โŒ

Reading view

There are new articles available, click to refresh the page.

How Financial Institutions Can Future-Proof Their Security Against a New Breed of Cyber Attackers

As we look at the remainder of 2025 and beyond, the pace and sophistication of cyber attacks targeting the financial sector show no signs of slowing. In fact, based on research from Check Pointโ€™s Q2 Ransomware Report, the financial cybersecurity threat landscape is only intensifying. Gone are the days when the average hacker was a..

The post How Financial Institutions Can Future-Proof Their Security Against a New Breed of Cyber Attackers appeared first on Security Boulevard.

The Trust Crisis: Why Digital Services Are Losing Consumer Confidence

TrustCloud third party risk Insider threat Security Digital Transformation

According to the Thales Consumer Digital Trust Index 2025, global confidence in digital services is slipping fast. After surveying more than 14,000 consumers across 15 countries, the findings are clear: no sector earned high trust ratings from even half its users. Most industries are seeing trust erode โ€” or, at best, stagnate. In an era..

The post The Trust Crisis: Why Digital Services Are Losing Consumer Confidence appeared first on Security Boulevard.

What Iโ€™m Thankful for in DevSecOps This Year: Living Through Interesting Times

devsecops, thanksgiving, thankful, security,

Alan reflects on a turbulent year in DevSecOps, highlighting the rise of AI-driven security, the maturing of hybrid work culture, the growing influence of platform engineering, and the incredible strength of the DevSecOps community โ€” while calling out the talent crunch, tool sprawl and security theater the industry must still overcome.

The post What Iโ€™m Thankful for in DevSecOps This Year: Living Through Interesting Times appeared first on Security Boulevard.

โ€œํ†ต์‹ ์‚ฌ ๋ณด์•ˆ ๋ฆฌ๋ถ€ํŠธโ€ ๋‚ก์€ ๊ฒฝ๊ณ„๋ฅผ ๋ฒ„๋ฆฌ๊ณ  ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋กœ ์žฌ์„ค๊ณ„ํ•ด์•ผ ํ•˜๋Š” ์ด์œ 

ํ†ต์‹  ๋„คํŠธ์›Œํฌ๋Š” ์ด์ œ ์–ด๋””์—๋‚˜ ์žˆ๋‹ค. ๋ฐ์ดํ„ฐ ๊ด€๋ฆฌ๋ถ€ํ„ฐ ๋น„์ฆˆ๋‹ˆ์Šค ๊ตฌ๋™, ๋Œ€๋ฅ™์„ ๊ฐ€๋กœ์ง€๋ฅด๋Š” ์‚ฌ๋žŒ ์—ฐ๊ฒฐ๊นŒ์ง€ ์„ธ์ƒ์„ ์›€์ง์ด๋Š” ๊ธฐ๋ฐ˜์ด ๋๋‹ค. ์˜ค๋žซ๋™์•ˆ ์ด ๋ถ„์•ผ์˜ ๋ณด์•ˆ ๋ฐฉ์‹์€ ๋น„๊ต์  ๋‹จ์ˆœํ–ˆ๋‹ค. ๋ฒฝ์„ ์„ธ์šฐ๊ณ , ์œ„ํ˜‘์€ ๋ฐ–์— ๋‘๊ณ , ๋‚ด๋ถ€๋Š” ์ „๋ถ€ ์‹ ๋ขฐํ•˜๋Š” ๋ฐฉ์‹์ด์—ˆ๋‹ค. ๋„คํŠธ์›Œํฌ๊ฐ€ ํ์‡„์ ์œผ๋กœ ์ž ๊ฒจ ์žˆ์„ ๋•Œ๋Š” ์ด๋Ÿฐ ๋ฐฉ์‹์ด๋ฉด ์ถฉ๋ถ„ํ–ˆ๋‹ค.

ํ•˜์ง€๋งŒ ๊ทธ๋Ÿฐ ์‹œ๋Œ€๋Š” ๋๋‚ฌ๋‹ค. ์ด์ œ ์›Œํฌ๋กœ๋“œ๋Š” ํ•˜์ด๋ธŒ๋ฆฌ๋“œ ํด๋ผ์šฐ๋“œ ์ „์—ญ์œผ๋กœ ํผ์ง€๊ณ  ์—ฃ์ง€ ๊ธฐ๊ธฐ๋Š” ํญ๋ฐœ์ ์œผ๋กœ ๋Š˜๊ณ , ์ˆ˜๋งŽ์€ ์„œ๋“œํŒŒํ‹ฐ ์†”๋ฃจ์…˜ ์—…์ฒด๊ฐ€ ํ†ต์‹ ๋ง์— ์—ฐ๊ฒฐ๋œ๋‹ค. ์˜ˆ์ „์˜ ๊ฒฝ๊ณ„์„  ๊ฐœ๋…์€ ์‚ฌ์‹ค์ƒ ์‚ฌ๋ผ์กŒ๋‹ค.

๊ทธ๋ž˜์„œ ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๊ฐ€ ํ•„์š”ํ•ด์กŒ๋‹ค. ๊ทธ์ € ์ตœ์‹  ์œ ํ–‰์–ด์— ๊ทธ์น˜๋Š” ๊ฒƒ์ด ์•„๋‹ˆ๋ผ ์ƒ์กด์„ ์œ„ํ•œ ํ•„์ˆ˜ ๋„๊ตฌ๊ฐ€ ๋๋‹ค. ๋งŽ์€ ๊ธฐ์—…์ด ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋ฅผ ๋งˆ์น˜ ์‚ฌ์„œ ๋„์ž…ํ•  ์ˆ˜ ์žˆ๋Š” ์ œํ’ˆ ์ •๋„๋กœ ์˜คํ•ดํ•œ๋‹ค๋Š” ์ ์ด๋‹ค. ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋Š” ๊ทธ๋Ÿฐ ๋ฐฉ์‹์œผ๋กœ ์ž‘๋™ํ•˜์ง€ ์•Š๋Š”๋‹ค.

ํ†ต์‹ ์„ ๋ฐœ๋ชฉ ์žก๋Š” ์˜คํ•ด

ํ†ต์‹  ์—…๊ณ„๋ฅผ ๋ณด๋ฉด ์–ด๋А ๊ณณ์—์„œ๋‚˜ ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋ผ๋Š” ๋‹จ์–ด๊ฐ€ ๋‚˜์˜จ๋‹ค. ์ด์‚ฌํšŒ, ์ „๋žต ๋ฌธ์„œ, ์†”๋ฃจ์…˜ ์—…์ฒด ํ”„๋ ˆ์  ํ…Œ์ด์…˜ ๋“ฑ ์–ด๋””์—๋‚˜ ๋“ฑ์žฅํ•œ๋‹ค. ๊ทธ๋Ÿฐ ๊ณผ์ •์—์„œ ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ์˜ ๋ณธ๋ž˜ ์˜๋ฏธ๊ฐ€ ๋งŽ์ด ํฌ์„๋๋‹ค. ๋งŽ์€ ๊ฒฝ์˜์ง„์ด ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋ฅผ ๊ทœ์ œ ์ค€์ˆ˜ ์ฒดํฌ๋ฆฌ์ŠคํŠธ ํ•œ ์ค„, ๋˜๋Š” ๋˜ ํ•˜๋‚˜์˜ ์†Œํ”„ํŠธ์›จ์–ด ๊ตฌ์ถ• ์‚ฌ์—… ์ •๋„๋กœ ์—ฌ๊ธด๋‹ค.

