โŒ

Reading view

There are new articles available, click to refresh the page.

์นผ๋Ÿผ | ๋ฐ์ดํ„ฐ ๊ด€๋ฆฌ ๋ฐฉ์‹์ด ๋‹ฌ๋ผ์ง„๋‹คยทยทยท2026๋…„ โ€˜๋œจ๋Š” 5๊ฐ€์ง€, ์ง€๋Š” 5๊ฐ€์ง€โ€™

๋ฐ์ดํ„ฐ ํ™˜๊ฒฝ์€ ๋Œ€๋ถ€๋ถ„์˜ ๊ธฐ์—…์ด ๋”ฐ๋ผ๊ฐ€๊ธฐ ์–ด๋ ค์šธ ๋งŒํผ ๋น ๋ฅด๊ฒŒ ๋ณ€ํ™”ํ•˜๊ณ  ์žˆ๋‹ค. ์ด๋Ÿฐ ๋ณ€ํ™” ์†๋„๋Š” 2๊ฐ€์ง€ ํž˜์ด ๋งž๋ฌผ๋ฆฌ๋ฉด์„œ ๊ฐ€์†ํ™”๋˜๊ณ  ์žˆ๋‹ค. ํ•˜๋‚˜๋Š” ์ ์ฐจ ์„ฑ์ˆ™ ๋‹จ๊ณ„์— ์ ‘์–ด๋“œ๋Š” ์—”ํ„ฐํ”„๋ผ์ด์ฆˆ ๋ฐ์ดํ„ฐ ๊ด€๋ฆฌ ๊ด€ํ–‰์ด๊ณ , ๋‹ค๋ฅธ ํ•˜๋‚˜๋Š” ๊ธฐ์—…์ด ํ™œ์šฉํ•˜๋Š” ๋ฐ์ดํ„ฐ์— ๋” ๋†’์€ ์ˆ˜์ค€์˜ ์ผ๊ด€์„ฑ, ์ •ํ•ฉ์„ฑ, ์‹ ๋ขฐ๋ฅผ ์š”๊ตฌํ•˜๋Š” AI ํ”Œ๋žซํผ์ด๋‹ค.

๊ทธ ๊ฒฐ๊ณผ 2026๋…„์€ ๊ธฐ์—…์ด ์ฃผ๋ณ€๋ถ€๋ฅผ ์กฐ๊ธˆ์”ฉ ์†๋ณด๋Š” ๋ฐ์„œ ๋ฒ—์–ด๋‚˜, ๋ฐ์ดํ„ฐ ๊ด€๋ฆฌ์˜ ํ•ต์‹ฌ ๊ตฌ์กฐ๋ฅผ ๋ณธ๊ฒฉ์ ์œผ๋กœ ์ „ํ™˜ํ•˜๋Š” ํ•ด๊ฐ€ ๋  ์ „๋ง์ด๋‹ค. ๋ฐ์ดํ„ฐ ๊ด€๋ฆฌ ์˜์—ญ์—์„œ ๋ฌด์—‡์ด ํ•„์š”ํ•ด์ง€๊ณ  ๋ฌด์—‡์ด ์•„๋‹Œ์ง€์— ๋Œ€ํ•œ ๊ธฐ์ค€๋„ ์ ์ฐจ ๋šœ๋ ทํ•ด์ง€๊ณ  ์žˆ์œผ๋ฉฐ, ์ด๋Š” ํŒŒํŽธํ™”๋œ ๋„๊ตฌ ํ™˜๊ฒฝ๊ณผ ์ˆ˜์ž‘์—… ์ค‘์‹ฌ์˜ ๊ด€๋ฆฌ, ์‹ค์งˆ์ ์ธ ์ธํ…”๋ฆฌ์ „์Šค๋ฅผ ์ œ๊ณตํ•˜์ง€ ๋ชปํ•˜๋Š” ๋Œ€์‹œ๋ณด๋“œ์— ํ”ผ๋กœ๊ฐ์„ ๋А๋‚€ ์‹œ์žฅ์˜ ํ˜„์‹ค์„ ๊ทธ๋Œ€๋กœ ๋ณด์—ฌ์ค€๋‹ค.

2026๋…„ ๋ฐ์ดํ„ฐ ๊ด€๋ฆฌ ์˜์—ญ์—์„œ โ€˜๋œจ๋Š” ์š”์†Œโ€™์™€ โ€˜์ง€๋Š” ์š”์†Œโ€™๋ฅผ ์ •๋ฆฌํ•ด ๋ณธ๋‹ค.

๋œจ๋Š” ์š”์†Œ 1: ์‚ฌ๋žŒ์˜ ํŒ๋‹จ์— ๊ธฐ๋ฐ˜ํ•œ ๋„ค์ดํ‹ฐ๋ธŒ ๊ฑฐ๋ฒ„๋„Œ์Šค

๋ฐ์ดํ„ฐ ๊ฑฐ๋ฒ„๋„Œ์Šค๋Š” ๋” ์ด์ƒ ๋ถ€๊ฐ€์ ์ธ ์ž‘์—…์— ๊ทธ์น˜์ง€ ์•Š๋Š”๋‹ค. ์œ ๋‹ˆํ‹ฐ ์นดํƒˆ๋กœ๊ทธ, ์Šค๋…ธ์šฐํ”Œ๋ ˆ์ดํฌ ํ˜ธ๋ผ์ด์ฆŒ, AWS ๊ธ€๋ฃจ ์นดํƒˆ๋กœ๊ทธ์™€ ๊ฐ™์€ ํ”Œ๋žซํผ์€ ๊ฑฐ๋ฒ„๋„Œ์Šค๋ฅผ ์•„ํ‚คํ…์ฒ˜์˜ ๊ธฐ์ดˆ ์š”์†Œ๋กœ ์ง์ ‘ ํ†ตํ•ฉํ•˜๊ณ  ์žˆ๋‹ค. ์ด๋Š” ์™ธ๋ถ€ ๊ฑฐ๋ฒ„๋„Œ์Šค ๊ณ„์ธต์ด ์˜คํžˆ๋ ค ๋งˆ์ฐฐ์„ ํ‚ค์šฐ๊ณ , ๋ฐ์ดํ„ฐ ์ „๋ฐ˜์„ ์ผ๊ด€๋˜๊ฒŒ ๊ด€๋ฆฌํ•˜๋Š” ๋ฐ ํ•œ๊ณ„๋กœ ์ž‘์šฉํ•œ๋‹ค๋Š” ์ธ์‹์ด ๋ฐ˜์˜๋œ ๊ฒฐ๊ณผ๋‹ค. ์ƒˆ๋กญ๊ฒŒ ์ž๋ฆฌ ์žก์€ ํ๋ฆ„์˜ ํ•ต์‹ฌ์€ ๋„ค์ดํ‹ฐ๋ธŒ ์ž๋™ํ™”๋‹ค. ๋ฐ์ดํ„ฐ ํ’ˆ์งˆ ์ ๊ฒ€, ์ด์ƒ ์ง•ํ›„ ์•Œ๋ฆผ, ์‚ฌ์šฉ ํ˜„ํ™ฉ ๋ชจ๋‹ˆํ„ฐ๋ง์ด ๋ฐฑ๊ทธ๋ผ์šด๋“œ์—์„œ ์ƒ์‹œ์ ์œผ๋กœ ์ž‘๋™ํ•˜๋ฉฐ, ์‚ฌ๋žŒ์ด ๋”ฐ๋ผ๊ฐˆ ์ˆ˜ ์—†๋Š” ์†๋„๋กœ ํ™˜๊ฒฝ ์ „๋ฐ˜์˜ ๋ณ€ํ™”๋ฅผ ํฌ์ฐฉํ•œ๋‹ค.

