โŒ

Reading view

There are new articles available, click to refresh the page.

ISO 27001:2013 vs 2022 โ€“ A Quick Comparison Guide

ISO 27001 is an internationally recognized standard that defines the requirements for establishing, implementing, maintaining, and continuously improving an Information Security Management System (ISMS) within an organization. First introduced in 1999, the standard has evolved through multiple revisions to address changing security needs. The most recent update, ISO 27001:2022, was released on October 25, 2022, [โ€ฆ]

The post ISO 27001:2013 vs 2022 โ€“ A Quick Comparison Guide appeared first on Kratikal Blogs.

The post ISO 27001:2013 vs 2022 โ€“ A Quick Comparison Guide appeared first on Security Boulevard.

Can AI manage compliance requirements efficiently?

How Can AI Revolutionize Compliance Management? Are you leveraging AI technologies to optimize compliance management in your organization? Where compliance requirements continue to grow more complex across industries, the integration of Artificial Intelligence (AI) into compliance management is becoming increasingly essential. The call for efficient compliance management resonates especially with organizations operating in sectors such [โ€ฆ]

The post Can AI manage compliance requirements efficiently? appeared first on Entro.

The post Can AI manage compliance requirements efficiently? appeared first on Security Boulevard.

Can AI manage cloud security effectively?

How Can AI Revolutionize Cloud Security Management? How do organizations ensure that their cloud environments are not just secure but intelligently managed? The answer lies in understanding the potential of AI in cloud security. With machines become predominant players in our IT infrastructure, the management of Non-Human Identities (NHIs) has emerged as a pivotal strategy [โ€ฆ]

The post Can AI manage cloud security effectively? appeared first on Entro.

The post Can AI manage cloud security effectively? appeared first on Security Boulevard.

The Zero Risk Trap: How to Ditch Perfection and Prioritize Real Cyber Resilience

In Star Trek, the Kobayashi Maru simulation is an unwinnable test faced by Starfleet cadet captains. The only way to โ€œwinโ€ is to accept that you canโ€™t. Itโ€™s a test of character โ€”ย forcing cadet captains to choose between impossible options and live with the consequences. In many ways, our roles as cybersecurity leaders is the..

The post The Zero Risk Trap: How to Ditch Perfection and Prioritize Real Cyber Resilience appeared first on Security Boulevard.

Fight for the Future, EFF, Others Push Back Against Growing ICE Surveillance

facial recognition, surveillance, camera, security, data

The privacy rights group Fight for the Future was one of 44 organizations that sent a letter to lawmakers urging them to pull back on funding for ICE, noting the growing threats to U.S. citizens and others as the agency spends millions of dollars on its growing surveillance capabilities.

The post Fight for the Future, EFF, Others Push Back Against Growing ICE Surveillance appeared first on Security Boulevard.

How smart are AI systems in managing cloud compliance

What Are Non-Human Identities and Secrets Security Management? How does one navigate the intricate web of cybersecurity if non-human identities are participating in networks as much as humans? The proliferation of these machine identities, known as Non-Human Identities (NHIs), has added layers of complexity to cybersecurity management, especially in cloud environments where the stakes are [โ€ฆ]

The post How smart are AI systems in managing cloud compliance appeared first on Entro.

The post How smart are AI systems in managing cloud compliance appeared first on Security Boulevard.

ISO 9001:

What is ISO 9001? ISO 9001 is recognized globally as the standard for Quality Management Systems (QMS). Its full name is ISO 9001:2015, indicating the most recent revision published in 2015 by the International Organization for Standardization (ISO). This framework is relevant to any organization, regardless of its size, industry, or the products and services [โ€ฆ]

The post ISO 9001: appeared first on Centraleyes.

The post ISO 9001: appeared first on Security Boulevard.

Is advanced AI security affordable for small businesses

How Can Small Businesses Implement Affordable AI Security? Is AI security a necessity thatโ€™s out of reach for small businesses, or can it fit with budget to protect its digital assets? While we delve into this topic, itโ€™s crucial to understand the significance of AI security and how it can be accessible to organizations of [โ€ฆ]

The post Is advanced AI security affordable for small businesses appeared first on Entro.

The post Is advanced AI security affordable for small businesses appeared first on Security Boulevard.