ํ˜„์‹ค์€ ํ›จ์”ฌ ๋ƒ‰์ •ํ•˜๋‹ค. ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋Š” ์‚ฌ๊ณ ๋ฐฉ์‹์ด๋‹ค. ๊ฐ€์ •์„ ๋ฒ„๋ฆฌ๊ณ  ๋Š์ž„์—†์ด ๊ฒ€์ฆํ•˜๋Š” ์ชฝ์œผ๋กœ ์ „ํ™˜ํ•˜๋Š” ๊ด€์ ์ด๋‹ค. ์ด๋Ÿฐ ์‚ฌ๊ณ ๋ฐฉ์‹์ด ์กฐ์ง ๋ฌธํ™”์— ์Šค๋ฉฐ๋“ค์–ด์•ผ ๋ณด์•ˆ์ด โ€˜ํ•ด์•ผ ํ•˜๋Š” ์ผโ€™ ์ˆ˜์ค€์„ ๋ฒ—์–ด๋‚˜ ์‹ค์ œ ์šด์˜ ๋ฐฉ์‹์œผ๋กœ ์ž๋ฆฌ ์žก๋Š”๋‹ค. ํ•˜์ง€๋งŒ ๋Œ€๋ถ€๋ถ„ ํ†ต์‹ ์‚ฌ๋Š” ์ด๋Ÿฐ ์ธ์‹ ์ „ํ™˜์— ์•„์ง ์ด๋ฅด์ง€ ๋ชปํ–ˆ๋‹ค. ํ‘œ๋ฉด์ ์ธ ์•ˆ์ „๋งŒ ๋ฏฟ๊ณ  ์žˆ๊ณ , ๊ณต๊ฒฉ์ž๋Š” ์ด๋Ÿฐ ํ—ˆ์ ์„ ์ •๊ตํ•˜๊ฒŒ ํŒŒ๊ณ ๋“ ๋‹ค.

ํ”ผํ•ด๊ฐ€ ์—ฐ๊ฒฐ๋˜๋Š” IT์™€ OT

์š”์ฆ˜ OT(์šด์˜๊ธฐ์ˆ ) ํ™˜๊ฒฝ์„ ๋…ธ๋ฆฌ๋Š” ๊ณต๊ฒฉ์€ ๋Œ€๋ถ€๋ถ„ IT ํ™˜๊ฒฝ์—์„œ ์ถœ๋ฐœํ•œ๋‹ค. ๊ณต๊ฒฉ์ž๊ฐ€ ๊ด€๋ฆฌ์ž ๊ณ„์ •์„ ํƒˆ์ทจํ•˜๊ฑฐ๋‚˜ ํ—ˆ์ˆ ํ•œ ์ธํ„ฐํŽ˜์ด์Šค๋ฅผ ์ฐพ์œผ๋ฉด, ๋„คํŠธ์›Œํฌ ์žฅ๋น„๋‚˜ ๊ธฐ์ง€๊ตญ ์ปจํŠธ๋กค๋Ÿฌ ๊ฐ™์€ ํ•ต์‹ฌ ์„ค๋น„ ์ชฝ์œผ๋กœ ๋ฐ”๋กœ ์ด๋™ํ•  ์ˆ˜ ์žˆ๋‹ค.

IT์™€ OT์˜ ๊ฐ„๊ทน์„ ์ค„์ด๋Š” ํ•ด๋ฒ•์€ ์กฐ์ง๋„๋ฅผ ๋ฐ”๊พธ๋Š” ์ผ์ด ์•„๋‹ˆ๋‹ค. ๋ชจ๋“  ๊ฒƒ์„ ํ•œ๋ˆˆ์— ๋ณด๊ณ , ๋‹จ์ผํ•œ ๊ทœ์น™ ์ง‘ํ•ฉ์œผ๋กœ ๋‹ค๋ฃจ๋Š” ์ผ์ด๋‹ค. ์ ‘๊ทผ ๊ถŒํ•œ ์ •์ฑ…์„ ๊ณต์œ ํ•˜๊ณ  ํŒจ์น˜ ์šฐ์„ ์ˆœ์œ„๋ฅผ ๋ช…ํ™•ํžˆ ์ •ํ•˜๊ณ , ์œ„ํ˜‘ ํƒ์ง€๋ฅผ ํ†ตํ•ฉํ•ด์•ผ ํ•œ๋‹ค. ์ด๋Ÿฐ ์š”์†Œ๊ฐ€ ํ•˜๋‚˜๋กœ ๋งž๋ฌผ๋ ค ๋Œ์•„๊ฐˆ ๋•Œ ๋น„๋กœ์†Œ ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๊ฐ€ ํ˜„์‹ค์ ์ธ ๋ณด์•ˆ ๋ชจ๋ธ๋กœ ๊ตฌํ˜„๋œ๋‹ค.

์ง„์งœ ์  : ์ง‘์š”ํ•จ๊ณผ ์ธ๋‚ด์‹ฌ

ํ†ต์‹  ์‚ฌ์—…์ž๋Š” ์ด์ œ ๊ฐœ์ธ ํ•ด์ปค๋‚˜ ๋žœ์„ฌ์›จ์–ด ๋ฒ”์ฃ„์กฐ์ง๋งŒ ์ƒ๋Œ€ํ•˜์ง€ ์•Š๋Š”๋‹ค. ์˜ค๋Š˜๋‚  ๊ฐ€์žฅ ํฐ ์œ„ํ˜‘์€ ์ถฉ๋ถ„ํ•œ ์ž๊ธˆ๊ณผ ์ธ๋ ฅ์„ ๊ฐ–์ถ˜ ์ง‘์š”ํ•œ ๊ณต๊ฒฉ ๊ทธ๋ฃน์ด๋‹ค. ๊ตญ๊ฐ€ ์ฐจ์›์˜ ๊ณต๊ฒฉ ์กฐ์ง์ด ๋ณด์ด์ง€ ์•Š๊ฒŒ ์ž ๋ณตํ•˜๋Š” ๋ฐฉ์‹์ด๋‹ค. ์†”ํŠธ ํƒ€์ดํ‘ผ(Salt Typhoon)๊ณผ ๊ฐ™์€ ๊ณต๊ฒฉ ์‚ฌ๋ก€๋Š” ์ด๋Ÿฐ ๊ทธ๋ฃน์ด ํ†ต์‹ ๋ง ์•ˆ์— ๋ช‡ ๋‹ฌ์”ฉ ๋จธ๋ฌด๋ฅด๋ฉฐ ๋ฏผ๊ฐํ•œ ๋ฐ์ดํ„ฐ๋ฅผ ๋นผ๋‚ด๊ณ , ๊ทธ ๊ฒฐ๊ณผ๊ฐ€ ์‹ค์ œ ์ง€์ •ํ•™์  ์œ„ํ—˜์œผ๋กœ ์ด์–ด์งˆ ์ˆ˜ ์žˆ์Œ์„ ๋ณด์—ฌ์คฌ๋‹ค.