๋‹ค๋งŒ ์ด๋Ÿฌํ•œ ์ž๋™ํ™”๊ฐ€ ์‚ฌ๋žŒ์˜ ํŒ๋‹จ์„ ๋Œ€์ฒดํ•˜๋Š” ๊ฒƒ์€ ์•„๋‹ˆ๋‹ค. ๋ฌธ์ œ๋Š” ๋„๊ตฌ๊ฐ€ ์ง„๋‹จํ•˜์ง€๋งŒ, ์‹ฌ๊ฐ๋„์˜ ๊ธฐ์ค€์„ ์–ด๋–ป๊ฒŒ ์ •ํ• ์ง€, ์–ด๋–ค SLA๊ฐ€ ์ค‘์š”ํ•œ์ง€, ์—์Šค์ปฌ๋ ˆ์ด์…˜ ๊ฒฝ๋กœ๋ฅผ ์–ด๋–ป๊ฒŒ ์„ค๊ณ„ํ• ์ง€๋Š” ์—ฌ์ „ํžˆ ์‚ฌ๋žŒ์ด ๊ฒฐ์ •ํ•œ๋‹ค. ์—…๊ณ„๋Š” ๋„๊ตฌ๊ฐ€ ํƒ์ง€๋ฅผ ๋‹ด๋‹นํ•˜๊ณ , ์˜๋ฏธ ๋ถ€์—ฌ์™€ ์ฑ…์ž„์€ ์‚ฌ๋žŒ์ด ๋งก๋Š” ๊ตฌ์กฐ๋กœ ๋ณ€ํ™”ํ•˜๊ณ  ์žˆ๋‹ค. ์ด๋Š” ๊ฑฐ๋ฒ„๋„Œ์Šค๊ฐ€ ์–ธ์  ๊ฐ€ ์™„์ „ํžˆ ์ž๋™ํ™”๋  ๊ฒƒ์ด๋ผ๋Š” ์ธ์‹์—์„œ ๋ฒ—์–ด๋‚˜๋Š” ํ๋ฆ„์œผ๋กœ ๋ณผ ์ˆ˜ ์žˆ๋‹ค. ๋Œ€์‹  ๊ธฐ์—…์€ ๋„ค์ดํ‹ฐ๋ธŒ ๊ธฐ์ˆ ์˜ ์ด์ ์„ ์ ๊ทน ํ™œ์šฉํ•˜๋Š” ๋™์‹œ์—, ์‚ฌ๋žŒ์˜ ์˜์‚ฌ๊ฒฐ์ •์ด ์ง€๋‹Œ ๊ฐ€์น˜๋ฅผ ๋‹ค์‹œ ํ•œ๋ฒˆ ๊ฐ•ํ™”ํ•˜๊ณ  ์žˆ๋‹ค.

๋œจ๋Š” ์š”์†Œ 2: ํ”Œ๋žซํผ ํ†ตํ•ฉ๊ณผ ํฌ์ŠคํŠธ ์›จ์–ดํ•˜์šฐ์Šค ๋ ˆ์ดํฌํ•˜์šฐ์Šค์˜ ๋ถ€์ƒ

์ˆ˜์‹ญ ๊ฐœ์˜ ํŠนํ™”๋œ ๋ฐ์ดํ„ฐ ๋„๊ตฌ๋ฅผ ์ด์–ด ๋ถ™์—ฌ ์‚ฌ์šฉํ•˜๋˜ ์‹œ๋Œ€๊ฐ€ ๋ง‰์„ ๋‚ด๋ฆฌ๊ณ  ์žˆ๋‹ค. ๋ถ„์‚ฐ์„ ์ „์ œ๋กœ ํ•œ ์‚ฌ๊ณ ๋ฐฉ์‹์ด ๋ณต์žก์„ฑ์˜ ํ•œ๊ณ„์— ๋„๋‹ฌํ–ˆ๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค. ๊ทธ๋™์•ˆ ๊ธฐ์—…์€ ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘ ์‹œ์Šคํ…œ, ํŒŒ์ดํ”„๋ผ์ธ, ์นดํƒˆ๋กœ๊ทธ, ๊ฑฐ๋ฒ„๋„Œ์Šค ๊ณ„์ธต, ์›จ์–ดํ•˜์šฐ์Šค ์—”์ง„, ๋Œ€์‹œ๋ณด๋“œ ๋„๊ตฌ๋ฅผ ์กฐํ•ฉํ•ด ์™”๋‹ค. ๊ทธ ๊ฒฐ๊ณผ ์œ ์ง€ ๋น„์šฉ์€ ๋†’๊ณ  ๊ตฌ์กฐ๋Š” ์ทจ์•ฝํ•˜๋ฉฐ, ๊ฑฐ๋ฒ„๋„Œ์Šค ์ธก๋ฉด์—์„œ๋Š” ์˜ˆ์ƒ๋ณด๋‹ค ํ›จ์”ฌ ๊ด€๋ฆฌํ•˜๊ธฐ ์–ด๋ ค์šด ํ™˜๊ฒฝ์ด ํ˜•์„ฑ๋๋‹ค.

๋ฐ์ดํ„ฐ๋ธŒ๋ฆญ์Šค, ์Šค๋…ธ์šฐํ”Œ๋ ˆ์ดํฌ, ๋งˆ์ดํฌ๋กœ์†Œํ”„ํŠธ๋Š” ์ด๋Ÿฐ ์ƒํ™ฉ์„ ๊ธฐํšŒ๋กœ ๋ณด๊ณ  ํ”Œ๋žซํผ์„ ํ†ตํ•ฉ ํ™˜๊ฒฝ์œผ๋กœ ํ™•์žฅํ•˜๊ณ  ์žˆ๋‹ค. ๋ ˆ์ดํฌํ•˜์šฐ์Šค๋Š” ๋ฐ์ดํ„ฐ ์•„ํ‚คํ…์ฒ˜์˜ ํ•ต์‹ฌ ์ง€ํ–ฅ์ ์œผ๋กœ ์ž๋ฆฌ ์žก์•˜๋‹ค. ์ •ํ˜• ๋ฐ ๋น„์ •ํ˜• ๋ฐ์ดํ„ฐ๋ฅผ ํ•˜๋‚˜์˜ ํ”Œ๋žซํผ์—์„œ ์ฒ˜๋ฆฌํ•˜๊ณ , ๋ถ„์„๊ณผ ๋จธ์‹ ๋Ÿฌ๋‹, AI ํ•™์Šต๊นŒ์ง€ ์•„์šฐ๋ฅผ ์ˆ˜ ์žˆ๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค. ๊ธฐ์—…์€ ๋” ์ด์ƒ ๋ฐ์ดํ„ฐ ์‚ฌ์ผ๋กœ ๊ฐ„ ์ด๋™์ด๋‚˜ ํ˜ธํ™˜๋˜์ง€ ์•Š๋Š” ์‹œ์Šคํ…œ์„ ๋™์‹œ์— ๊ด€๋ฆฌํ•˜๊ธธ ์›ํ•˜์ง€ ์•Š๋Š”๋‹ค. ํ•„์š”ํ•œ ๊ฒƒ์€ ๋งˆ์ฐฐ์„ ์ค„์ด๊ณ  ๋ณด์•ˆ์„ ๋‹จ์ˆœํ™”ํ•˜๋ฉฐ AI ๊ฐœ๋ฐœ ์†๋„๋ฅผ ๋†’์ผ ์ˆ˜ ์žˆ๋Š” ์ค‘์•™ ์šด์˜ ํ™˜๊ฒฝ์ด๋‹ค. ํ”Œ๋žซํผ ํ†ตํ•ฉ์€ ์ด์ œ ๋ฒค๋” ์ข…์†์˜ ๋ฌธ์ œ๊ฐ€ ์•„๋‹ˆ๋ผ, ๋ฐ์ดํ„ฐ๊ฐ€ ํญ์ฆํ•˜๊ณ  AI๊ฐ€ ๊ทธ ์–ด๋А ๋•Œ๋ณด๋‹ค ๋†’์€ ์ผ๊ด€์„ฑ์„ ์š”๊ตฌํ•˜๋Š” ํ™˜๊ฒฝ์—์„œ ์ƒ์กด์„ ์œ„ํ•œ ์„ ํƒ์œผ๋กœ ๋ฐ›์•„๋“ค์—ฌ์ง€๊ณ  ์žˆ๋‹ค.