โ€œ์œ„์น˜ ๊ด€๊ณ„์—†์ด ์ฃผ๊ถŒ ๊ตฌํ˜„ํ•œ๋‹คโ€ยทยทยทIBM, ์ƒˆ๋กœ์šด ํ•ด๋ฒ•์œผ๋กœ โ€˜์†Œ๋ฒ„๋ฆฐ ์ฝ”์–ดโ€™ ๊ณต๊ฐœ

IBM์€ ๊ธฐ์—… ๋ฐ ์ •๋ถ€๊ฐ€ ํด๋ผ์šฐ๋“œ ์—…์ฒด์˜ ๋ฐ์ดํ„ฐ์„ผํ„ฐ ์œ„์น˜์— ์˜์กดํ•˜์ง€ ์•Š๊ณ ๋„ ์†Œ๋ฒ„๋ฆฐ ํด๋ผ์šฐ๋“œ ๋ฐฐํฌ์— ๋Œ€ํ•œ ์šด์˜ ํ†ต์ œ๊ถŒ์„ ํ™•๋ณดํ•  ์ˆ˜ ์žˆ๋„๋ก ์„ค๊ณ„๋œ ์†Œํ”„ํŠธ์›จ์–ด ์Šคํƒ โ€˜์†Œ๋ฒ„๋ฆฐ ์ฝ”์–ด(Sovereign Core)โ€™๋ฅผ ์ถœ์‹œํ–ˆ๋‹ค. ์ด๋ฅผ ํ†ตํ•ด CIO๊ฐ€ ๊ฐ•ํ™”๋˜๋Š” ๊ทœ์ œ ์‹ฌ์‚ฌ์— ๋Œ€์‘ํ•˜๊ณ  ์ปดํ”Œ๋ผ์ด์–ธ์Šค๋ฅผ ์ž๋™ํ™”ํ•˜๋ฉฐ, ๋ฐ์ดํ„ฐ์˜ ์—„๊ฒฉํ•œ ์œ„์น˜ ์กฐ๊ฑด ์•„๋ž˜์—์„œ ๋ฏผ๊ฐํ•œ AI ์›Œํฌ๋กœ๋“œ๋ฅผ ์‹ค์ œ ์šด์˜ ํ™˜๊ฒฝ์— ๋ฐฐ์น˜ํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์›ํ•˜๋Š” ๊ฒƒ์„ ๋ชฉํ‘œ๋กœ ํ•˜๊ณ  ์žˆ๋‹ค.

์†Œ๋ฒ„๋ฆฐ ํด๋ผ์šฐ๋“œ๋Š” ์ผ๋ฐ˜์ ์œผ๋กœ ํด๋ผ์šฐ๋“œ์˜ ํšจ์œจ์„ฑ์„ ํ™œ์šฉํ•˜๋ฉด์„œ๋„ ๋ฐ์ดํ„ฐ์™€ IT ์šด์˜์— ๋Œ€ํ•œ ํ†ต์ œ๊ถŒ์„ ์œ ์ง€ํ•˜๋Š” ๋ฐ ์ดˆ์ ์„ ๋งž์ถ˜๋‹ค. ์ด๋Š” ๋ฐ์ดํ„ฐ ์œ„์น˜ ๊ทœ์ œ์™€ ๊ฐ™์€ ํ˜„์ง€ ๋ฒ•๊ทœ๋ฅผ ์ค€์ˆ˜ํ•˜๋Š” ๋™์‹œ์—, ๋ฐ์ดํ„ฐ์™€ ์šด์˜, ๋ณด์•ˆ์— ๋Œ€ํ•ด ๊ตญ๊ฐ€ ๋˜๋Š” ์กฐ์ง ์ฐจ์›์˜ ์™„์ „ํ•œ ํ†ต์ œ๋ฅผ ๋ณด์žฅํ•˜๊ธฐ ์œ„ํ•ด ๋Œ€๋ถ€๋ถ„ ํŠน์ • ์ง€์—ญ์— ๊ตฌ์ถ•๋œ๋‹ค. ์ด์ƒ์ ์œผ๋กœ๋Š” ๊ฒฉ๋ฆฌ๋œ ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ์—์„œ ์šด์˜๋˜๋Š” IT ์ธํ”„๋ผ๋ฅผ ์˜๋ฏธํ•œ๋‹ค.