๋ฏธ๊ตญ ์‚ฌ์ด๋ฒ„๋ณด์•ˆยท์ธํ”„๋ผ๋ณด์•ˆ๊ตญ(CISA)์€ 2021๋…„ ์ดํ›„ ์ „ ์„ธ๊ณ„ ํ†ต์‹  ์‚ฌ์—…์ž๋ฅผ ์นจํˆฌํ•œ ๊ณต๊ฒฉ ์‚ฌ๋ก€์™€ ๊ด€๋ จํ•ด ๋ณผํŠธ ํƒ€์ดํ‘ผ(Volt Typhoon)์„ ํฌํ•จํ•œ ์ค‘๊ตญ ์—ฐ๊ณ„ ๊ทธ๋ฃน์˜ ์œ„ํ—˜์„ ๊ณต์‹ ๊ฒฝ๊ณ ํ–ˆ๋‹ค.

์—†๋Š” ์‹ ๋ขฐ๋ฅผ ์ƒˆ๋กœ ์Œ“๋Š” ๋ฐฉ๋ฒ•

์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋Š” ๋‹จ์ˆœํ•œ ๊ธฐ์ˆ  ์—…๊ทธ๋ ˆ์ด๋“œ๊ฐ€ ์•„๋‹ˆ๋ผ ์Šต๊ด€์˜ ๋ฌธ์ œ๋‹ค. ๊ทธ ์ค‘์—์„œ๋„ ์„ธ ๊ฐ€์ง€ ์Šต๊ด€์ด ํ•ต์‹ฌ์ด๋‹ค. ํ•ญ์ƒ ๊ฒ€์ฆํ•˜๊ณ , ํ•„์š”ํ•œ ๋งŒํผ๋งŒ ๊ถŒํ•œ์„ ์ฃผ๊ณ , ๋ฌธ์ œ๊ฐ€ ํผ์ง€์ง€ ๋ชปํ•˜๊ฒŒ ๋ง‰๋Š” ์ผ์ด๋‹ค.

  • ํ•ญ์ƒ ๊ฒ€์ฆํ•˜๊ธฐ. ๋กœ๊ทธ์ธ ์ ˆ์ฐจ๊ฐ€ ๊ฒ€์ฆ์˜ ๋์ด ์•„๋‹ˆ๋‹ค. ์‚ฌ๋žŒ, ๊ธฐ๊ธฐ, ์‹œ์Šคํ…œ ๋ชจ๋‘์— ๋Œ€ํ•ด ์ ‘์† ์œ„์น˜, ์ˆ˜ํ–‰ํ•˜๋Š” ์ž‘์—…, ํ‰์†Œ์™€ ๋‹ค๋ฅธ ์ ์ด ์žˆ๋Š”์ง€ ๊ณ„์† ์‚ดํŽด์•ผ ํ•œ๋‹ค.
  • ์ตœ์†Œ ๊ถŒํ•œ ๋ถ€์—ฌ. ์‚ฌ๋žŒ์ด๋‚˜ ์‹œ์Šคํ…œ์ด ๊ฐ€์งˆ ์ˆ˜ ์žˆ๋Š” ๊ถŒํ•œ์„ ์ตœ์†Œํ™”ํ• ์ˆ˜๋ก ๋ฌธ์ œ๊ฐ€ ์ƒ๊ฒผ์„ ๋•Œ ํ”ผํ•ด ๋ฒ”์œ„๊ฐ€ ์ค„์–ด๋“ ๋‹ค. ๊ถŒํ•œ๋งŒ ์ž˜ ์ฃ„์–ด๋„ ๋ณ„๋„์˜ ํ™”๋ คํ•œ ์‹ ๊ทœ ๋„๊ตฌ ์—†์ด๋„ ์œ„ํ—˜์„ ํฌ๊ฒŒ ๋‚ฎ์ถœ ์ˆ˜ ์žˆ๋‹ค.
  • ๋„คํŠธ์›Œํฌ ๋ถ„๋ฆฌ. ๋ฌธ์ œ ํ™•์‚ฐ์„ ์ฐจ๋‹จํ•˜๋Š” ์ผ์ด๋‹ค. ๋„คํŠธ์›Œํฌ๋ฅผ ์ž‘๊ณ  ๊ณ ๋ฆฝ๋œ ์˜์—ญ์œผ๋กœ ์ž˜๊ฒŒ ๋‚˜๋ˆ„๋Š” ๋งˆ์ดํฌ๋กœ ์„ธ๊ทธ๋จผํŠธ ๊ตฌ์กฐ๋ฅผ ๋งŒ๋“ ๋‹ค. ์ด๋ ‡๊ฒŒ ๋ถ„๋ฆฌ๋œ ๋„คํŠธ์›Œํฌ์—์„œ๋Š” ์นจํ•ด ์‚ฌ๊ณ ๊ฐ€ ๋ฐœ์ƒํ•ด๋„ ํ”ผํ•ด๋ฅผ ์ตœ์†Œํ™”ํ•  ์ˆ˜ ์žˆ๋‹ค.