๋œจ๋Š” ์š”์†Œ 3: ์ œ๋กœ ETL์„ ํ†ตํ•œ ์—”๋“œํˆฌ์—”๋“œ ํŒŒ์ดํ”„๋ผ์ธ ๊ด€๋ฆฌ

์ˆ˜์ž‘์—… ๊ธฐ๋ฐ˜์˜ ETL(์ถ”์ถœ, ์ „ํ™˜, ์ ์žฌ)์€ ์‚ฌ์‹ค์ƒ ๋งˆ์ง€๋ง‰ ๋‹จ๊ณ„์— ์ ‘์–ด๋“ค๊ณ  ์žˆ๋‹ค. ETL์€ ์—ฌ๋Ÿฌ ์‹œ์Šคํ…œ์— ํฉ์–ด์ง„ ๋ฐ์ดํ„ฐ๋ฅผ ์ถ”์ถœํ•˜๊ณ , ๋ถ„์„์— ์ ํ•ฉํ•œ ํ˜•ํƒœ๋กœ ๋ณ€ํ™˜ํ•œ ๋’ค, ๋ฐ์ดํ„ฐ ์›จ์–ดํ•˜์šฐ์Šค๋‚˜ ๋ ˆ์ดํฌ ๊ฐ™์€ ์ €์žฅ์†Œ์— ์ ์žฌํ•˜๋Š” ๊ณผ์ •์„ ์˜๋ฏธํ•œ๋‹ค. ํŒŒ์ด์ฌ ์Šคํฌ๋ฆฝํŠธ๋‚˜ ์ปค์Šคํ…€ SQL ์ž‘์—…์€ ์œ ์—ฐ์„ฑ์„ ์ œ๊ณตํ•˜์ง€๋งŒ, ์ž‘์€ ๋ณ€ํ™”์—๋„ ์‰ฝ๊ฒŒ ์˜ค๋ฅ˜๊ฐ€ ๋ฐœ์ƒํ•˜๊ณ  ์—”์ง€๋‹ˆ์–ด์˜ ์ง€์†์ ์ธ ๊ด€๋ฆฌ ๋ถ€๋‹ด์„ ์š”๊ตฌํ•œ๋‹ค. ์ด๋Ÿฐ ๊ณต๋ฐฑ์„ ๊ด€๋ฆฌํ˜• ํŒŒ์ดํ”„๋ผ์ธ ๋„๊ตฌ๊ฐ€ ๋น ๋ฅด๊ฒŒ ๋ฉ”์šฐ๊ณ  ์žˆ๋‹ค. ๋ฐ์ดํ„ฐ๋ธŒ๋ฆญ์Šค ๋ ˆ์ดํฌํ”Œ๋กœ์šฐ, ์Šค๋…ธ์šฐํ”Œ๋ ˆ์ดํฌ ์˜คํ”ˆํ”Œ๋กœ์šฐ, AWS ๊ธ€๋ฃจ๋Š” ๋ฐ์ดํ„ฐ ์ถ”์ถœ๋ถ€ํ„ฐ ๋ชจ๋‹ˆํ„ฐ๋ง, ์žฅ์•  ๋ณต๊ตฌ๊นŒ์ง€ ์•„์šฐ๋ฅด๋Š” ์ฐจ์„ธ๋Œ€ ์˜ค์ผ€์ŠคํŠธ๋ ˆ์ด์…˜ ํ™˜๊ฒฝ์„ ์ œ์‹œํ•œ๋‹ค.

๋ณต์žกํ•œ ์†Œ์Šค ์‹œ์Šคํ…œ์„ ์ฒ˜๋ฆฌํ•˜๋Š” ๊ณผ์ œ๋Š” ์—ฌ์ „ํžˆ ๋‚จ์•„์žˆ์ง€๋งŒ, ๋ฐฉํ–ฅ์„ฑ์€ ๋ถ„๋ช…ํ•˜๋‹ค. ๊ธฐ์—…์€ ์Šค์Šค๋กœ ์œ ์ง€๋˜๋Š” ํŒŒ์ดํ”„๋ผ์ธ์„ ์›ํ•˜๊ณ  ์žˆ๋‹ค. ๊ตฌ์„ฑ ์š”์†Œ๋ฅผ ์ค„์ด๊ณ , ์‚ฌ์†Œํ•œ ์Šคํฌ๋ฆฝํŠธ ๋ˆ„๋ฝ์œผ๋กœ ๋ฐœ์ƒํ•˜๋Š” ์•ผ๊ฐ„ ์žฅ์• ๋ฅผ ์ตœ์†Œํ™”ํ•˜๊ธธ ๊ธฐ๋Œ€ํ•œ๋‹ค. ์ผ๋ถ€ ์กฐ์ง์€ ํŒŒ์ดํ”„๋ผ์ธ ์ž์ฒด๋ฅผ ์šฐํšŒํ•˜๋Š” ์„ ํƒ๋„ ํ•˜๊ณ  ์žˆ๋‹ค. ์ œ๋กœ ETL ํŒจํ„ด์„ ํ†ตํ•ด ์šด์˜ ์‹œ์Šคํ…œ์˜ ๋ฐ์ดํ„ฐ๋ฅผ ๋ถ„์„ ํ™˜๊ฒฝ์œผ๋กœ ์ฆ‰์‹œ ๋ณต์ œํ•จ์œผ๋กœ์จ, ์•ผ๊ฐ„ ๋ฐฐ์น˜ ์ž‘์—…์ด ์ง€๋‹Œ ์ทจ์•ฝ์„ฑ์„ ์ œ๊ฑฐํ•˜๋Š” ๋ฐฉ์‹์ด๋‹ค. ์ด๋Š” ์‹ค์‹œ๊ฐ„ ๊ฐ€์‹œ์„ฑ๊ณผ ์‹ ๋ขฐํ•  ์ˆ˜ ์žˆ๋Š” AI ํ•™์Šต ๋ฐ์ดํ„ฐ๋ฅผ ์š”๊ตฌํ•˜๋Š” ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์—์„œ ์ƒˆ๋กœ์šด ํ‘œ์ค€์œผ๋กœ ๋– ์˜ค๋ฅด๊ณ  ์žˆ๋‹ค.

๋œจ๋Š” ์š”์†Œ 4: ๋Œ€ํ™”ํ˜• ๋ถ„์„๊ณผ ์—์ด์ „ํ‹ฑ BI

๋Œ€์‹œ๋ณด๋“œ๋Š” ์ ์ฐจ ๊ธฐ์—… ๋‚ด ์ค‘์‹ฌ ๋„๊ตฌ๋กœ์„œ์˜ ์ž…์ง€๋ฅผ ์žƒ๊ณ  ์žˆ๋‹ค. ์ˆ˜๋…„๊ฐ„ ํˆฌ์ž๊ฐ€ ์ด์–ด์กŒ์Œ์—๋„ ์‹ค์ œ ํ™œ์šฉ๋„๋Š” ์—ฌ์ „ํžˆ ๋‚ฎ๊ณ , ๊ทธ ์ˆ˜๋„ ๊ณ„์†ํ•ด์„œ ๋Š˜์–ด๋‚˜๋Š” ์–‘์ƒ์„ ๋ณด์ด๊ณ  ์žˆ๋‹ค. ๋Œ€๋ถ€๋ถ„์˜ ๋น„์ฆˆ๋‹ˆ์Šค ์‚ฌ์šฉ์ž๋Š” ์ •์ ์ธ ์ฐจํŠธ ์†์— ๋ฌปํžŒ ์ธ์‚ฌ์ดํŠธ๋ฅผ ์ง์ ‘ ์ฐพ์•„๋‚ด๊ณ  ์‹ถ์–ด ํ•˜์ง€ ์•Š๋Š”๋‹ค. ์ด๋“ค์ด ์›ํ•˜๋Š” ๊ฒƒ์€ ๋‹จ์ˆœํ•œ ์‹œ๊ฐํ™”๊ฐ€ ์•„๋‹ˆ๋ผ ๋ช…ํ™•ํ•œ ๋‹ต๋ณ€๊ณผ ์„ค๋ช…, ๊ทธ๋ฆฌ๊ณ  ๋งฅ๋ฝ์ด๋‹ค.