๋งˆ์ดํฌ๋กœ์†Œํ”„ํŠธ๋‚˜ ๊ตฌ๊ธ€์˜ ์†Œ๋ฒ„๋ฆฐ ํด๋ผ์šฐ๋“œ๊ฐ€ ์ „์šฉ ๋ฐ์ดํ„ฐ์„ผํ„ฐ๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ์„ค๊ณ„๋˜๋Š” ๊ฒƒ๊ณผ ๋‹ฌ๋ฆฌ, IBM์€ ๊ธฐ์—…์ด๋‚˜ ์ •๋ถ€๊ฐ€ ๋ฐฐํฌํ•˜๋ ค๋Š” ๋ชจ๋“  ์†Œํ”„ํŠธ์›จ์–ด์™€ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์— ์ฃผ๊ถŒ์„ ๊ธฐ๋ณธ์ ์œผ๋กœ ํƒ‘์žฌํ•˜๊ฒ ๋‹ค๋Š” ์ž…์žฅ์ด๋‹ค. IBM์€ ์˜ค๋Š” 2์›” ๊ธฐ์ˆ  ํ”„๋ฆฌ๋ทฐ ๊ณต๊ฐœ๊ฐ€ ์˜ˆ์ •๋œ ์†Œ๋ฒ„๋ฆฐ ์ฝ”์–ด๋ฅผ ํ†ตํ•ด, ๊ณ ๊ฐ์ด ์ž์ฒด ํ•˜๋“œ์›จ์–ด๋Š” ๋ฌผ๋ก  ์ง€์—ญ ํด๋ผ์šฐ๋“œ ์—…์ฒด๋‚˜ ๋‹ค๋ฅธ ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ์—์„œ๋„ ์›Œํฌ๋กœ๋“œ๋ฅผ ์‹คํ–‰ํ•  ์ˆ˜ ์žˆ๋‹ค๊ณ  ๋ฐํ˜”๋‹ค.

ํ“จ์ฒ˜๋Ÿผ ๊ทธ๋ฃน(Futurum Group)์˜ CIO ์‹ค๋ฌด ์ฑ…์ž„์ž ๋””์˜จ ํžŒ์น˜ํด๋ฆฌํ”„๋Š” โ€œ์ด๋Š” ์ „ํ†ต์ ์ธ ์†Œ๋ฒ„๋ฆฐ ํด๋ผ์šฐ๋“œ๋ผ๊ธฐ๋ณด๋‹ค๋Š”, ๊ฐ ์กฐ์ง์ด ์ž์ฒด์ ์œผ๋กœ ํด๋ผ์šฐ๋“œ๋ฅผ ๊ตฌ์ถ•ํ•  ์ˆ˜ ์žˆ๋„๋ก ํ•˜๋Š” ์†Œํ”„ํŠธ์›จ์–ด ์Šคํƒ์— ๊ฐ€๊น๋‹คโ€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ๊ทธ๋Š” ์†Œ๋ฒ„๋ฆฐ ์ฝ”์–ด๊ฐ€ ์˜จํ”„๋ ˆ๋ฏธ์Šค ๋ฐ์ดํ„ฐ์„ผํ„ฐ, ์ง€์—ญ ๋‚ด์—์„œ ์ง€์›๋˜๋Š” ํด๋ผ์šฐ๋“œ ์ธํ”„๋ผ, IT ์„œ๋น„์Šค ์—…์ฒด๋ฅผ ํ†ตํ•œ ํ™˜๊ฒฝ ๋“ฑ ๋‹ค์–‘ํ•œ ์šด์˜ ํ™˜๊ฒฝ์—์„œ ํ™œ์šฉ๋  ์ˆ˜ ์žˆ๋‹ค๊ณ  ๋ถ„์„ํ–ˆ๋‹ค.

๋ฒค๋” ์ข…์†์„ฑ ์ œ๊ฑฐ

๋ถ„์„๊ฐ€๋“ค์€ ์ด๋Ÿฌํ•œ ์ ‘๊ทผ ๋ฐฉ์‹์ด ์†Œ๋ฒ„๋ฆฐ ํด๋ผ์šฐ๋“œ ๊ด€๋ฆฌ ๋ฐฉ์‹์„ ์žฌ์ •์˜ํ•˜๊ณ , ๋ฒค๋” ์ข…์†์„ฑ์„ ํ”ผํ•˜๋Š” ๋ฐ ๋„์›€์ด ๋  ์ˆ˜ ์žˆ๋‹ค๊ณ  ์ง„๋‹จํ–ˆ๋‹ค.