์™ธ๋ฉดํ•˜๊ธฐ ์–ด๋ ค์šด ์กด์žฌ, ๋ ˆ๊ฑฐ์‹œ ๊ธฐ์ˆ 

์†”์งํžˆ ๋งํ•ด ๋ ˆ๊ฑฐ์‹œ ์ธํ”„๋ผ๋Š” ์‚ฌ๋ผ์ง€์ง€ ์•Š๋Š”๋‹ค. ์ˆ˜์‹ญ ๋…„ ์ „์— ๊ตฌ์ถ•ํ•œ ๋„คํŠธ์›Œํฌ ํ•˜๋“œ์›จ์–ด๊ฐ€ ์ง€๊ธˆ๋„ ํ†ต์‹ ๋ง์„ ์ง€ํƒฑํ•œ๋‹ค. ๋‹น์‹œ ์žฅ๋น„๋Š” 24์‹œ๊ฐ„ ๊ฐ€๋™๊ณผ ๋‚ด๋ถ€ ์ž๋™ ์‹ ๋ขฐ๋ฅผ ์ „์ œ๋กœ ์„ค๊ณ„๋๋‹ค. ์ „๋ถ€ ์ƒˆ ์žฅ๋น„๋กœ ๊ต์ฒดํ•˜๋Š” ์ผ์€ ์œ„ํ—˜ ๋ถ€๋‹ด์ด ํฌ๊ณ  ๋น„์šฉ๋„ ๋ง‰๋Œ€ํ•˜๋‹ค. ๊ทธ๋Œ€๋กœ ๋‘๋Š” ์„ ํƒ์ง€๊ฐ€ ์กฐ๊ธˆ ๋” ์œ„ํ—˜ํ•  ๋ฟ์ด๋‹ค.

ํ˜„์‹ค์ ์ธ ํ•ด๋ฒ•์€ ๊ธฐ์กด ์‹œ์Šคํ…œ์„ ํ˜„๋Œ€์ ์ธ โ€˜๋ณด์•ˆ ์…ธโ€™๋กœ ๊ฐ์‹ธ๋Š” ์ผ์ด๋‹ค. ๋ณด์•ˆ ๊ฒŒ์ดํŠธ์›จ์ด, ์ค‘์•™์ง‘์ค‘ํ˜• ์ธ์ฆ, ์„ธ์…˜ ๋ชจ๋‹ˆํ„ฐ๋ง ๊ฐ™์€ ๊ณ„์ธต์„ ๋ง์”Œ์šฐ๋Š” ๋ฐฉ์‹์ด๋‹ค. ์ด๋Ÿฐ ๊ณ„์ธต์„ ์ถ”๊ฐ€ํ•˜๋ฉด ๋Œ€๊ทœ๋ชจ ๊ต์ฒด๋กœ ์ธํ•œ ์„œ๋น„์Šค ์ค‘๋‹จ ์œ„ํ—˜ ์—†์ด๋„ ์ง€๊ธˆ ๋‹น์žฅ ๋ณด์•ˆ ์ˆ˜์ค€์„ ๋Œ์–ด์˜ฌ๋ฆด ์ˆ˜ ์žˆ๋‹ค.

์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ์˜ ๋ชฉํ‘œ๋Š” ์™„๋ฒฝํ•œ ์ด์ƒํ–ฅ์„ ์ข‡๋Š” ์ผ์ด ์•„๋‹ˆ๋‹ค. ์ „์ฒด ๋ณด์•ˆ ์ˆ˜์ค€์„ ํ•œ ๋‹จ๊ณ„์”ฉ ๋Œ์–ด์˜ฌ๋ฆฌ๋Š” ๊ณผ์ •์ด๋‹ค. ๋งค ์—ฐ๊ฒฐ์„ ๊ฒ€์ฆํ•˜๊ณ , ํ•˜๋‚˜์”ฉ ์›Œํฌ๋กœ๋“œ๋ฅผ ๋ถ„๋ฆฌํ•  ๋•Œ๋งˆ๋‹ค ๋„คํŠธ์›Œํฌ๋Š” ์กฐ๊ธˆ์”ฉ ๋” ๋‹จ๋‹จํ•ด์ง„๋‹ค.

๊ตญ๊ฒฝ์„ ๋„˜๋‚˜๋“œ๋Š” ์‹ค์งˆ์  ์ปดํ”Œ๋ผ์ด์–ธ์Šค

์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋Š” ๊ธฐ์กด ์ปดํ”Œ๋ผ์ด์–ธ์Šค ๊ทœ์ •์„ ๋ฌด์‹œํ•˜๋Š” ๊ฐœ๋…์ด ์•„๋‹ˆ๋‹ค. ๊ทธ๋Ÿฐ ๊ทœ์ •์„ ํ† ๋Œ€๋กœ ์Œ“์•„ ์˜ฌ๋ฆฌ๋Š” ์ „๋žต์ด๋‹ค. ISO 27001, ๋ฏธ๊ตญ ๊ตญ๋ฆฝํ‘œ์ค€๊ธฐ์ˆ ์—ฐ๊ตฌ์†Œ์˜ ์‚ฌ์ด๋ฒ„๋ณด์•ˆ ํ”„๋ ˆ์ž„์›Œํฌ(NIST Cybersecurity Framework), ์œ ๋Ÿฝ์—ฐํ•ฉ์˜ NIS2 ์ง€์นจ(EU NIS2 Directive), ๊ฐ๊ตญ ํ†ต์‹  ๊ทœ์ œ ๋“ฑ ์–ด๋–ค ๊ทœ์ œ๋ฅผ ์ ์šฉํ•˜๋”๋ผ๋„ ํ•ต์‹ฌ์€ ๊ฐ™๋‹ค. ์œ„ํ—˜์„ ๊ณ„์† ์ ๊ฒ€ํ•˜๊ณ , ๋ˆ„๊ฐ€ ๋“ค์–ด์˜ค๋Š”์ง€ ํ†ต์ œํ•˜๊ณ , ๊ด€๋ฆฌ ์ƒํƒœ๋ฅผ ์ฆ๋ช…ํ•˜๋Š” ์ผ์ด๋‹ค.

์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ ๊ด€์ ์„ ์ด๋Ÿฐ ํ”„๋ ˆ์ž„์›Œํฌ์— ๋…น์—ฌ ๋„ฃ์œผ๋ฉด ์ปดํ”Œ๋ผ์ด์–ธ์Šค๋Š” ๊ณจ์นซ๊ฑฐ๋ฆฌ๊ฐ€ ๋˜์ง€ ์•Š๋Š”๋‹ค. ๋‹จ์ˆœํžˆ ์š”๊ฑด์„ ์ฑ„์šฐ๋Š” ์ž‘์—…์ด ์•„๋‹ˆ๋ผ ์ผ์ƒ์ ์ธ ๋ณด์•ˆ ํ™œ๋™์˜ ์ผ๋ถ€๊ฐ€ ๋œ๋‹ค. ์œ„ํ˜‘ ์–‘์ƒ์ด ๋ฐ”๋€Œ๋ฉด ๋ณดํ˜ธ ์ฒด๊ณ„๋„ ํ•จ๊ป˜ ๋ฐ”๋€๋‹ค. ๋„คํŠธ์›Œํฌ๊ฐ€ ์–ด๋””์— ์œ„์น˜ํ•˜๋“  ์ ๊ฒ€์„ ๋ฐ›๊ธฐ์— ์ถฉ๋ถ„ํ•œ ์ค€๋น„ ์ƒํƒœ๋ฅผ ์œ ์ง€ํ•  ์ˆ˜ ์žˆ๋‹ค.