์ด๋Ÿฐ ๊ณต๋ฐฑ์„ ๋Œ€ํ™”ํ˜• ๋ถ„์„์ด ๋ฉ”์šฐ๊ณ  ์žˆ๋‹ค. ์ƒ์„ฑํ˜• BI ์‹œ์Šคํ…œ์€ ์‚ฌ์šฉ์ž๊ฐ€ ์›ํ•˜๋Š” ๋Œ€์‹œ๋ณด๋“œ๋ฅผ ๋ง๋กœ ์„ค๋ช…ํ•˜๊ฑฐ๋‚˜, ์—์ด์ „ํŠธ์—๊ฒŒ ๋ฐ์ดํ„ฐ๋ฅผ ์ง์ ‘ ํ•ด์„ํ•ด ๋‹ฌ๋ผ๊ณ  ์š”์ฒญํ•  ์ˆ˜ ์žˆ๋„๋ก ํ•œ๋‹ค. ํ•„ํ„ฐ๋ฅผ ํ•˜๋‚˜์”ฉ ํด๋ฆญํ•˜๋Š” ๋Œ€์‹  ๋ถ„๊ธฐ๋ณ„ ์„ฑ๊ณผ ์š”์•ฝ์„ ์š”์ฒญํ•˜๊ฑฐ๋‚˜, ํŠน์ • ์ง€ํ‘œ๊ฐ€ ์™œ ๋ณ€ํ–ˆ๋Š”์ง€๋ฅผ ์งˆ๋ฌธํ•  ์ˆ˜ ์žˆ๋‹ค. ์ดˆ๊ธฐ์˜ ์ž์—ฐ์–ด ๊ธฐ๋ฐ˜ SQL ์ž๋™ ์ƒ์„ฑ ๊ธฐ์ˆ ์€ ์ฟผ๋ฆฌ ์ž‘์„ฑ ๊ณผ์ •์„ ์ž๋™ํ™”ํ•˜๋Š” ๋ฐ ์ดˆ์ ์„ ๋งž์ถฐ ํ•œ๊ณ„๋ฅผ ๋“œ๋Ÿฌ๋ƒˆ๋‹ค. ๋ฐ˜๋ฉด ์ตœ๊ทผ์˜ ํ๋ฆ„์€ ๋‹ค๋ฅด๋‹ค. AI ์—์ด์ „ํŠธ๋Š” ์ฟผ๋ฆฌ๋ฅผ ๋งŒ๋“œ๋Š” ์—ญํ• ๋ณด๋‹ค ์ธ์‚ฌ์ดํŠธ๋ฅผ ์ข…ํ•ฉํ•˜๊ณ , ํ•„์š”์— ๋”ฐ๋ผ ์‹œ๊ฐํ™”๋ฅผ ์ƒ์„ฑํ•˜๋Š” ๋ฐ ์ง‘์ค‘ํ•œ๋‹ค. ์ด๋“ค์€ ๋‹จ์ˆœํ•œ ์งˆ์˜ ์ฒ˜๋ฆฌ ๋„๊ตฌ๊ฐ€ ์•„๋‹ˆ๋ผ, ๋ฐ์ดํ„ฐ์™€ ๋น„์ฆˆ๋‹ˆ์Šค ์งˆ๋ฌธ์„ ํ•จ๊ป˜ ์ดํ•ดํ•˜๋Š” ๋ถ„์„๊ฐ€์— ๊ฐ€๊นŒ์šด ์กด์žฌ๋กœ ์ง„ํ™”ํ•˜๊ณ  ์žˆ๋‹ค.

๋œจ๋Š” ์š”์†Œ 5: ๋ฒกํ„ฐ ๋„ค์ดํ‹ฐ๋ธŒ ์Šคํ† ๋ฆฌ์ง€์™€ ๊ฐœ๋ฐฉํ˜• ํ…Œ์ด๋ธ” ํฌ๋งท

AI๋Š” ์Šคํ† ๋ฆฌ์ง€์— ๋Œ€ํ•œ ์š”๊ตฌ ์กฐ๊ฑด ์ž์ฒด๋ฅผ ๋ฐ”๊พธ๊ณ  ์žˆ๋‹ค. ํŠนํžˆ ๊ฒ€์ƒ‰ ์ฆ๊ฐ• ์ƒ์„ฑ(RAG)์€ ๋ฒกํ„ฐ ์ž„๋ฒ ๋”ฉ์„ ์ „์ œ๋กœ ํ•œ๋‹ค. ์ด๋Š” ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค๊ฐ€ ๋ฒกํ„ฐ ๋ฐ์ดํ„ฐ๋ฅผ ๋ณ„๋„์˜ ํ™•์žฅ ๊ธฐ๋Šฅ์ด ์•„๋‹Œ, ๊ธฐ๋ณธ ๋ฐ์ดํ„ฐ ์œ ํ˜•์œผ๋กœ ์ €์žฅํ•˜๊ณ  ์ฒ˜๋ฆฌํ•  ์ˆ˜ ์žˆ์–ด์•ผ ํ•จ์„ ์˜๋ฏธํ•œ๋‹ค. ์ด์— ๋”ฐ๋ผ ๋ฒค๋”๋Š” ๋ฐ์ดํ„ฐ ์—”์ง„ ๋‚ด๋ถ€์— ๋ฒกํ„ฐ ๊ธฐ๋Šฅ์„ ์ง์ ‘ ๋‚ด์žฅํ•˜๊ธฐ ์œ„ํ•ด ๊ฒฝ์Ÿ์ ์œผ๋กœ ์›€์ง์ด๊ณ  ์žˆ๋‹ค.

๋™์‹œ์— ์•„ํŒŒ์น˜ ์•„์ด์Šค๋ฒ„๊ทธ(Apache Iceberg)๊ฐ€ ๊ฐœ๋ฐฉํ˜• ํ…Œ์ด๋ธ” ํฌ๋งท์˜ ์ƒˆ๋กœ์šด ํ‘œ์ค€์œผ๋กœ ์ž๋ฆฌ ์žก์•„๊ฐ€๊ณ  ์žˆ๋‹ค. ์•„์ด์Šค๋ฒ„๊ทธ๋Š” ๋ฐ์ดํ„ฐ ๋ณต์ œ๋‚˜ ๋ณ„๋„์˜ ๋ณ€ํ™˜ ๊ณผ์ • ์—†์ด๋„ ๋‹ค์–‘ํ•œ ์ปดํ“จํŒ… ์—”์ง„์ด ๋™์ผํ•œ ๋ฐ์ดํ„ฐ๋ฅผ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์›ํ•œ๋‹ค. ๊ทธ๋™์•ˆ ์—…๊ณ„๋ฅผ ๊ดด๋กญํ˜€ ์˜จ ์ƒํ˜ธ์šด์šฉ์„ฑ ๋ฌธ์ œ๋ฅผ ์ƒ๋‹น ๋ถ€๋ถ„ ํ•ด์†Œํ•˜๊ณ , ์˜ค๋ธŒ์ ํŠธ ์Šคํ† ๋ฆฌ์ง€๋ฅผ ์ง„์ •ํ•œ ๋ฉ€ํ‹ฐ ์—”์ง„ ๊ธฐ๋ฐ˜์œผ๋กœ ์ „ํ™˜์‹œํ‚ค๋Š” ์—ญํ• ์„ ํ•œ๋‹ค. ์ด๋ฅผ ํ†ตํ•ด ๊ธฐ์—…์€ ๋ฐ์ดํ„ฐ ์ƒํƒœ๊ณ„๊ฐ€ ๋ณ€ํ™”ํ•  ๋•Œ๋งˆ๋‹ค ๋ชจ๋“  ๊ตฌ์กฐ๋ฅผ ๋‹ค์‹œ ์ž‘์„ฑํ•˜์ง€ ์•Š๊ณ ๋„, ์žฅ๊ธฐ์ ์ธ ๊ด€์ ์—์„œ ๋ฐ์ดํ„ฐ๋ฅผ ์•ˆ์ •์ ์œผ๋กœ ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๋Š” ๊ธฐ๋ฐ˜์„ ๋งˆ๋ จํ•  ์ˆ˜ ์žˆ๋‹ค.

๋‹ค์Œ์€ 2026๋…„์— ์ง€๋Š” ๋ฐ์ดํ„ฐ ๊ด€๋ฆฌ ์š”์†Œ๋‹ค.