ํžŒ์น˜ํด๋ฆฌํ”„๋Š” ๊ธฐ์กด ์†Œ๋ฒ„๋ฆฐ ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ์—์„œ๋Š” ํด๋ผ์šฐ๋“œ ์—…์ฒด๊ฐ€ ์—…๋ฐ์ดํŠธ๋‚˜ ์ ‘๊ทผ ๊ถŒํ•œ๊ณผ ๊ฐ™์€ ํ•ต์‹ฌ ์šด์˜ ์š”์†Œ๋ฅผ ๊ณ„์† ํ†ต์ œํ•˜๋Š” ๊ฒฝ์šฐ๊ฐ€ ๋งŽ๋‹ค๊ณ  ์–ธ๊ธ‰ํ–ˆ๋‹ค. ์ด๋กœ ์ธํ•ด ๊ทœ์ œ ๋ฆฌ์Šคํฌ๊ฐ€ ์ปค์งˆ ๋ฟ ์•„๋‹ˆ๋ผ, ๊ณ ๊ฐ์ด ํŠน์ • ์—…์ฒด์˜ ์•„ํ‚คํ…์ฒ˜์™€ API, ์ปดํ”Œ๋ผ์ด์–ธ์Šค ๋„๊ตฌ์— ์ข…์†๋˜๋Š” ๊ตฌ์กฐ๊ฐ€ ํ˜•์„ฑ๋  ์ˆ˜ ์žˆ๋‹ค๋Š” ๊ฒƒ์ด๋‹ค.

๋˜ํ•œ ์›Œํฌ๋กœ๋“œ๋ฅผ ๋‹ค๋ฅธ ํ™˜๊ฒฝ์œผ๋กœ ์ด์ „ํ•  ๊ฒฝ์šฐ, ๊ธฐ์กด ์—…์ฒด์˜ ์‹ ์› ๊ด€๋ฆฌ ์ฒด๊ณ„์™€ ์•”ํ˜ธํ™” ํ‚ค, ๊ฐ์‚ฌ ์ถ”์  ์ •๋ณด๊ฐ€ ๋งค๋„๋Ÿฝ๊ฒŒ ์ด์ „๋˜์ง€ ์•Š๋Š” ๋ฌธ์ œ๊ฐ€ ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ๋‹ค. ํžŒ์น˜ํด๋ฆฌํ”„๋Š” ์ด๋กœ ์ธํ•ด CIO๊ฐ€ ์ƒˆ๋กœ์šด ํ™˜๊ฒฝ์—์„œ๋„ ๊ทœ์ œ ์š”๊ฑด์„ ์ถฉ์กฑํ•˜๊ธฐ ์œ„ํ•ด ๊ฑฐ๋ฒ„๋„Œ์Šค ์ฒด๊ณ„๋ฅผ ๋‹ค์‹œ ๊ตฌ์ถ•ํ•ด์•ผ ํ•˜๋Š” ๋ถ€๋‹ด์„ ๋– ์•ˆ๊ฒŒ ๋œ๋‹ค๊ณ  ์ง€์ ํ–ˆ๋‹ค.

๋ฐ˜๋ฉด IBM์˜ ์†Œ๋ฒ„๋ฆฐ ์ฝ”์–ด๋Š” ์•”ํ˜ธํ™” ํ‚ค์™€ ์‹ ์› ๊ด€๋ฆฌ, ์šด์˜ ๊ถŒํ•œ์„ ๊ฐ ์กฐ์ง์˜ ๊ด€ํ•  ์˜์—ญ ์•ˆ์— ์œ ์ง€ํ•  ์ˆ˜ ์žˆ๋„๋ก ํ•จ์œผ๋กœ์จ CIO์—๊ฒŒ ๋” ๋งŽ์€ ํ†ต์ œ๊ถŒ์„ ๋ถ€์—ฌํ•  ์ˆ˜ ์žˆ๋‹ค. ์ด๋Ÿฐ ๊ตฌ์กฐ๋กœ ์ธํ•ด CIO๋Š” ๊ฑฐ๋ฒ„๋„Œ์Šค ์ฒด๊ณ„๋ฅผ ๋‹ค์‹œ ๊ตฌ์ถ•ํ•˜์ง€ ์•Š๊ณ ๋„ ํด๋ผ์šฐ๋“œ ์—…์ฒด๋ฅผ ์ „ํ™˜ํ•  ์ˆ˜ ์žˆ๋‹ค.

ํ•˜์ดํผํ”„๋ ˆ์ž„ ๋ฆฌ์„œ์น˜(HyperFRAME Research)์˜ AI ์Šคํƒ ์ด๊ด„์ธ ์Šคํ…ŒํŒŒ๋‹ˆ ์›”ํ„ฐ๋Š” ๊ทœ์ œ ๊ธฐ๊ด€ ์ฃผ๋„์˜ ๊ฐ์‚ฌ๊ฐ€ ์ ์  ๋” ๋นˆ๋ฒˆํ•ด์ง€๊ณ , ์š”๊ตฌ ์ˆ˜์ค€๋„ ๊ฐ•ํ™”๋˜๊ณ  ์žˆ๋‹ค๊ณ  ์ง„๋‹จํ–ˆ๋‹ค. ํŠนํžˆ ์œ ๋Ÿฝ์—ฐํ•ฉ(EU)์˜ ๊ทœ์ œ ๋‹น๊ตญ์€ ๊ธฐ์—…์˜ ๊ทœ์ œ ์ค€์ˆ˜ ์•ฝ์†๋งŒ์œผ๋กœ๋Š” ์ถฉ๋ถ„ํ•˜์ง€ ์•Š๋‹ค๊ณ  ๋ณด๊ณ , ์‹ค์ œ ์ค€์ˆ˜ ์—ฌ๋ถ€๋ฅผ ์ž…์ฆํ•  ์ˆ˜ ์žˆ๋Š” ์ฆ๊ฑฐ์™€ ๊ฐ์‚ฌ ๊ธฐ๋ก, ์ƒ์‹œ์ ์ธ ์ปดํ”Œ๋ผ์ด์–ธ์Šค ๋ณด๊ณ ๋ฅผ ์š”๊ตฌํ•˜๊ณ  ์žˆ๋‹ค.