์„ฑ๊ณผ๊ฐ€ ๋ณด์ด๋Š” ์ „ํ™˜ : ์ฒซ 180์ผ ๋™์•ˆ ํ™•์ธํ•  6๊ฐ€์ง€ KPI

๊ฒฝ์˜์ง„์€ ๋ง‰์—ฐํ•œ ์•ฝ์†์ด ์•„๋‹ˆ๋ผ ์ฆ๊ฑฐ๋ฅผ ์›ํ•œ๋‹ค. ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋ฅผ ๋„์ž…ํ•ด ์ฒ˜์Œ 6๊ฐœ์›” ๋™์•ˆ ์‹ค์ œ๋กœ ์‚ดํŽด๋ด์•ผ ํ•  ์ง€ํ‘œ๋Š” ๋‹ค์Œ๊ณผ ๊ฐ™๋‹ค.

  • ํ•„์š” ์ด์ƒ์œผ๋กœ ๋‚จ์•„ ์žˆ๋˜ ๊ณ ๊ธ‰ ๊ถŒํ•œ ๊ณ„์ • ์ˆ˜๊ฐ€ ์ค„์–ด๋“ ๋‹ค.
  • ์ด์ƒ ์ง•ํ›„๋ฅผ ํฌ์ฐฉํ•˜๋Š” ์†๋„๊ฐ€ ๋นจ๋ผ์ง„๋‹ค.
  • ์ ‘๊ทผ ์Šน์ธ ์ ˆ์ฐจ๊ฐ€ ์ง€์—ฐ๋˜์ง€ ์•Š๊ณ , ๊ฑฐ๋ฒ„๋„Œ์Šค๊ฐ€ ๋น„์ฆˆ๋‹ˆ์Šค ์†๋„์— ๋งž์ถฐ ์›€์ง์ธ๋‹ค.
  • ๋” ๋งŽ์€ ์—”๋“œํฌ์ธํŠธ์™€ ์›Œํฌ๋กœ๋“œ๊ฐ€ ๋ชจ๋‹ˆํ„ฐ๋ง ๋Œ€์ƒ์— ์˜ฌ๋ผ๊ฐ„๋‹ค.
  • ๋„คํŠธ์›Œํฌ ๋‚ด๋ถ€๋ฅผ ๋ชฐ๋ž˜ ๋Œ์•„๋‹ค๋‹ˆ๋Š” ์นจ์ž… ํ–‰์œ„๊ฐ€ ์ค„์–ด๋“ ๋‹ค.
  • IT์™€ OT ํŒ€์ด ๊ณต๋™ ๋Œ€์‘ ํ›ˆ๋ จ์„ ์‹ค์ œ๋กœ ์ˆ˜ํ–‰ํ•œ๋‹ค.

์ด๋“ค ์ง€ํ‘œ๋Š” ๋ณด์—ฌ์ฃผ๊ธฐ์šฉ ์ˆ˜์น˜๊ฐ€ ์•„๋‹ˆ๋‹ค. ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๊ฐ€ ์œ ํ–‰์–ด๋ฅผ ๋„˜์–ด ์‹ค์ œ๋กœ ํšจ๊ณผ๋ฅผ ๋‚ด๊ณ  ์žˆ์Œ์„ ์ฆ๋ช…ํ•˜๋Š” ์ง€ํ‘œ๋‹ค. ์ดํ›„ ์ „๋žต์„ ๊ณ„์† ๊ณ ๋„ํ™”ํ•  ์ˆ˜ ์žˆ๋Š” ๊ธฐ๋ฐ˜์ด ๋œ๋‹ค.

์œ ํ–‰์–ด์—์„œ ๊ธฐ๋ณธ ์›์น™์œผ๋กœ

์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋Š” ๋” ์ด์ƒ ๋ง๋ฟ์ธ ๊ฐœ๋…์ด ์•„๋‹ˆ๋‹ค. ๋„คํŠธ์›Œํฌ ๋ณด์•ˆ ์ˆ˜์ค€์„ ํ‰๊ฐ€ํ•˜๋Š” ๊ธฐ์ค€์œผ๋กœ ์ž๋ฆฌ ์žก์•˜๋‹ค. ํ†ต์‹  ์‚ฐ์—…์—์„œ ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ ๋„์ž…์€ ์ด๋ฏธ์ง€ ๊ด€๋ฆฌ๊ฐ€ ์•„๋‹ˆ๋ผ ์ƒ์กด ์ „๋žต์ด๋‹ค.

์‹œ์žฅ์กฐ์‚ฌ๊ธฐ๊ด€ ๊ฐ€ํŠธ๋„ˆ๋Š” 2027๋…„๊นŒ์ง€ ๊ธฐ์—…์˜ 70%๊ฐ€ ๋ณด์•ˆ ์ „๋žต ์ˆ˜๋ฆฝ์„ ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ ๊ด€์ ์—์„œ ์‹œ์ž‘ํ•  ๊ฒƒ์œผ๋กœ ์ „๋งํ•œ๋‹ค. ํ˜„์žฌ ์ˆ˜์น˜๋Š” 20%์—๋„ ๋ชป ๋ฏธ์นœ๋‹ค.

์—ฌ์ „ํžˆ ๋‚ก์€ ๊ฒฝ๊ณ„ ๋ฐฉ์–ด์— ๋งค๋‹ฌ๋ฆฌ๋ฉด ๊ณผ๊ฑฐ ์ „์Ÿ์„ ์น˜๋ฅด๋Š” ์…ˆ์ด๋‹ค. ์„ ๋„ ์‚ฌ์—…์ž๋Š” ์ œ๋กœ ํŠธ๋Ÿฌ์ŠคํŠธ๋ฅผ ์—ฌ์ •์œผ๋กœ ๋ฐ›์•„๋“ค์ด๊ณ  ์žˆ๋‹ค. ์ด ๊ธฐ์—…์ด ์•ž์œผ๋กœ ๋ชจ๋‘๊ฐ€ ์˜์กดํ•˜๊ฒŒ ๋  ํ†ต์‹  ๋„คํŠธ์›Œํฌ๋ฅผ ์ฐจ๊ทผ์ฐจ๊ทผ ๊ตฌ์ถ•ํ•˜๊ณ  ์žˆ๋‹ค.
dl-ciokorea@foundryco.com

Why trust is the new currency in the agentic era โ€” and what itโ€™s worth

The World Economic Forum calls trust โ€œthe new currencyโ€ in the agentic AI era and thatโ€™s not just a metaphor: An increase of 10 percentage points in trust directly translates to 0.5% GDP growth. But hereโ€™s what makes trust as a currency fundamentally different from any thatโ€™s come before: you canโ€™t borrow it, you canโ€™t buy it and you canโ€™t simply mint more.