์ง€๋Š” ์š”์†Œ 1: ๊ธฐ์กด ๋ชจ๋†€๋ฆฌ์‹ ์›จ์–ดํ•˜์šฐ์Šค์™€ ๊ณผ๋„ํ•˜๊ฒŒ ๋ถ„์‚ฐ๋œ ๋„๊ตฌ ์ฒด๊ณ„

ํ•˜๋‚˜์˜ ๊ฑฐ๋Œ€ํ•œ ์‹œ์Šคํ…œ์— ๋ชจ๋“  ๊ธฐ๋Šฅ์„ ํƒ‘์žฌํ•œ ์ „ํ†ต์ ์ธ ๋ฐ์ดํ„ฐ ์›จ์–ดํ•˜์šฐ์Šค๋Š” ๋Œ€๊ทœ๋ชจ ๋น„์ •ํ˜• ๋ฐ์ดํ„ฐ๋ฅผ ์ฒ˜๋ฆฌํ•˜๋Š” ๋ฐ ํ•œ๊ณ„๊ฐ€ ์žˆ๊ณ , AI๊ฐ€ ์š”๊ตฌํ•˜๋Š” ์‹ค์‹œ๊ฐ„ ์ฒ˜๋ฆฌ ์—ญ๋Ÿ‰๋„ ์ถฉ๋ถ„ํžˆ ์ œ๊ณตํ•˜์ง€ ๋ชปํ•œ๋‹ค. ๊ทธ๋ ‡๋‹ค๊ณ  ํ•ด์„œ ๊ทธ ๋ฐ˜๋Œ€ ๊ทน๋‹จ์ด ํ•ด๋ฒ•์ด ๋œ ๊ฒƒ๋„ ์•„๋‹ˆ๋‹ค. ํ˜„๋Œ€ ๋ฐ์ดํ„ฐ ์Šคํƒ์€ ์ˆ˜๋งŽ์€ ์†Œ๊ทœ๋ชจ ๋„๊ตฌ์— ์—ญํ• ๊ณผ ์ฑ…์ž„์„ ๋ถ„์‚ฐ์‹œ์ผฐ๊ณ , ๊ทธ ๊ฒฐ๊ณผ ๊ฑฐ๋ฒ„๋„Œ์Šค๋Š” ๋ณต์žกํ•ด์กŒ์œผ๋ฉฐ AI๋ฅผ ์œ„ํ•œ ์ค€๋น„ ์†๋„๋„ ์˜คํžˆ๋ ค ๋А๋ ค์กŒ๋‹ค. ๋ฐ์ดํ„ฐ ๋ฉ”์‹œ ์—ญ์‹œ ์ƒํ™ฉ์€ ๋น„์Šทํ•˜๋‹ค. ๋ฐ์ดํ„ฐ ์†Œ์œ ์™€ ๋ถ„์‚ฐ ์ฑ…์ž„์ด๋ผ๋Š” ์›์น™ ์ž์ฒด๋Š” ์—ฌ์ „ํžˆ ์˜๋ฏธ๋ฅผ ๊ฐ–์ง€๋งŒ, ์ด๋ฅผ ์—„๊ฒฉํ•˜๊ฒŒ ๊ตฌํ˜„ํ•˜๋ ค๋Š” ์ ‘๊ทผ๋ฒ•์€ ์ ์ฐจ ํž˜์„ ์žƒ๊ณ  ์žˆ๋‹ค.

์ง€๋Š” ์š”์†Œ 2: ์ˆ˜์ž‘์—… ๊ธฐ๋ฐ˜ ETL๊ณผ ์ปค์Šคํ…€ ์ปค๋„ฅํ„ฐ

์•ผ๊ฐ„ ๋ฐฐ์น˜ ์Šคํฌ๋ฆฝํŠธ๋Š” ๋ฌธ์ œ๋ฅผ ์ฆ‰๊ฐ์ ์œผ๋กœ ๋“œ๋Ÿฌ๋‚ด์ง€ ์•Š์€ ์ฑ„ ์ค‘๋‹จ๋˜๊ธฐ ์‰ฝ๊ณ , ์ฒ˜๋ฆฌ ์ง€์—ฐ์„ ์ดˆ๋ž˜ํ•˜๋ฉฐ ์—”์ง€๋‹ˆ์–ด์˜ ์‹œ๊ฐ„์„ ์ง€์†์ ์œผ๋กœ ์†Œ๋ชจํ•œ๋‹ค. ๋ฐ์ดํ„ฐ ๋ณต์ œ ๋„๊ตฌ์™€ ๊ด€๋ฆฌํ˜• ํŒŒ์ดํ”„๋ผ์ธ์ด ํ‘œ์ค€์œผ๋กœ ์ž๋ฆฌ ์žก์œผ๋ฉด์„œ, ์—…๊ณ„๋Š” ์ด๋Ÿฌํ•œ ์ทจ์•ฝํ•œ ์›Œํฌํ”Œ๋กœ์šฐ์—์„œ ๋น ๋ฅด๊ฒŒ ๋ฒ—์–ด๋‚˜๊ณ  ์žˆ๋‹ค. ์‚ฌ๋žŒ์ด ์ง์ ‘ ์—ฐ๊ฒฐํ•˜๊ณ  ๊ด€๋ฆฌํ•˜๋˜ ์ˆ˜๋™์ ์ธ ๋ฐ์ดํ„ฐ ์—ฐ๊ณ„ ๋ฐฉ์‹์€, ์ƒ์‹œ์ ์œผ๋กœ ์ž‘๋™ํ•˜๊ณ  ์ง€์†์ ์œผ๋กœ ๋ชจ๋‹ˆํ„ฐ๋ง๋˜๋Š” ์˜ค์ผ€์ŠคํŠธ๋ ˆ์ด์…˜ ๊ตฌ์กฐ๋กœ ๋Œ€์ฒด๋˜๊ณ  ์žˆ๋‹ค.

์ง€๋Š” ์š”์†Œ 3: ์ˆ˜๋™ ๋ฐ์ดํ„ฐ ๊ด€๋ฆฌ์™€ ์ˆ˜๋™์  ์นดํƒˆ๋กœ๊ทธ

์‚ฌ๋žŒ์ด ๋ฐ์ดํ„ฐ๋ฅผ ์ผ์ผ์ด ๊ฒ€ํ† ํ•˜๊ณ  ๊ด€๋ฆฌํ•˜๋Š” ๋ฐฉ์‹์€ ๋” ์ด์ƒ ํ˜„์‹ค์ ์ธ ์„ ํƒ์ง€๊ฐ€ ์•„๋‹ˆ๋‹ค. ๋ฌธ์ œ๊ฐ€ ๋ฐœ์ƒํ•œ ์ดํ›„์— ์ •๋ฆฌํ•˜๋Š” ๋ฐฉ์‹์€ ๋น„์šฉ ๋Œ€๋น„ ํšจ๊ณผ๊ฐ€ ๋‚ฎ๊ณ , ๊ธฐ๋Œ€๋งŒํผ์˜ ์„ฑ๊ณผ๋ฅผ ๋‚ด๊ธฐ๋„ ์–ด๋ ต๋‹ค. ๋‹จ์ˆœํžˆ ์ •๋ณด๋ฅผ ๋‚˜์—ดํ•˜๋Š” ์œ„ํ‚ค ํ˜•ํƒœ์˜ ์ˆ˜๋™ํ˜• ๋ฐ์ดํ„ฐ ์นดํƒˆ๋กœ๊ทธ ์—ญ์‹œ ์ ์ฐจ ๋น„์ค‘์ด ์ค„์–ด๋“ค๊ณ  ์žˆ๋‹ค. ๋Œ€์‹  ๋ฐ์ดํ„ฐ ์ƒํƒœ๋ฅผ ์ง€์†์ ์œผ๋กœ ๊ฐ์‹œํ•˜๊ณ  ๋ณ€ํ™”์™€ ์ด์ƒ ์ง•ํ›„๋ฅผ ์ž๋™์œผ๋กœ ํŒŒ์•…ํ•˜๋Š” ์•กํ‹ฐ๋ธŒ ๋ฉ”ํƒ€๋ฐ์ดํ„ฐ ์‹œ์Šคํ…œ์ด ํ•„์ˆ˜ ์š”์†Œ๋กœ ๋– ์˜ค๋ฅด๊ณ  ์žˆ๋‹ค.