ํžŒ์น˜ํด๋ฆฌํ”„๋Š” ์†Œ๋ฒ„๋ฆฐ ์ฝ”์–ด๊ฐ€ ์ž๋™ํ™”๋œ ์ฆ๊ฑฐ ์ˆ˜์ง‘๊ณผ ์ง€์†์ ์ธ ๋ชจ๋‹ˆํ„ฐ๋ง์„ ํ†ตํ•ด ์ด๋Ÿฐ ์š”๊ตฌ์— ๋Œ€์‘ํ•  ์ˆ˜ ์žˆ๋‹ค๊ณ  ๋ถ„์„ํ–ˆ๋‹ค. ์ด๋ฅผ ํ†ตํ•ด ์€ํ–‰๊ณผ ์ •๋ถ€ ๊ธฐ๊ด€, ๋ฐฉ์œ„ ์‚ฐ์—…๊ณผ ์—ฐ๊ด€๋œ ๋ถ„์•ผ์—์„œ ๋ฐœ์ƒํ•˜๋Š” ์šด์˜ ๋ถ€๋‹ด์„ ์ค„์ด๋Š” ๋ฐ๋„ ๋„์›€์ด ๋  ์ˆ˜ ์žˆ๋‹ค๊ณ  ํ‰๊ฐ€ํ–ˆ๋‹ค.

์†Œ๋ฒ„๋ฆฐ AI ํŒŒ์ผ๋Ÿฟ์˜ ์‹ค์ œ ๋ฐฐํฌ ์ง€์›

๋ถ„์„๊ฐ€๋“ค์€ ์†Œ๋ฒ„๋ฆฐ ์ฝ”์–ด๊ฐ€ ๊ธฐ์—…์˜ AI ํŒŒ์ผ๋Ÿฟ ํ”„๋กœ๊ทธ๋žจ์„ ์‹ค์ œ ์šด์˜ ํ™˜๊ฒฝ์— ๋ฐฐํฌํ•˜๋Š” ๋ฐ๋„ ํž˜์„ ์‹ค์–ด์ค„ ์ˆ˜ ์žˆ๋‹ค๊ณ  ๋ดค๋‹ค. ํŠนํžˆ ์—„๊ฒฉํ•œ ๋ฐ์ดํ„ฐ ์œ„์น˜ ์กฐ๊ฑด๊ณผ ์ปดํ”Œ๋ผ์ด์–ธ์Šค ํ†ต์ œ๊ฐ€ ์š”๊ตฌ๋˜๋Š” AI ํ”„๋กœ์ ํŠธ์—์„œ ํšจ๊ณผ๊ฐ€ ํด ๊ฒƒ์ด๋ผ๋Š” ๋ถ„์„์ด๋‹ค.

HFS ๋ฆฌ์„œ์น˜(HFS Research)์˜ CEO ํ•„ ํผ์ŠˆํŠธ๋Š” ๋Œ€๋ถ€๋ถ„์˜ ๊ธฐ์—…๊ณผ ์กฐ์ง์ด ์ž์ฒด ๋ฐ์ดํ„ฐ๋ฅผ ๋ฒ”์šฉ AI ๋ชจ๋ธ์— ์ „๋‹ฌํ•˜๋Š” ๋ฐ ์—ฌ์ „ํžˆ ๋ถ€๋‹ด์„ ๋А๋ผ๊ณ  ์žˆ๋‹ค๊ณ  ์ง„๋‹จํ•˜๋ฉด์„œ, ๋™์‹œ์— GPU ๊ธฐ๋ฐ˜ ์ถ”๋ก ์„ ์™„์ „ํžˆ ์ž์ฒด ์ฃผ๊ถŒ ๊ฒฝ๊ณ„ ์•ˆ์—์„œ๋งŒ ์‹คํ–‰ํ•˜๋Š” ๊ฒƒ๋„ ํ˜„์‹ค์ ์œผ๋กœ ์ œ์•ฝ์ด ๋งŽ์€ ์ƒํ™ฉ์ด๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