When it comes to AI, trust used to mean one thing โ€” accuracy. Does the model predict correctly? Then we started asking harder questions about bias, transparency and whether we could explain the AIโ€™s reasoning. Agentic AI changes the equation entirely. When a system doesnโ€™t just analyze or recommend, but actually takes action, trust shifts from โ€œDo I believe this answer?โ€ to โ€œAm I still in full control of what this system does?โ€

In the agentic era, trust must evolve from ensuring accurate results to building systems that can ensure continuous control and reliability of AI agents. As a result, trust is now the foundational architecture that separates organizations capable of deploying autonomous agents from those perpetually managing the consequences of systems they cannot safely control. My question for enterprise leaders is: Are you building that infrastructure now or will you spend next several years explaining why you didnโ€™t?

The growing trust deficit

The numbers tell a story of eroding confidence at precisely the moment when trust matters most. According to Stanford Universityโ€™s Institute for Human-Centered Artificial Intelligence, globally, as AI-related incidents surged 56.4%, confidence that AI companies protect personal data fell from 50% in 2023 to 47% in 2024.

This isnโ€™t just a perception problem. One out of six enterprise security breaches now involves AI, yet 97% of affected companies lacked proper access controls. By 2028, Gartner estimates a quarter of enterprise breaches will trace to AI agent abuse.

Hereโ€™s the paradox: while 79% of companies have already adopted AI agents and another 15% are exploring possibilities, according to PwC, most companies have no AI-specific controls in place. In short, as companies rush to adopt agentic AI, weโ€™re witnessing a fundamental readiness gap between vulnerabilities and defenses. Trust is eroding faster than companies can catch up.

The economics of trust infrastructure

Ironically, AI will also be your best defense, whether itโ€™s against AI-amplified attacks by external parties or against AI agents behaving maliciously. An IBM report found that โ€œorganizations using AI and automation extensively throughout their security operations saved an averageย $1.9 millionย in breach costs and reduced the breach lifecycle by an average of 80 days.โ€ Leveraging AI to enhance security delivers both monetary and efficiency ROI, with breaches solved an average of 80 days faster than non-automated operations. Thatโ€™s not hypothetical risk management but measurable competitive advantage, especially because it enables use cases that competitors canโ€™t risk deploying.

Traditional security was built on static trust: verify identity at the gate, then assume good behavior inside the walls. Agentic AI demands we go further. Unlike traditional applications, AI agents adapt autonomously, modify their own behavior and operate at machine speed across enterprise systems; this means yesterdayโ€™s trusted agent could potentially be todayโ€™s compromised threat that immediately reverts to normal behavior to evade detection.

Trust cannot be established and maintained just at the perimeter; our focus must shift to inside the walls as well. Securing these dynamic actors requires treating them less like software and more like a workforce, with continuous identity verification, behavioral monitoring and adaptive governance frameworks.

Successful trust architecture rests on three foundational pillars, each addressing distinct operational requirements while integrating into a cohesive security posture.

Pillar 1: Verifiable identity

Every AI agent requires cryptographic identity verification comparable to employee credentials. Industry leaders recognize this imperative: Microsoft developed Entra Agent ID for agent authentication, while Oktaโ€™s acquisition of Axiom and Palo Alto Networksโ€™ $25 billion CyberArk purchase signal market recognition that agent identity management is critical.

Organizations must register agents in configuration management databases with the same rigor applied to employee vetting and physical infrastructure, establishing clear accountability for every autonomous actor operating within enterprise boundaries.

Pillar 2: Comprehensive visibility and continuous monitoring

Traditional security tools monitor network perimeters and user behavior but lack mechanisms to detect anomalous agent activity. Effective trust infrastructure requires purpose-built observability platforms capable of tracking API call patterns, execution frequencies and behavioral deviations in real time.

Gartner predicts guardian agents, which are AI systems specifically designed to monitor other AI systems, will capture 10% to 15% of the agentic AI market by 2030, underscoring the necessity of layered oversight mechanisms.

Pillar 3: Governance as executable architecture

Effective governance transforms policies from static documents into executable specifications that define autonomy boundaries, such as which actions agents can execute independently, which operations require human approval and which capabilities remain permanently restricted. Organizations with mature responsible AI frameworks achieve 42% efficiency gains, according to McKinsey, demonstrating that governance enables innovation rather than constraining it โ€” provided the governance operates as an architectural principle rather than a compliance afterthought.

Research from ServiceNow and Oxford Economicsโ€™ AI Maturity Index reveals that pacesetter organizations that are achieving measurable AI benefits have established cross-functional governance councils with genuine executive authority, not technical committees relegated to advisory roles.

In sum, trust infrastructure isnโ€™t defensive. Itโ€™s the prerequisite for deploying AI agents in high-value workflows where competitive advantage actually resides, separating organizations capable of strategic deployment from those perpetually constrained by risks they cannot adequately manage.

The 2027 divide

Gartner predicts 40% of agentic AI projects will be canceled by 2027, citing inadequate risk controls as a main factor. By then, there will be a clear divide between organizations that can safely deploy ambitious agentic use cases and those that cannot afford to. The former will have built trust as infrastructure; the latter will be retrofitting security onto systems already deployed and discovering problems through costly incidents.

Trust canโ€™t be borrowed from consultants or bought from vendors. Unlike traditional currencies that flow freely, trust in the age of agentic AI must be earned through verifiable governance, transparent operations and systems designed with security as a core principle, not an afterthought. As the gap between those who have it and those who donโ€™t widens, the architectural decisions you make today will determine which side of the divide youโ€™re on.

This article is published as part of the Foundry Expert Contributor Network.
Want to join?

This Week in Security: Cloudflare Wasnโ€™t DNS, BADAUDIO, and Not a Vuln

You may have noticed that large pieces of the Internet were down on Tuesday. It was a problem at Cloudflare, and for once, it wasnโ€™t DNS. This time it was database management, combined with a safety limit that failed unsafe when exceeded.

Cloudflareโ€™s blog post on the matter has the gritty details. It started with an update to how Cloudflareโ€™s ClickHouse distributed database was responding to queries. A query of system columns was previously only returning data from the default database. As a part of related work, that system was changed so that this query now returned all the databases the given user had access to. In retrospect it seems obvious that this could cause problems, but it wasnโ€™t predicted to cause problems. The result was that a database query to look up bot-management features returned the same features multiple times.