์ง€๋Š” ์š”์†Œ 4: ์ •์  ๋Œ€์‹œ๋ณด๋“œ์™€ ์ผ๋ฐฉ์  ๋ณด๊ณ 

์ถ”๊ฐ€ ์งˆ๋ฌธ์— ๋‹ตํ•˜์ง€ ๋ชปํ•˜๋Š” ๋Œ€์‹œ๋ณด๋“œ๋Š” ์‚ฌ์šฉ์ž์—๊ฒŒ ์ขŒ์ ˆ๊ฐ์„ ์ค€๋‹ค. ๊ธฐ์—…์ด ์›ํ•˜๋Š” ๊ฒƒ์€ ๋‹จ์ˆœํžˆ ๊ฒฐ๊ณผ๋ฅผ ๋ณด์—ฌ์ฃผ๋Š” ๋„๊ตฌ๊ฐ€ ์•„๋‹ˆ๋ผ ํ•จ๊ป˜ ์ƒ๊ฐํ•  ์ˆ˜ ์žˆ๋Š” ๋ถ„์„ ํ™˜๊ฒฝ์ด๋‹ค. AI ๋น„์„œ ์‚ฌ์šฉ ๊ฒฝํ—˜์œผ๋กœ ๋น„์ฆˆ๋‹ˆ์Šค ๊ธฐ๋Œ€ ์ˆ˜์ค€์ด ๋†’์•„์ง€๋ฉด์„œ, ์ •์ ์ธ ๋ณด๊ณ  ๋ฐฉ์‹์€ ๊ทธ ๋ถ€๋‹ด์„ ๊ฐ๋‹นํ•˜์ง€ ๋ชปํ•˜๊ณ  ์žˆ๋‹ค.

์ง€๋Š” ์š”์†Œ 5: ์˜จํ”„๋ ˆ๋ฏธ์Šค ํ•˜๋‘ก ํด๋Ÿฌ์Šคํ„ฐ

ํ•˜๋‘ก ํด๋Ÿฌ์Šคํ„ฐ(Hadoop)๋Š” ๋Œ€๊ทœ๋ชจ ๋ฐ์ดํ„ฐ๋ฅผ ๋ถ„์‚ฐ ์ €์žฅยท์ฒ˜๋ฆฌํ•˜๊ธฐ ์œ„ํ•ด ์—ฌ๋Ÿฌ ์„œ๋ฒ„๋ฅผ ํ•˜๋‚˜์˜ ์‹œ์Šคํ…œ์ฒ˜๋Ÿผ ๋ฌถ์–ด ์šด์˜ํ•˜๋Š” ์˜คํ”ˆ์†Œ์Šค ๋น…๋ฐ์ดํ„ฐ ์ฒ˜๋ฆฌ ํ™˜๊ฒฝ์ด๋‹ค. ํ•˜์ง€๋งŒ ์˜จํ”„๋ ˆ๋ฏธ์Šค ํ™˜๊ฒฝ์—์„œ ์ด๋ฅผ ์ง์ ‘ ์šด์˜ํ•˜๋Š” ๋ฐฉ์‹์€ ์ ์  ์„ค๋“๋ ฅ์„ ์žƒ๊ณ  ์žˆ๋‹ค. ์˜ค๋ธŒ์ ํŠธ ์Šคํ† ๋ฆฌ์ง€์™€ ์„œ๋ฒ„๋ฆฌ์Šค ์ปดํ“จํŒ…๋ฅผ ๊ฒฐํ•ฉํ•œ ๊ตฌ์กฐ๋Š” ๋” ๋†’์€ ํ™•์žฅ์„ฑ๊ณผ ๋‹จ์ˆœํ•œ ์šด์˜, ๋‚ฎ์€ ๋น„์šฉ์ด๋ผ๋Š” ๋ถ„๋ช…ํ•œ ์ด์ ์„ ์ œ๊ณตํ•œ๋‹ค. ๋ฐ˜๋ฉด ์ˆ˜๋งŽ์€ ๊ตฌ์„ฑ ์š”์†Œ๋กœ ์ด๋ค„์ง„ ํ•˜๋‘ก ์„œ๋น„์Šค ์ƒํƒœ๊ณ„๋Š” ํ˜„๋Œ€์ ์ธ ๋ฐ์ดํ„ฐ ํ™˜๊ฒฝ๊ณผ ๋” ์ด์ƒ ์ž˜ ๋งž์ง€ ์•Š๋Š” ๊ตฌ์กฐ๊ฐ€ ๋˜๊ณ  ์žˆ๋‹ค.

2026๋…„์˜ ๋ฐ์ดํ„ฐ ๊ด€๋ฆฌ๋Š” โ€˜๋ช…ํ™•์„ฑโ€™์„ ์ค‘์‹ฌ์— ๋‘๊ณ  ์žˆ๋‹ค. ์‹œ์žฅ์€ ํŒŒํŽธํ™”๋œ ๊ตฌ์กฐ์™€ ์ˆ˜์ž‘์—… ๊ฐœ์ž…, ๊ทธ๋ฆฌ๊ณ  ์†Œํ†ตํ•˜์ง€ ๋ชปํ•˜๋Š” ๋ถ„์„ ๋ฐฉ์‹์„ ์ ์ฐจ ์™ธ๋ฉดํ•˜๊ณ  ์žˆ๋‹ค. ๋ฏธ๋ž˜์˜ ์ค‘์‹ฌ์—๋Š” ํ†ตํ•ฉ ํ”Œ๋žซํผ, ๋„ค์ดํ‹ฐ๋ธŒ ๊ฑฐ๋ฒ„๋„Œ์Šค, ๋ฒกํ„ฐ ๋„ค์ดํ‹ฐ๋ธŒ ์Šคํ† ๋ฆฌ์ง€, ๋Œ€ํ™”ํ˜• ๋ถ„์„, ๊ทธ๋ฆฌ๊ณ  ์ตœ์†Œํ•œ์˜ ์ธ๊ฐ„ ๊ฐœ์ž…์œผ๋กœ ์šด์˜๋˜๋Š” ํŒŒ์ดํ”„๋ผ์ธ์ด ์ž๋ฆฌ ์žก๊ณ  ์žˆ๋‹ค. AI๋Š” ๋ฐ์ดํ„ฐ ๊ด€๋ฆฌ๋ฅผ ๋Œ€์ฒดํ•˜๋Š” ์กด์žฌ๊ฐ€ ์•„๋‹ˆ๋‹ค. ๋Œ€์‹  ๋‹จ์ˆœํ•จ๊ณผ ๊ฐœ๋ฐฉ์„ฑ, ํ†ตํ•ฉ๋œ ์„ค๊ณ„๋ฅผ ์ค‘์‹œํ•˜๋Š” ๋ฐฉํ–ฅ์œผ๋กœ ๋ฐ์ดํ„ฐ ๊ด€๋ฆฌ์˜ ๊ทœ์น™ ์ž์ฒด๋ฅผ ๋‹ค์‹œ ์“ฐ๊ณ  ์žˆ๋‹ค.
dl-ciokorea@foundryco.com

Whatโ€™s in, and whatโ€™s out: Data management in 2026 has a new attitude

The data landscape is shifting faster than most organizations can track. The pace of change is driven by two forces that are finally colliding productively: enterprise data management practices that are maturing and AI platforms that are demanding more coherence, consistency and trust in the data they consume.

As a result, 2026 is shaping up to be the year when companies stop tinkering on the edges and start transforming the core. What is emerging is a clear sense of what is in and what is out for data management, and it reflects a market that is tired of fragmented tooling, manual oversight and dashboards that fail to deliver real intelligence.

So, hereโ€™s a list of whatโ€™s โ€œInโ€ and whatโ€™s โ€œOutโ€ for data management in 2026:

IN: Native governance that automates the work but still relies on human process

Data governance is no longer a bolt-on exercise. Platforms like Unity Catalog, Snowflake Horizon and AWS Glue Catalog are building governance into the foundation itself. This shift is driven by the realization that external governance layers add friction and rarely deliver reliable end-to-end coverage. The new pattern is native automation. Data quality checks, anomaly alerts and usage monitoring run continuously in the background. They identify what is happening across the environment with speed that humans cannot match.

Yet this automation does not replace human judgment. The tools diagnose issues, but people still decide how severity is defined, which SLAs matter and how escalation paths work. The industry is settling into a balanced model. Tools handle detection. Humans handle meaning and accountability. It is a refreshing rejection of the idea that governance will someday be fully automated. Instead, organizations are taking advantage of native technology while reinforcing the value of human decision-making.

IN: Platform consolidation and the rise of the post-warehouse lakehouse

The era of cobbling together a dozen specialized data tools is ending. Complexity has caught up with the decentralized mindset. Teams have spent years stitching together ingestion systems, pipelines, catalogs, governance layers, warehouse engines and dashboard tools. The result has been fragile stacks that are expensive to maintain and surprisingly hard to govern.

Databricks, Snowflake and Microsoft see an opportunity and are extending their platforms into unified environments. The Lakehouse has emerged as the architectural north star. It gives organizations a single platform for structured and unstructured data, analytics, machine learning and AI training. Companies no longer want to move data between silos or juggle incompatible systems. What they need is a central operating environment that reduces friction, simplifies security and accelerates AI development. Consolidation is no longer about vendor lock-in. It is about survival in a world where data volumes are exploding and AI demands more consistency than ever.