์ด์— ๋น„ํ•ด ์†Œ๋ฒ„๋ฆฐ ์ฝ”์–ด์˜ ๊ธฐ๋Šฅ๊ณผ ์—ญ๋Ÿ‰์€ ๊ธฐ์—… ๋ฐ ์ •๋ถ€ ์กฐ์ง์ด ๋‚ด๋ถ€ ํ™˜๊ฒฝ์—์„œ AI ์ถ”๋ก ์„ ์‹คํ–‰ํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์›ํ•œ๋‹ค. ์ด๋ฅผ ํ†ตํ•ด ์ฒ˜๋ฆฌ๋˜๋Š” ๋ฐ์ดํ„ฐ๋ฟ ์•„๋‹ˆ๋ผ AI ๋ชจ๋ธ ์ž์ฒด๋„ ์ฃผ๊ถŒ ์š”๊ตฌ์‚ฌํ•ญ์„ ์ถฉ์กฑํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ๊ฒฐ๊ณผ์ ์œผ๋กœ CIO๊ฐ€ ์ฃผ๊ถŒ์„ ํ™•๋ณดํ•˜๋ฉด์„œ AI๋ฅผ ํŒŒ์ผ๋Ÿฟ ๋‹จ๊ณ„์—์„œ ์šด์˜ ๋‹จ๊ณ„๋กœ ์˜ฎ๊ธธ ์ˆ˜ ์žˆ๋Š” ๊ธฐ๋ฐ˜์„ ์ œ๊ณตํ•œ๋‹ค๊ณ  ํผ์ŠˆํŠธ๋Š” ์„ค๋ช…ํ–ˆ๋‹ค.

์‹œ์žฅ ํ™˜๊ฒฝ์˜ ๋ณ€ํ™”

์†Œ๋ฒ„๋ฆฐ ์ฝ”์–ด๋Š” IBM์ด ํ–ฅํ›„ AI ๊ทœ์ œ ๊ฐ•ํ™” ํ๋ฆ„์„ ์—ผ๋‘์— ๋‘๊ณ  ์†Œ๋ฒ„๋ฆฐ ํด๋ผ์šฐ๋“œ ์‹œ์žฅ ๊ณต๋žต์„ ๋ณธ๊ฒฉํ™”ํ•˜๋ ค๋Š” ์ „๋žต์œผ๋กœ ํ’€์ด๋œ๋‹ค. ๋™์‹œ์— ๋งˆ์ดํฌ๋กœ์†Œํ”„ํŠธ์™€ AWS, ๊ตฌ๊ธ€ ๋“ฑ ์ฃผ์š” ํด๋ผ์šฐ๋“œ ์—…์ฒด๋ณด๋‹ค ํ•œ๋ฐœ ์•ž์„œ ์ฃผ๋„๊ถŒ์„ ์žก์œผ๋ ค๋Š” ์˜๋„๋„ ๋‹ด๊ฒจ ์žˆ๋‹ค.

ํžŒ์น˜ํด๋ฆฌํ”„๋Š” โ€œ์œ ๋Ÿฝ์ด ๊ทœ์ œ๋ฅผ ๊ฐ•ํ™”ํ•˜๊ณ  ์•„์‹œ์•„ํƒœํ‰์–‘(APAC) ์ง€์—ญ๋„ ์ด๋ฅผ ๋’ค๋”ฐ๋ฅด๋Š” ์ƒํ™ฉ์—์„œ, IBM์€ ์ฃผ๊ถŒ ๋ฌธ์ œ๊ฐ€ ๊ธฐ์—…์˜ AI ๋„์ž… ์—ฌ๋ถ€๋ฅผ ๊ฐ€๋ฅด๋Š” ํ•ต์‹ฌ ์š”์ธ์ด ๋  ๊ฒƒ์œผ๋กœ ๋ณด๊ณ  ์žˆ๋‹ค. ์ผ๋ถ€ ๊ธฐ์—…์—์„œ๋Š” ๋น„์šฉ์ด๋‚˜ ์„ฑ๋Šฅ๋ณด๋‹ค๋„ ํ›จ์”ฌ ๋” ์ค‘์š”ํ•œ ์š”์†Œ๊ฐ€ ๋  ์ˆ˜ ์žˆ๋‹คโ€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