That featurelist is used to feed the Cloudflare bot classification system. That system uses some AI smarts, and runs in the core proxy system. There are actually two versions of the core proxy, and they behaved a bit differently when the featurelist exceeded the 200 item limit. When the older version failed, it classified all traffic as a bot. The real trouble was the newer Rust code. That version of the core proxy threw an error in response, leading to 5XX HTTP errors, and the Internet-wide fallout.

Dangling Azure

Thereโ€™s a weird pitfall with cloud storage when a storage name is used and then abandoned. Itโ€™s very much like what happens when a domain name is used and then allowed to expire: Someone else can come along and register it. Microsoft Azure has its own variation on this, in the form of Azure blob storage. And the folks at Eye Securityโ€™s research team found one of these floating blobs in an unexpected place: In Microsoftโ€™s own Update Health Service.

The 1.0 version of this tool was indeed exploitable. A simple payload hosted on one of these claimed blob endpoints could trigger an explorer.exe execution with an arbitrary parameter, meaning trivial code execution. The 1.1 version of the Update Health Service isnโ€™t vulnerable by default, requiring a registry change before reaching out to the vulnerable blob locations. That said, there are thousands of machines looking to these endpoints that would be vulnerable to takeover. After the problem was reported, Microsoft took over the blob names to prevent any future misuse.

BADAUDIO

Thereโ€™s a new malware strain from APT24, going by the name BADAUDIO. Though โ€œnewโ€ is a bit of a misnomer here, as the first signs of this particular malware were seen back in 2022. What is new is that Google Threat Intelligence reporting on it. The campaign uses multiple techniques, like compromising existing websites to serve the malware in โ€œwatering holeโ€ attacks, to spam and spearphishing.

Notable here is how obfuscated the BADAUDIO malware loader is, using control flow flattening to resist analysis. First consider how good code uses functions to group code into logical blocks. This technique does the opposite, putting code into blocks randomly. The primary mechanism for execution is DLL sideloading, where a legitimate application is run with a malicious DLL in its search path, again primarily to avoid detection. Itโ€™s an extraordinarily sneaky bit of malware.

Donโ€™t Leave The Defaults

Thereโ€™s an RCE (Remote Code Execution) in the W3 Total Cache WordPress plugin. The vulnerability is an eval() that can be reached by putting code in a page to be cached. So if a WordPress site allows untrusted comments, and has caching enabled, thereโ€™s just one more hurdle to clear. And that is the W3TC_DYNAMIC_SECURITY value, which seems to be intended to stave off exactly this sort of weakness. So hereโ€™s the lesson, donโ€™t leave this sort of security feature default.

Not a Vulnerability

We have a trio of stories that arenโ€™t technically vulnerabilities. The first two are in the mPDF library, that takes HTML code and generates PDFs โ€” great for packaging documentation. The first item of interest in mPDF is the handling of @import css rules. Interestingly, these statements seem to be evaluated even outside of valid CSS, and are handled by passing the URL off to curl to actually fetch the remote content. Those URLs must end in .css, but thereโ€™s no checking whether that is in a parameter or not. So evil.org/?.css is totally valid. The use of curl is interesting for another reason, that the Gopher protocol allows for essentially unrestricted TCP connections.

The next quirk in mPDF is in how .svg files are handled. Specifically, how an image xlink inside an svg behaves, when it uses the phar:// or php:// prefixes. These are PHP Archive links, or a raw php link, and the mPDF codebase already guards against such shenanigans, matching links starting with either prefix. The problem here is that thereโ€™s path mangling that happens after that guard code. To skip straight to the punchline, :/phar:// and :/php:// will bypass that filter, and potentially run code or leak information.

Now the big question: Why are neither of those vulnerabilities? Even when one is a bypass for a CVE fix from 2019? Because mPDF is only to be used with sanitized input, and does not do that sanitization as part of its processing. And that does check out. Itโ€™s probably the majority of tools and libraries that will do something malicious if fed malicious input.

Thereโ€™s one more โ€œvulnerableโ€ library, esbuild, that has an XSS (Cross Site Scripting) potential. It comes down to the use of escapeForHTML(), and the fact that function doesnโ€™t sanitize quotation marks. Feed that malicious text, and the unescaped quotation mark allows for plenty of havoc. So why isnโ€™t this one a vulnerability? Because the text strings getting parsed are folder names. And if you can upload an arbitrary folder to the server where esbuild runs, you already have plenty of other ways to run code.

Bits and Bytes

Thereโ€™s another Fortinet bug being exploited in the wild, though this one was patched with FortiWeb 8.0.2. This one gets the WatchTowr treatment. Itโ€™s a path traversal that bypasses any real authentication. There are a couple of validation checks that are straightforward to meet, and then the cgi_process() API can be manipulated as any user without authentication. Ouch.

The Lite XL text editor seems pretty nifty, running on Windows, Linux, and macOS, and supporting lua plugins for extensibility. That Lua code support was quite a problem, as opening a project would automatically run the .lua configuration files, allowing direct use of os.execute(). Open a malicious project, run malicious code.

And finally, sometimes itโ€™s the easy approach that works the best. [Eaton] discovered A Cracker Barrel administrative panel built in React JS, and all it took to bypass authentication was to set isAuthenticated = true in the local browser. [Eaton] started a disclosure process, and noticed the bug had already been fixed, apparently discovered independently.

Dogfooding is usually a good thing: Thatโ€™s when a company uses their own code internally. Itโ€™s not so great when itโ€™s a cloud company, and that code has problems. Oracle had this exact problem, running the Oracle Identity Governance Suite. It had a few authentication bypasses, like the presence of ?WSDL or ;.wadl at the end of a URL. Ah, Java is magical.

Merging zero trust with digital twins: The next frontier in government cyber resilience

Cyber adversaries arenโ€™t standing still, and our defenses canโ€™t either. In an environment where government networks face relentless, increasingly sophisticated attacks, itโ€™s evident that perimeter-based security models belong in the past. A zero trust framework redefines the approach: Every user, device, and connection is treated as unverified until proven otherwise, or โ€œtrust but verify.โ€ By assuming breach, zero trust delivers what todayโ€™s government missions demand: speed, resilience and the ability to contain damage before it spreads.

To truly operationalize zero trust, agencies must look beyond theory and embrace emerging technologies. Many federal organizations are already turning to artificial intelligence and digital twins to get there. A digital twin โ€” a software-based replica of a real-world network โ€” creates an invaluable proving ground. Rather than waiting for an adversary to strike live systems, agencies can safely simulate cyberattacks, test and refine policies, and validate updates before deployment. In my view, this marks a fundamental shift: Digital twins arenโ€™t just a tool, they represent the future of proactive cyber defense, where learning, adaptation and resilience happen before a crisis, not after.

