๋ํ์ ์์ธ์ด๋คโ๋ผ๊ณ ์ง์ ํ๋ค.
โ์นจํดโ๋ณต๊ตฌโ์ฌ์นจํดโ์ ์ ์ํ ๋๊ธฐ
๋ง์ ๊ฒฝ์ฐ ์ด์์ ์ ์ํ ๋ณต๊ตฌํ๋ ๋ฐ๋ง ์ง์คํ๋ค ๋ณด๋, ์๋ฒ ์ด๊ธฐํ๋ ๋ก๊ทธ ์์ค, ํฌ๋ ์ ํ์ ์์ค ๋ฑ ํต์ฌ ์ฆ๊ฑฐ๊ฐ ์๋์น ์๊ฒ ์ฌ๋ผ์ง๊ณค ํ๋ค.
๋ฏธ์คํธ๋ฆฌ๋ โ์ฌ๊ธฐ์ ์ ๋ฌด ์๋ฐ, ์๊ฐ ์ ์ฝ, ์ ํ๋ ์์ ๋ฑ์ด ๊ฒน์น๋ฉด์, ์ฌ๊ณ ๋ก๋ถํฐ ๋ฌด์์ ๋ฐฐ์ธ์ง๋ณด๋ค ๋ค์ ๊ธด๊ธ ์ ๋ฌด๋ฅผ ์ฒ๋ฆฌํ๋ ๋ฐ ๋ ๋ชฐ๋ํ๊ฒ ๋๋ค. ๊ทธ ๊ฒฐ๊ณผ, ์ฌํ ์ค์บ์ด๋ ๊ทผ๋ณธ ์์ธ ๋ถ์, ์ ์ฐจ ์ ๋ฐ์ดํธ ๊ฐ์ ํ์ ์์ ์ด ์์ฃผ ๊ฑด๋๋ฐ์ด์ง๋คโ๋ผ๊ณ ์ค๋ช ํ๋ค.
์ด๋ ๊ฒ ๋๋ฉด ์ด๊ธฐ ๊ณต๊ฒฉ ๊ฒฝ๋ก์ ๋ด๋ถ ํ์ฐ ๋ฐฉ์์ด ๋๋ด ๊ท๋ช ๋์ง ๋ชปํ ์ฑ ์ทจ์ฝ์ ์ด ๋จ๊ฒ ๋๊ณ , ์ด๋ โ์นจํด-๋ณต๊ตฌ-์ฌ์นจํดโ๊ฐ ๋ฐ๋ณต๋๋ ์ ์ํ์ ๋ง๋ ๋ค.
๋ฏธ์คํธ๋ฆฌ๋ โ์ด ์
์ํ์ ๋๊ธฐ ์ํด์๋ ์กฐ์ง์ด ์ฌ๊ณ ๋์ ์ ๋ต์ ํฌ๋ ์ ์ค๋นํ์ธ๋ฅผ ๋ฐ๋์ ํฌํจํด์ผ ํ๋ค. ์ฆ๊ฑฐ ๋ณด์กด, ์ฒด๊ณ์ ์ธ ์ฌํ ๋ถ์, ํ์ต ๋ด์ฉ์ ๋ณด์ ์ํคํ
์ฒ์ ๊ต์ก์ ๋ฐ์ํ๋ ๊ณผ์ ์ด ํ์โ๋ผ๊ณ ์กฐ์ธํ๋ค.
dl-ciokorea@foundryco.com

Why Network Monitoring Matters: How Seceon Enables Proactive, Intelligent Cyber Defence
In todayโs fast-evolving digital world, organizations increasingly rely on hybrid workforces, cloud-first strategies, and distributed infrastructures to gain agility and scalability. This transformation has expanded the network into a complex ecosystem spanning on-premises, cloud, and remote endpoints, vastly increasing the attack surface. Cyber adversaries exploit this complexity using stealth techniques like encrypted tunnels, credential misuse,
The post Why Network Monitoring Matters: How Seceon Enables Proactive, Intelligent Cyber Defence appeared first on Seceon Inc.
The post Why Network Monitoring Matters: How Seceon Enables Proactive, Intelligent Cyber Defence appeared first on Security Boulevard.
What is NVIDIAโs CUDA and How is it Used in Cybersecurity?
Welcome back my aspiring cyberwarriors!
You have likely heard of the company NVIDIA. Not only are the dominant company in computer graphics adapters (if you are gamer, you likely have one) and now, artificial intelligence. In recent weeks, they have become the most valuable company in the world ($5 trillion).