ํŠนํžˆ EU๋Š” ์ฃผ์š” ํด๋ผ์šฐ๋“œ ์—…์ฒด ๋Œ€๋ถ€๋ถ„์ด ๋ฏธ๊ตญ์— ๋ณธ์‚ฌ๋ฅผ ๋‘๊ณ  ์žˆ๋‹ค๋Š” ์ ์—์„œ, ์™ธ๊ตญ ๊ธฐ์—…์ด ๋ฐ์ดํ„ฐ์— ์ ‘๊ทผํ•˜๊ฑฐ๋‚˜ ํ•ต์‹ฌ IT ์‹œ์Šคํ…œ์„ ํ†ต์ œํ•˜๋Š” ๊ฒƒ์„ ์—„๊ฒฉํ•˜๊ฒŒ ๊ทœ์ œํ•˜๊ณ  ์žˆ๋‹ค.

EU ๊ทœ์ œ๋ฅผ ์ถฉ์กฑํ•˜๊ธฐ ์œ„ํ•ด ํด๋ผ์šฐ๋“œ ์—…์ฒด๋Š” ๋ณดํ†ต ์ง€์—ญ ํ†ตํ•ฉ ์—…์ฒด๋‚˜ ๊ด€๋ฆฌํ˜• ์„œ๋น„์Šค ์—…์ฒด์™€ ํ˜‘๋ ฅํ•œ๋‹ค. ๋‹ค๋งŒ ํžŒ์น˜ํด๋ฆฌํ”„์— ๋”ฐ๋ฅด๋ฉด, ์ด ๊ฒฝ์šฐ์—๋„ ๊ธฐ๋ณธ ํ”Œ๋žซํผ์— ๋Œ€ํ•œ ์šด์˜ ํ†ต์ œ๊ถŒ์€ ํด๋ผ์šฐ๋“œ ์—…์ฒด๊ฐ€ ์œ ์ง€ํ•˜๊ณ , ํŒŒํŠธ๋„ˆ๋Š” ๊ทธ ์œ„์—์„œ ์„œ๋น„์Šค ๊ตฌ์ถ•๊ณผ ์šด์˜์„ ๋งก๋Š” ๊ฒฝ์šฐ๊ฐ€ ๋Œ€๋ถ€๋ถ„์ด๋‹ค.

IBM์˜ ์†Œ๋ฒ„๋ฆฐ ์ฝ”์–ด๋Š” ํŒŒํŠธ๋„ˆ๊ฐ€ ๊ณ ๊ฐ์„ ๋Œ€์‹ ํ•ด ์ „์ฒด ํ™˜๊ฒฝ์„ ์ง์ ‘ ์šด์˜ํ•  ์ˆ˜ ์žˆ๊ณ , IBM์€ ์šด์˜ ๊ณผ์ •์— ์ „ํ˜€ ๊ฐœ์ž…ํ•˜์ง€ ์•Š๋Š” ๊ตฌ์กฐ๋‹ค. ํžŒ์น˜ํด๋ฆฌํ”„๋Š” ์ด๋Ÿฌํ•œ ์ ‘๊ทผ์ด ๊ทœ์ œ ์ค€์ˆ˜ ์ธก๋ฉด์—์„œ ๋” ๋†’์€ ์‹ ๋ขฐ์„ฑ์„ ์ œ๊ณตํ•œ๋‹ค๊ณ  ๋ถ„์„ํ–ˆ๋‹ค.

์ด์™€ ๊ด€๋ จํ•ด IBM์€ ๋…์ผ์˜ ์ปดํ“จํƒ€์„ผํ„ฐ(Computacenter) ๋ฐ ์œ ๋Ÿฝ ์ง€์—ญ์„ ์‹œ์ž‘์œผ๋กœ ์ „ ์„ธ๊ณ„ IT ์„œ๋น„์Šค ์—…์ฒด์™€ ํ˜‘๋ ฅ์„ ํ™•๋Œ€ํ•  ๊ณ„ํš์ด๋ผ๊ณ  ๋ฐํ˜”๋‹ค. IBM์€ ์†Œ๋ฒ„๋ฆฐ ์ฝ”์–ด์— ์ถ”๊ฐ€ ๊ธฐ๋Šฅ์„ ๋”ํ•ด 2026๋…„ ์ค‘๋ฐ˜ ์ •์‹ ์ถœ์‹œํ•  ๊ณ„ํš์ด๋‹ค.
dl-ciokorea@foundryco.com

Do AI-driven security systems empower compliance

Are Non-Human Identities the Missing Link in AI-Driven Security? Are traditional methods enough to protect our digital assets, or is there a growing need for more sophisticated approaches? With the advent of AI-driven security systems, the focus is turning towards Non-Human Identities (NHIs) and Secrets Security Management as key components in empowering compliance and enhancing [โ€ฆ]

The post Do AI-driven security systems empower compliance appeared first on Entro.