IN: End-to-end pipeline management with zero ETL as the new ideal

Handwritten ETL is entering its final chapter. Python scripts and custom SQL jobs may offer flexibility, but they break too easily and demand constant care from engineers. Managed pipeline tools are stepping into the gap. Databricks Lakeflow, Snowflake Openflow and AWS Glue represent a new generation of orchestration that covers extraction through monitoring and recovery.

While there is still work to do in handling complex source systems, the direction is unmistakable. Companies want pipelines that maintain themselves. They want fewer moving parts and fewer late-night failures caused by an overlooked script. Some organizations are even bypassing pipes altogether. Zero ETL patterns replicate data from operational systems to analytical environments instantly, eliminating the fragility that comes with nightly batch jobs. It is an emerging standard for applications that need real-time visibility and reliable AI training data.

IN: Conversational analytics and agentic BI

Dashboards are losing their grip on the enterprise. Despite years of investment, adoption remains low and dashboard sprawl continues to grow. Most business users do not want to hunt for insights buried in static charts. They want answers. They want explanations. They want context.

Conversational analytics is stepping forward to fill the void. Generative BI systems let users describe the dashboard they want or ask an agent to explain the data directly. Instead of clicking through filters, a user might request a performance summary for the quarter or ask why a metric changed. Early attempts at Text to SQL struggled because they attempted to automate the query writing layer. The next wave is different. AI agents now focus on synthesizing insights and generating visualizations on demand. They act less like query engines and more like analysts who understand both the data and the business question.

IN: Vector native storage and open table formats

AI is reshaping storage requirements. Retrieval Augmented Generation depends on vector embeddings, which means that databases must store vectors as first-class objects. Vendors are racing to embed vector support directly in their engines.

At the same time, Apache Iceberg is becoming the new standard for open table formats. It allows every compute engine to work on the same data without duplication or transformation. Iceberg removes a decade of interoperability pain and turns object storage into a true multi-engine foundation. Organizations finally get a way to future-proof their data without rewriting everything each time the ecosystem shifts.

And hereโ€™s whatโ€™s โ€œOutโ€:

OUT: Monolithic warehouses and hyper-decentralized tooling

Traditional enterprise warehouses cannot handle unstructured data at scale and cannot deliver the real-time capabilities needed for AI. Yet the opposite extreme has failed too. The highly fragmented Modern Data Stack scattered responsibilities across too many small tools. It created governance chaos and slowed down AI readiness. Even the rigid interpretation of Data Mesh has faded. The principles live on, but the strict implementation has lost momentum as companies focus more on AI integration and less on organizational theory.

OUT: Hand-coded ETL and custom connectors

Nightly batch scripts break silently, cause delays and consume engineering bandwidth. With replication tools and managed pipelines becoming mainstream, the industry is rapidly abandoning these brittle workflows. Manual plumbing is giving way to orchestration that is always on and always monitored.

OUT: Manual stewardship and passive catalogs

The idea of humans reviewing data manually is no longer realistic. Reactive cleanup costs too much and delivers too little. Passive catalogs that serve as wikis are declining. Active metadata systems that monitor data continuously are now essential.

Out: Static dashboards and one-way reporting

Dashboards that cannot answer follow up questions frustrate users. Companies want tools that converse. They want analytics that think with them. Static reporting is collapsing under the weight of business expectations shaped by AI assistants.

OUT: On-premises Hadoop clusters

Maintaining on-prem Hadoop is becoming indefensible. Object storage combined with serverless compute offers elasticity, simplicity and lower cost. The complex zoo of Hadoop services no longer fits the modern data landscape.

Data management in 2026 is about clarity. The market is rejecting fragmentation, manual intervention and analytics that fail to communicate. The future belongs to unified platforms, native governance, vector native storage, conversational analytics and pipelines that operate with minimal human interference. AI is not replacing data management. It is rewriting the rules in ways that reward simplicity, openness and integrated design.

This article is published as part of the Foundry Expert Contributor Network.
Want to join?

How analytics capability has quietly reshaped IT operations

As CIOs have entered 2026 anticipating change and opportunity, it is worth looking back at how 2025 reshaped IT operations in ways few anticipated.

In 2025, IT operations crossed a threshold that many organizations did not fully recognize at the time. While attention remained fixed on AI, automation platforms and next-generation tooling, the more consequential shift occurred elsewhere. IT operations became decisively shaped by analytics capability, not as a technology layer, but as an organizational system that governs how insight is created, trusted and embedded into operational decisions at scale.

This distinction matters. Across 2025, a clear pattern emerged. Organizations that approached analytics largely as a set of tools often found it difficult to translate operational intelligence into material performance gains. Those that focused more explicitly on analytics capability, spanning governance, decision rights, skills, operating models and leadership support, tended to achieve stronger operational outcomes. The year did not belong to the most automated IT functions. It belonged to the most analytically capable ones.

The end of tool-centric IT operations

One of the clearest lessons of 2025 was the diminishing return of tool-centric IT operations strategies. Most large organizations now possess advanced monitoring and observability platforms, AI-driven alerting and automation capabilities. Yet despite this maturity, CIOs continued to report familiar challenges such as alert fatigue and poor prioritization, along with difficulty turning operational data into decisions and actions.

The issue was not a lack of data or intelligence. It was the absence of an organizational capability to turn operational insight into coordinated action. In many IT functions, analytics outputs existed in dashboards and models but were not embedded in decision forums or escalation pathways. Intelligence was generated faster than the organization could absorb it.

2025 made one thing clear. Analytics capability, not tooling, has become the primary constraint on IT operations performance.

A shift from monitoring to decision-enablement

Up until recently, the focus of IT operations analytics was on visibility. Success was defined by how comprehensively systems could be monitored and how quickly anomalies could be detected. In 2025, leading organizations moved beyond visibility toward decision-enablement.

This shift was subtle but profound. High-performing IT operations teams did not ask, โ€œWhat does the data show?โ€ They asked, โ€œWhat decisions should this data change?โ€ Analytics capability matured where insight was explicitly linked to operational choices such as incident triage, capacity investment decisions, vendor escalation, technical debt prioritization and resilience trade-offs.

Crucially, this required clarity on decision ownership. Analytics that is not anchored to named decision-makers and decision rights rarely drives action. In 2025, the strongest IT operations functions formalized who decides what, at what threshold and with what analytical evidence. This governance layer, not AI sophistication, proved decisive.

AI amplified weaknesses as much as strengths

AI adoption accelerated across IT operations in 2025, particularly in areas such as predictive incident management, root cause analysis and automated remediation. But AI did not uniformly improve outcomes. Instead, it amplified existing capability strengths and weaknesses.

Where analytics capability was mature, AI enhanced the speed, scale and consistency of operational decisions and actions. Where it was weak, AI generated noise, confusion and misplaced confidence. Many CIOs observed that AI-driven insights were either ignored or over-trusted, with little middle ground. Both outcomes reflected capability gaps, not model limitations.

The lesson from 2025 is that AI does not replace analytics capability in IT operations. It exposes it. Organizations lacking strong decision governance, data ownership and analytical literacy found themselves overwhelmed by AI-enabled systems they could not effectively operationalize.

Operational analytics became a leadership issue

Another defining shift in 2025 was the elevation of IT operations analytics from a technical concern to a leadership concern. In high-performing organizations, senior IT leaders became actively involved in shaping how operational insight was used, not just how it was produced.

This involvement was not about reviewing dashboards. It was about setting expectations for evidence-based operations, reinforcing analytical discipline in incident reviews and insisting that investment decisions be grounded in operational data rather than anecdote. Where leadership treated analytics as the basis for operational decisions, IT operations matured rapidly.

Conversely, where analytics remained delegated entirely to technical teams, its influence plateaued. 2025 demonstrated that analytics capability in IT operations is inseparable from leadership behavior.

From reactive optimization to systemic learning

Perhaps the most underappreciated development of 2025 was the shift from reactive optimization to systemic learning in IT operations. Traditional operational analytics often focused on fixing the last incident or improving the next response. Leading organizations used analytics to identify structural patterns such as recurring failures, architectural bottlenecks, process debt and skill constraints.