The two primary reasons that Nvidia has become so important to artificial intelligence are:
- Nvidia chips can process data in multiple threads, in some cases, thousands of threads. This makes doing complex calculations in parallel possible, making them much faster.
- Nvidia created a development environment named CUDA for harnessing the power of these powerful CPUโs. This development environment is a favorite among artificial intelligence, data analytics, and cybersecurity professionals.
Letโs a brief moment to examine this powerful environment.
What is CUDA?
Most computers have two main processors:
CPU (Central Processing Unit): General-purpose, executes instructions sequentially or on a small number of cores. These CPUโs such as Intel and AMD provide the flexibility to run many different applications on your computer.
GPU (Graphics Processing Unit): These GPUโs were originally designed to draw graphics for applications such as games and VR environments. These GPUโs contain hundreds or thousands of small cores that excel at doing the same thing many times in parallel.
CUDA (Compute Unified Device Architecture) is NVIDIAโs framework that lets you take control of the GPU for general computing tasks. In other words, CUDA lets you write code that doesnโt just render graphicsโit crunches numbers at massive scale. Thatโs why itโs a favorite for machine learning, password cracking, and scientific computing.
Why Should Hackers & Developers Care?
CUDA matters as an important tool in your cybersecurity toolkit because:
Speed: A GPU can run password hashes or machine learning models orders of magnitude faster than a CPU.
Parallelism: If you need to test millions of combinations, analyze huge datasets, or simulate workloads, CUDA gives you raw power.
Applications in Hacking: Tools like Hashcat and Pyrit use CUDA to massively accelerate brute-force and dictionary attacks. Security researchers who understand CUDA can customize or write their own GPU-accelerated tools.
The CUDA environment sees the GPU as a device with:
Threads: The smallest execution unit (like a tiny worker).
Blocks: Groups of threads.
Grids: Groups of blocks.
Think of it like this:
- A CPU worker can cook one meal at a time.
- A GPU is like a kitchen with thousands of cooksโwe split the work (threads), organize them into brigades (blocks), and assign the whole team to the job (grid).
Coding With CUDA
CUDA extends C/C++ with some keywords.
Hereโs the simple workflow:
- You write a kernel function (runs on the GPU).
- You call it from the host code (the CPU side).
- Launch thousands of threads in parallel โ GPU executes them fast.
Example skeleton code:
c__global__ void add(int *a, int *b, int *c) {
int idx = threadIdx.x;
c[idx] = a[idx] + b[idx];
}
int main() {
// Allocate memory on host and device
// Copy data to GPU
// Run kernel with N threads
add<<<1, N>>>(dev_a, dev_b, dev_c);
// Copy results back to host
}
The keywords:
__global__โ A function (kernel) run on the GPU.threadIdxโ Built-in variable identifying which thread you are.<<<1, N>>>โ Tells CUDA to launch 1 block of N threads.
This simple example adds two arrays in parallel. Imagine scaling this to millions of operations at once!
The CUDA Toolchain Setup
If you want to try CUDA make certain you have the following items:
1. an NVIDIA GPU.
2. the CUDA Toolkit (contains compiler nvcc).
3. Write your CUDA programs in C/C++ and compile it with nvcc.
Run and watch your GPU chew through problems.
To install the CUDA toolkit in Kali Linux, simply enter;
kali > sudo apt install nvidia-cuda-toolkit

Next, write your code and compile it with nvcc, such as;
kali > nvcc hackersarise.cu -o hackersarise

Practical Applications of CUDA
CUDA is already excelling at hacking and computing applications such as;
- Password cracking (Hashcat, John the Ripper with GPU support).
- AI & ML (TensorFlow/PyTorch use CUDA under the hood). Our application of using Wi-Fi to see through walls uses CUDA.
- Cryptanalysis (breaking encryption) & simulation tasks.
- Network packet analysis at high scale.
As a beginner, start with small projectsโthen explore how to take compute-heavy tasks and offload them to the GPU.
Summary
CUDA is NVIDIAโs way of letting you program GPUs for general-purpose computing. To the hacker or cybersecurity pro, itโs a way to supercharge computation-heavy tasks.
Learn the thread-block-grid model, write simple kernels, and then think: what problems can I solve dramatically faster if run in parallel?
Fragmented SSE Is a Risk You Canโt Afford
Data Dilemmas: Balancing Privacy Rights in the Age of Big Tech

The world is becoming increasingly more digital and, whilst this is a good thing for a number of different reasons, this huge shift brings with it questions and scrutiny as to what exactly these huge tech companies are doing with such vast amounts of data.