The post Do AI-driven security systems empower compliance appeared first on Security Boulevard.

IBM pushes sovereign computing with a software stack that works across cloud platforms

IBM has launched Sovereign Core, a software stack that aims to offer enterprises and governments full operational control over sovereign cloud deployments without relying on hyperscaler-managed regions.

Sovereign deployments, typically, try to combine cloud benefits with strategic autonomy. They are IT infrastructures that have been set up locally, ideally in isolated cloud environments, to ensure complete national or organizational control over data, operations, and security, while ensuring compliance with local laws, such as data residency regulations.

Unlike traditional sovereign clouds from Microsoft or Google that hinge on dedicated data center locations, IBMโ€™s Sovereign Core, expected to be available in tech preview in February, is trying to make sovereignty an inherent property of any software or application that an enterprise or government wants to deploy, enabling customers to run workloads on their own hardware, local providers, or even other clouds.

โ€œItโ€™s less a sovereign cloud and more ofย a software stack to build your own sovereign cloud,โ€ Dion Hinchcliffe, lead of the CIO practice at the Futurum Group, said, adding that Core can be used across environments, such as on-premises data centers, supported in-region cloud infrastructure, or through IT service providers.

Avoiding vendor lock-in

That shift in approach, according to analysts, could redefine how CIOs manage sovereign deployments and help them avoid vendor lock-in.

In traditional sovereign cloud deployments, hyperscalers retain control over critical operations like updates and access, creating regulatory risk and locking customers into provider-specific architectures, APIs, and compliance tools, Hinchcliffe said.

When workloads move, identity management, encryption keys, and audit trails tied to the old provider donโ€™t transfer seamlessly, forcing CIOs to rebuild governance frameworks to meet regulatory requirements in the new environment, Hinchcliffe added.

In contrast, Sovereign Core is trying to offer more control to CIOs by allowing them to keep encryption keys, identity management, and operational authority within their jurisdiction, which should enable them to switch providers without rebuilding governance frameworks, Hinchcliffe pointed out.

Seconding Hinchcliffe, HyperFRAME Researchโ€™s leader of AI stack Stephanie Walter noted that the frequency and stringency of regulator-driven audits were increasing, specifically the EU: Regulators are no longer satisfied with promises of compliance but are seeking more evidence, audit trails, and continuous compliance reporting.

Sovereign Core, according to Hinchcliffe, could also help CIOs tackle these demands with automated evidence collection and continuous monitoring, reducing overhead for banks, government agencies, and defense-adjacent industries.

Boost for moving sovereign AI pilots to production

Analysts say Sovereign Core could help CIOs and their enterprises push their AI pilots into production, especially the ones that require strict data residency and compliance controls.

Most enterprises and organizations are hesitant to send proprietary data to a public AI model, and at the same canโ€™t run GPU-backed inference completely inside their own sovereign boundary, said Phil Fersht, CEO of HFS Research.

Sovereign Coreโ€™s functionalities and capabilities, in contrast, will allow enterprises to run local AI inference inside their own four walls, ensuring the AI model is as โ€œsovereignโ€ as the data itโ€™s processing, in turn providing CIOs with a credible landing zone to move AI from pilots into production under sovereign conditions, Fersht added.

Changing market dynamics

Sovereign Core could be a strategic move by IBM to double down on the sovereignty market ahead of broader AI regulation and surge ahead of hyperscalers such as Microsoft, AWS, and Google.

โ€œWith Europe tightening controls and APAC following, IBM is betting that sovereignty will be a major gating factor for enterprise AI adoption. For some companies, much more even than cost or performance,โ€ Hinchcliffe said.

More so in Europe because regulations restrict foreign entities, such as the hyperscalers, which are all headquartered in the US, from having access to data or control over critical IT systems.

To comply with European regulations, hyperscalers typically work with local integrators and managed service providers, but retain operational control of the underlying platform while partners build and manage services on top, Hinchcliffe said.

IBMโ€™s Sovereign Core takes a different approach: partners can operate the entire environment on behalf of the customer, with IBM stepping out of the operational loop altogether, ensuring more compliance with regulations, Hinchcliffe added.

To that extent, IBM said that it is planning to collaborate with IT service providers globally, starting with an initial rollout in Europe with Computacenter in Germany.

IBM plans to make Sovereign Core generally available around the middle of 2026 with additional capabilities, which are likely to be disclosed soon.

โŒ