This approach doesnโ€™t just strengthen agency defenses; it also streamlines operations. Instead of maintaining expensive, outdated physical labs, agencies can rely on digital twins to keep pace with evolving cyber threats. Most recently, a large government agency demonstrated the power of this approach by overcoming years of technical debt, rapidly reconfiguring critical systems, and building a testing environment that delivered greater speed, precision and efficiency that advanced their mission and operational goals.

Strategies for anticipating compromise while ensuring operational resilience

Digital twins offer significant potential for enhancing cybersecurity, yet their widespread adoption remains nascent due to several challenges, including budget constraints and agency inertia. Agencies can reference established frameworks such as the National Institute of Standards and Technology SP 800-207 and the Cybersecurity Infrastructure and Security Agency Zero Trust Maturity Model, to guide their zero trust journeys. However, with various legacy systems, cloud services and devices, agencies require zero trust capabilities for their specific needs. The core challenge for government then becomes how to proactively implement effective zero trust strategies that anticipate compromises while ensuring continued operations.

To address these challenges and effectively implement zero trust, here are key actions for agency leaders to consider that include people, process and tools:

  • People

Embrace change management

Zero trust implementation is as much about people and process as it is about technology. To foster cross-team buy-in, agencies must clearly articulate the โ€œwhyโ€ behind zero trust. Instead of just a technical mandate, zero trust should be framed as a strategy to improve security and efficiency. This involves creating a shared understanding of the frameworkโ€™s benefits and how it impacts each team member.

Quantify and communicate value

Measuring the ROI of zero trust is complex, as preventing incidents yields invisible benefits. How will you define success: reduced risk, faster compliance, operational consistency? Agencies should set milestones for measuring security posture improvements and regulatory progress while recognizing the limitations of conventional ROI calculations.

  • Process

Adopt zero trust as a damage-limitation strategy

Rather than asking, โ€œHow do we stop every breach?โ€ agencies should take steps to shift from prevention-only thinking to dynamic containment and defense, such as:

  • Developing an incident response plan that outlines roles, responsibilities and communication protocols for cyberattack stages.
  • Conducting regular tabletop exercises and simulations to test the planโ€™s effectiveness and find improvement areas.
  • Automating security workflows to accelerate response times and reduce human error.

Be thorough with zero trust planning

According to public sector best practices, projects with 90% planning and 10% execution are far more likely to succeed. Agency technology and information leaders should take an active role in driving zero trust transformation, ensuring comprehensive planning, stakeholder engagement, and organizational buy-in are prioritized from the outset.

  • Tools

Leverage digital twins

Agencies are turning to emerging technology, including AI and digital twins, to keep pace with threat actors. Government IT and SecOps teams can deploy digital twins to simulate attacks, validate controls and reduce costly physical testing environments. Digital twins should also be considered a safe space for agencies to experiment, identify vulnerabilities, and optimize policies before deployment โ€” an invaluable asset for agencies navigating mixed legacy and cloud ecosystems. Moreover, model-based systems engineering and agile approaches, paired with digital twins, can empower agencies to โ€œrehearseโ€ security incidents and fine-tune architectures.

Tackle tool sprawl using informed consolidation

The sheer volume of disparate vendors and tools can undermine even the best zero trust architecture. Utilizing digital twins to map and simulate your IT environment allows for thoughtful consolidation without sacrificing security or compliance. Lastly, agencies should identify where they are duplicating capabilities and envision a streamlined, mission-focused toolset.

Accelerating zero trust at scale

To address the pace and complexity of future threats, government agencies must act boldly by embracing zero trust not only as a framework but also as a fundamental mindset for continual adaptation and resilience.

By harnessing the power of technologies like AI and digital twins, modernizing planning and response strategies, and committing to cross-team collaboration, agencies can outmaneuver adversaries and protect their most critical missions.

The path forward is clear: Operational resilience is achieved by investing today in future-ready strategies that anticipate compromise, ensure continuity and empower every stakeholder to play a proactive role in defense.

ย 

ย 

John Fair is vice president of Air Force sales and account management at Akima.

The post Merging zero trust with digital twins: The next frontier in government cyber resilience first appeared on Federal News Network.

ยฉ Getty Images/Alexander Sikov

Cyber Security Data Protection Business Technology Privacy conceptCyber Security Data Protection Business Technology Privacy concept.

Btrust Names Bitcoin Core Contributor Abubakar Nur Khalil as New CEO

Bitcoin Magazine

Btrust Names Bitcoin Core Contributor Abubakar Nur Khalil as New CEO

Bitcoin development nonprofit Btrust has named Nigerian Bitcoin Core contributor Abubakar Nur Khalil as its new chief executive officer, the organization announced today.ย 

Khalil had previously served as interim CEO while sitting on the board as a non-voting member. Khalil will step down from his board position and report directly to the organizationโ€™s directors in the full-time role.ย 

His three-year term is renewable once.

Founded to support open-source Bitcoin development in the Global South, Btrust has expanded its footprint across Africa, Latin America, and India over the past year. The non-profit received initial funding from Jay-Z and Jack Dorsey.

During his interim leadership, the group increased partnerships with organizations including Bitshala, Vinteum and 2140, and reported record grant distribution.ย 

Since mid-2024, Btrust says it has issued more than $1.7 million in funding, with over half going directly to developers.

Khalil co-founded Btrust Builders, an initiative focused on growing the open-source developer pipeline in emerging markets. He is recognized as a prominent advocate for Bitcoin development in Africa.

โ€œIโ€™m honored to have led Btrust as interim CEO over the past year,โ€ Khalil said in a statement, adding that he aims to strengthen the organizationโ€™s systems and scale its impact in 2026 and beyond. โ€œEnsuring that Bitcoin continues to be a money that works for everyone worldwide.โ€

Board member Obi Nwosu said Khalil is well-positioned to guide Btrust through its next phase as it builds out long-term programs and developer support infrastructure.ย 

The organization said continuity will be a major focus as it transitions from early-stage growth to broader execution.

Btrustโ€™s board launched the CEO search in July, citing the need for dedicated leadership as its programming expands globally. The organization said the appointment marks โ€œa meaningful next chapterโ€ in its mission to strengthen decentralized Bitcoin development.

Abubakar Nur Khalil will also be speaking at Bitcoin MENA, happening December 8โ€“9, 2025, at the ADNEC Center in Abu Dhabi.

"BITCOIN IS MONEY." โœŠ

We're thrilled to announce Btrust CEO, Abubakar Nur Khalil, to speak at Bitcoin MENA! pic.twitter.com/1ozbQyNBoK

โ€” Bitcoin MENA Conference (@bitcoinmenaconf) October 30, 2025

This post Btrust Names Bitcoin Core Contributor Abubakar Nur Khalil as New CEO first appeared on Bitcoin Magazine and is written by Micah Zimmerman.

โŒ