The leading tech companies, including Google, Apple, Meta, Amazon and Microsoft โ giants within the tech world โ have all recently been accused of following unethical practices.
From Meta being questioned in courts over its advertising regime, to Amazon facing concerns over the fact that their Echo devices are potentially recording private conversations within the home, itโs not surprising that users are looking for more information as to how their data is being used.
With this comes the counterargument that big tech companies are doing what they can to strike the balance between privacy rights and ensuring that their product and the experience users get from using them donโt change.ย But, how exactly are the big tech companies using and utilising sensitive and personal data while ensuring they still meet and adhere to the ever-expanding list of privacy rights? Letโs take a look.
Is Our Data The Price We Pay For Free?
In marketplaces and stores, we exchange legitimate currency for goods and services. But, with social media and other online platforms, weโre instead paying with our attention. A lot of online users are unaware of the expansive trail of browsing and search history that they leave behind.
Almost everything is logged and monitored online, right from the very first interaction and, depending on the web browser you use, some will collect more information than others. There are costs involved in almost every digital and online service we use and it costs money to host servers and sites โ so why do we get to browse for free?
Simply because the cost is being underwritten in other ways. The most common form is through advertising, but the ways that only a few people think about, or want to think about, is through the harvesting and use of our data. Every single website is tracked or recorded in different ways and by different people, from marketing agencies who analyze the performance of a website to broadband providers who check connections.
Users will struggle to understand why companies want their data, but thatโs simply because they donโt quite understand the value behind it. Data is currently considered to be one of the most valuable assets, mainly because it is a non-rival entity โ this means that it can be replicated for free and with little to no impact on the quality. The nature of data means that it can be used for product research, market analysis or to train and better inform AI systems. All companies want more data in order to have as many financial and legal incentives and rights as they can.
What Are Cookies?
Data tracking is done through cookies, which are small files of letters and numbers which are downloaded onto your computer when you visit a website. They are used by almost all websites for a number of reasons, such as remembering your browsing preferences, keeping a record of what youโve added to your shopping basket or counting how many people visit the site. Cookies are why you might see ads online months after visiting a website or get emails when youโve left something in a shopping basket online.
Why Do Big Tech Companies Want User Data?
How Laws Have Changed How Companies Use Your Data
In the EU, data is more heavily protected than it is in the US, for example. EU laws have taken a more hardline stance against the big tech companies when it comes to protecting users, with the General Data Protection Regulation, or GDPR, in place to offer the โtoughest privacy and security law in the worldโ.
This law makes it compulsory for companies, particularly big tech companies, to outline specifically what it is they are using data for. This law was passed in 2016 and any company which violates it is subjected to fines which either total 4% of the companyโs overall revenue, or โฌ20 million โ whichever is greater. In 2019, Google was fined a huge โฌ57 million for violating GDPR laws, citing that they posed huge security risks.
Unlike the EU, the US does not have comprehensive laws to protect online users, which is what allows these companies to have access to data that they can then use to take advantage of said data. Following the EUโs introduction of GDPR, both Facebook and Google had to change and update their privacy rights and laws, but in the US, there is still some way to go.
This is because Google makes a lot of money from their user data. Over 80% of Googleโs revenue comes from the advertising aspect of its business, which allows advertisers to target ads for services and products based on what users are searching for, with this information gathered from Google. Google is the largest search engine in the world, so all of these userโs data quickly adds up. Itโs been said that โGoogle sells the data that they collect so the ads can be better suited to userโs interests.โ.
Advertisers will also make use of Googleโs Analytic data, which is a service that gives companies insight into their website activity by tracking users who land on there. A few years ago, there were rumours that Google Analytics wrongly gave U.S intelligence agencies access to data from French users, whilst Google hadnโt done enough in order to ensure privacy when this data was transferred between the US and Europe.
Reasons Why Big Tech Companies Want Your User Data
- Social media apps want information on how you use their platform in order to give you content that you actually want. TikTok in particular works to build you a customised and personalised algorithm to try and show you videos that you will actually engage with to keep you on the app for longer based on ads and content that you have previously watched and engaged with.
- Big tech companies will be interested in your data so that they can show you relevant ads. Most of the big tech companies make a lot of money through advertising on their platform, so they want to ensure that they keep advertisers happy by showing their services or products to the consumers who are more likely to convert.
- Your data will be used to personalise your browsing and platform experience to keep you coming back.
How Is Data Collection Changing?
One of the biggest reasons why companies are using your data is in order to serve you better when you are online. But, in terms of big tech companies, these reasons are often very different. With more and more people relying on technology provided by the likes of Google, Apple, Microsoft and Amazon, these companies need to be more reliable and be held to accountability more so that the rights of consumers are protected.
Changes and popularity in technology such as AI and cryptocurrency are becoming increasingly more common, and with these technologies comes the increase in risks of scams and fraud, such as the recent Hyperverse case. It is important now more than ever for these companies to put userโs minds at ease and improve their privacy rights.
Originally posted 2024-04-13 23:13:36. Republished by Blog Post Promoter
The post Data Dilemmas: Balancing Privacy Rights in the Age of Big Tech first appeared on Information Technology Blog.
Ads, analytics, comments, dns, privacy ...
In the past I tested GoAccess as solution to monitor page views, visitors activity and technology. I also compared it to the Google Analytics. When I wrote article about Anonymous Tor Phone I received one comment like:
How fucking ironic is
GoAccess and real website stats
Does Google Analytics shows the same stats as logs from your server? Sure it doesnโt. A lot of people (including me) use various Privacy tools, Ads or
Worry-free Pentesting: Continuous Oversight In Offensive Security Testing
In your cybersecurity practice, do you ever worry that youโve left your back door open and an intruder might sneak inside? If you answered yes, youโre not alone. The experience can be a common one, especially for security leaders of large organizations with multiple layers of tech and cross-team collaboration to accomplish live, continuous security workflows.
At Synack, the better way to pentest is one thatโs always on, can scale to test for urgent vulnerabilities or compliance needs, and provides transparent, thorough reporting and coverage insight.
Know whatโs being tested, where itโs happening and how often itโs occurringย
With Synack365, our Premier Security Testing Platform, you can find relief in the fact that weโre always checking for unlocked doors. To provide better testing oversight, we maintain reports that list all web assets being tested, which our customers have praised. Customer feedback indicated that adding continuous oversight into host assets would also help to know which host or web assets are being tested, when and where theyโre being tested, and how much testing has occurred.ย
Synackโs expanded Coverage Analytics tells you all that and more for host assets, in addition to our previous coverage details on web applications and API endpoints, all found within the Synack platform. With Coverage Analytics, Synack customers are able to identify which web or host assets have been tested and the nature of the testing performed. This is helpful for auditing purposes and provides proof of testing activity, not just that an asset is in scope. Additionally, Coverage Analytics gives customers an understanding of areas that havenโt been tested as heavily for vulnerabilities and can provide internal red team leaders with direction for supplemental testing and prioritization.ย
Unmatched Oversight of Coverageย
Other forms of security testing are unable to provide the details and information Synack Coverage Analytics does. Bug bounty testing typically goes through the untraceable public internet or via tagged headers, which require security researcher cooperation. The number of researchers and hours that they are testing are not easily trackable via these methods, if at all. Traditional penetration testing doesnโt have direct measurement capabilities. Our LaunchPoint infrastructure stands between the Synack Red Team, our community of 1,500 security researchers, and customer assets, so customers have better visibility of the measurable traffic during a test. More and more frequently, we hear that customers are required to provide this kind of information to their auditors in financial services and other industries.ย

A look at the Classified Traffic & Vulnerabilities view in Synackโs Coverage Analytics. Sample data has been used for illustration purposes.
Benefits of Coverage Analyticsย
- Know whatโs being tested within your web and host assets: where, when and how muchย
- View the traffic generated by the Synack Red Team during pentesting
- Take next steps with confidence; identify where you may need supplemental testing and how to prioritize such testing
Starting today, security leaders can reduce their teamsโ fears of pentesting in the dark by knowing whatโs being tested, where and how much at any time across both web and host assets. Coverage Analytics makes sharing findings with executive leaders, board members or auditors simple and painless.
Current Synack customers can log in to the Synack Platform to explore Coverage Analytics today. If you have questions or are interested in learning more about Coverage Analytics, part of Synackโs Better Way to Pentest, donโt hesitate to contact us today!
The post Worry-free Pentesting: Continuous Oversight In Offensive Security Testing appeared first on Synack.
The Case for Integrating Dark Web Intelligence Into Your Daily Operations
Some of the best intelligence an operator or decision-maker can obtain comes straight from the belly of the beast. Thatโs why dark web intelligence can be incredibly valuable to your security operations center (SOC). By leveraging this critical information, operators can gain a better understanding of the tactics, techniques and procedures (TTPs) employed by threat actors. With that knowledge in hand, decision-makers can better position themselves to protect their organizations.
This is in line with the classic teachings from Sun Tzu about knowing your enemy, and the entire passage containing that advice is particularly relevant to cybersecurity:
โIf you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.โ
Letโs translate the middle section of this passage into colloquial cybersecurity talk: You can have the best security operations center in the world with outstanding cyber hygiene, but if you arenโt feeding it the right information, you may suffer defeats โ and much of that information comes from dark web intelligence.
Completing Your Threat Intelligence Picture
To be candid, if youโre not looking at the dark web, there is a big gap in your security posture. Why? Because thatโs where a lot of serious action happens. To paraphrase Sir Winston Churchill, the greatest defense against a cyber menace is to attack the enemyโs operations as near as possible to the point of departure.
Now, this is not a call to get too wrapped up in the dark web. Rather, a solid approach would be to go where the nefarious acts are being discussed and planned so you can take the appropriate proactive steps to prevent an attack on your assets.
The first step is to ensure that you have a basic understanding of the dark web. One common way to communicate over the dark web involves using peer-to-peer networks on Tor and I2P (Invisible Internet Project). In short, both networks are designed to provide secure communications and hide all types of information. Yes, this is only a basic illustration of dark web communications, but if your security operations center aims to improve its capabilities in the dark web intelligence space, you must be able to explain the dark web in these simple terms for two reasons:
- You cannot access these sites as you would any other website.
- Youโre going to have to warn your superiors what youโre up to. The dark web is an unsavory place, full of illegal content. Your decision-makers need to know what will be happening with their assets at a high level, which makes it vitally important to speak their language.
And this part is critical: If you want to get the most out of dark web intelligence, you may have to put on a mask and appear to โbe one of the bad guys.โ You will need to explain to your decision-makers why full-time staff might have to spend entire days as someone else. This is necessary because when you start searching for granular details related to your organization, you may have to secure the trust of malicious actors to gain entry into their circles. Thatโs where the truly rich intelligence is.
This could involve transacting in bitcoins or other cryptocurrencies, stumbling upon things the average person would rather not see, trying to decipher between coded language and broken language, and the typical challenges that come with putting up an act โ all so you can become a trusted persona. Just like any other relationship you develop in life, this doesnโt happen overnight.
Of course, there are organizations out there that can provide their own โpersonasโ for a fee and do the work for you. Using these services can be advantageous for small and medium businesses that may not have the resources to do all of this on their own. But the bigger your enterprise is, the more likely it becomes that you will want these capabilities in-house. In general, itโs also a characteristic of good operational security to be able to do this in-house.
Determining What Intelligence You Need
One of the most difficult challenges you will face when you decide to integrate dark web intelligence into your daily operations is figuring out what intelligence could help your organization. A good start is to cluster the information you might collect into groups. Here are some primer questions you can use to develop these groups:
- What applies to the cybersecurity world in general?
- What applies to your industry?
- What applies to your organization?
- What applies to your people?
For the first question, there are plenty of service providers who make it their business to scour the dark web and collect such information. This is an area where it may make more sense to rely on these service providers and integrate their knowledge feeds into existing ones within your security operations center. With the assistance of artificial intelligence (AI) to manage and make sense of all these data points, you can certainly create a good defensive perimeter and take remediation steps if you identify gaps in your network.
Itโs the second, third and fourth clusters that may require some tailoring and additional resources. Certain service providers can provide industry-specific dark web intelligence โ and you would be wise to integrate that into your workflow โ but at the levels of your organization and its people, you will need to do the work on your own. Effectively, you would be doing human intelligence work on the dark web.
Why Human Operators Will Always Be Needed
No matter how far technological protections advance, when places like the dark web exist, there will always be the human element to worry about. Weโre not yet at the stage where machines are deciding what to target โ itโs still humans who make those decisions.
Therefore, having top-level, industrywide information feeds can be great and even necessary, but it may not be enough. You need to get into the weeds here because when malicious actors move on a specific target, that organization has to play a large role in protecting itself with specific threat intelligence. A key component of ensuring protections are in place is knowing what people are saying about you, even on the dark web.
As Sun Tzu said: โIf you know the enemy and know yourself, you need not fear the result of a hundred battles.โ Thereโs a lot of wisdom in that, even if it was said some 2,500 years ago.
The post The Case for Integrating Dark Web Intelligence Into Your Daily Operations appeared first on Security Intelligence.