This required looking beyond individual incidents to learn from issues over time and build organizational memory. These capabilities cannot be automated. IT operations teams that invested in them moved from firefighting to foresight, using analytics not only to respond faster, but to design failures out of the IT operating environment.

In 2025, resilience became less about redundancy and more about learning velocity.

The new role of the CIO in IT operations analytics

By the end of 2025, the CIOโ€™s role in IT operations analytics had subtly but decisively changed. AI forced a shift from sponsorship to stewardship. The CIO was no longer simply the sponsor of tools or platforms. Increasingly, they became the architect of the organizational conditions that allow analytics to shape operations meaningfully.

This included clarifying decision hierarchies, aligning incentives with analytical outcomes, investing in analytical skills across operations teams and protecting time for reflection and improvement. CIOs who embraced this role saw analytics scale naturally across IT operations. Those who did not often saw impressive pilots fail to translate into everyday practice.

The defining lesson of 2025

Looking back, 2025 was not the year IT operations became intelligent. It was the year intelligence became operationally consequential, where analytics capability determined whether insight changed behavior or remained aspirational.

The organizations that quietly advanced their IT operations this year did so by strengthening the organizational systems that govern how insight becomes action. Operational intelligence only creates value when organizations are capable of deciding what takes precedence, when to intervene operationally and where to commit resources for the future.

What to expect in 2026: When analytics capability becomes non-optional

While 2025 marked the consolidation of analytics capability in IT operations, 2026 will likely be the year analytics capability becomes non-optional across IT operations. As AI and automation continue to advance, the gap between analytically capable IT operations teams and those where analytics capability is lacking will widen, not because of technology, but because of how effectively organizations convert intelligence into action.

Decision latency emerges as a core operational risk

By 2026, decision speed will replace operational visibility as the dominant constraint on IT operations. As analytics and AI generate richer, more frequent insights, organizations without clear decision rights, escalation thresholds and evidence standards will struggle to respond coherently. In many cases, delays and conflicting interventions will cause more disruption than technology failures themselves. Leading IT operations teams will begin treating decision latency as a measurable operational risk.

AI exposes capability gaps rather than closing them

AI adoption will continue to accelerate across IT operations in 2026, but its impact will remain uneven. Where analytics capability is strong, AI will enhance decision speed and organizational learning. Where it is weak, AI will amplify confusion or analysis paralysis. The differentiator will not be model sophistication, but the organizationโ€™s ability to govern decisions, knowing when to trust automated insight, when to challenge it and who is accountable for outcomes.

Analytics becomes a leadership discipline

In 2026, analytics in IT operations will become even more of a leadership expectation than a technical activity. CIOs and senior IT leaders will be judged less on the tools they sponsor and more on how consistently operational decisions are grounded in evidence. Incident reviews, investment prioritization and resilience planning will increasingly be evaluated by the quality of analytical reasoning applied, not just the results achieved.

Operational insight shapes system design

Leading IT operations teams will move analytics upstream in 2026, from improving response and recovery to shaping architecture and design. Longitudinal operational data will increasingly inform platform choices, sourcing decisions and resilience trade-offs across cost, risk and availability. This marks a shift from reactive optimization to evidence-led system design, where analytics capability influences how IT environments are built, not just how they are run.

The future of IT operations will not be shaped by smarter systems alone, but by organizations that can consistently turn intelligence into decisions and actions. Without analytics capability, this remains ad hoc, inconsistent and ultimately ineffective.

This article is published as part of the Foundry Expert Contributor Network.
Want to join?

MS, ์˜ค์Šค๋ชจ์Šค ์ธ์ˆ˜ยทยทยทํŒจ๋ธŒ๋ฆญ ๋ฐ์ดํ„ฐ ์—”์ง€๋‹ˆ์–ด๋ง ๋ณ‘๋ชฉ ์ค„์ธ๋‹ค

MS๊ฐ€ AI ๊ธฐ๋ฐ˜ ๋ฐ์ดํ„ฐ ์—”์ง€๋‹ˆ์–ด๋ง ๊ธฐ์—… ์˜ค์Šค๋ชจ์Šค๋ฅผ ์ธ์ˆ˜ํ–ˆ๋‹ค. ์ธ์ˆ˜ ๊ธˆ์•ก์€ ๊ณต๊ฐœ๋˜์ง€ ์•Š์•˜๋‹ค. ์ด๋ฒˆ ์ธ์ˆ˜๋Š” ํ†ตํ•ฉ ๋ฐ์ดํ„ฐยท๋ถ„์„ ํ”Œ๋žซํผ์ธ MS ํŒจ๋ธŒ๋ฆญ์—์„œ ๋ฐœ์ƒํ•˜๋Š” ๋ฐ์ดํ„ฐ ์—”์ง€๋‹ˆ์–ด๋ง์˜ ๋งˆ์ฐฐ์„ ์ค„์ด๊ธฐ ์œ„ํ•œ ์ „๋žต์˜ ์ผํ™˜์œผ๋กœ, ๋ถ„์„๊ณผ AI ํ”„๋กœ์ ํŠธ์˜ ์‹ค์ œ ์ ์šฉ์ด ๋Š˜์–ด๋‚˜๋Š” ํ๋ฆ„์— ๋Œ€์‘ํ•˜๊ธฐ ์œ„ํ•œ ์กฐ์น˜๋‹ค.

์˜ค์Šค๋ชจ์Šค๊ฐ€ ๋ณด์œ ํ•œ ๊ธฐ์ˆ ์€ ์—์ด์ „ํ‹ฑ AI๋ฅผ ์ ์šฉํ•ด ์›์‹œ ๋ฐ์ดํ„ฐ๋ฅผ ์›๋ ˆ์ดํฌ(OneLake) ๋‚ด์—์„œ ๋ถ„์„ํ•˜๊ณ  AI์— ๋ฐ”๋กœ ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๋Š” ์ž์‚ฐ์œผ๋กœ ์ „ํ™˜ํ•œ๋‹ค. MS ์• ์ € ๋ฐ์ดํ„ฐ ์• ๋„๋ฆฌํ‹ฑ์Šค ๋ถ€๋ฌธ ๋ถ€์‚ฌ์žฅ์ธ ๋ณด๊ทธ๋‹จ ํฌ๋ฆฌ๋ฐ”ํŠธ๋Š” ๋ธ”๋กœ๊ทธ ๊ฒŒ์‹œ๊ธ€์—์„œ, ์ด๋ฅผ ํ†ตํ•ด ๋งŽ์€ ๊ธฐ์—…์ด ๋ถ„์„ ์ž์ฒด๋ณด๋‹ค ๋ฐ์ดํ„ฐ ์ค€๋น„์— ๋” ๋งŽ์€ ์‹œ๊ฐ„์„ ์†Œ๋ชจํ•˜๋Š” ๋ฌธ์ œ๋ฅผ ํ”ผํ•  ์ˆ˜ ์žˆ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

MS ์ œํ’ˆ ๋‹ด๋‹น ์‹œ๋‹ˆ์–ด ๋””๋ ‰ํ„ฐ์ธ ๋กœ์ด ํ•˜์†๋„ ๋ณ„๋„์˜ ์†Œ์…œ๋ฏธ๋””์–ด ๊ฒŒ์‹œ๊ธ€์—์„œ ์˜ค์Šค๋ชจ์Šค๊ฐ€ ์•ฝ 2๋…„ ์ „ ํŒจ๋ธŒ๋ฆญ์— ๋„ค์ดํ‹ฐ๋ธŒ ์•ฑ ํ˜•ํƒœ๋กœ AI ๋ฐ์ดํ„ฐ ๋žญ๊ธ€๋Ÿฌ์™€ AI ๋ฐ์ดํ„ฐ ์—”์ง€๋‹ˆ์–ด๋ง ์—์ด์ „ํŠธ๋ฅผ ์ถœ์‹œํ–ˆ์œผ๋ฉฐ, ๋น ๋ฅด๊ฒŒ ์ธ๊ธฐ๋ฅผ ๋Œ์—ˆ๋‹ค๊ณ  ์–ธ๊ธ‰ํ–ˆ๋‹ค.

ํ•˜์†์€ โ€œ๊ณ ๊ฐ์ด ํŒจ๋ธŒ๋ฆญ ์ŠคํŒŒํฌ ์œ„์—์„œ ์˜ค์Šค๋ชจ์Šค๋ฅผ ์‚ฌ์šฉํ•˜๋Š” ๊ฒƒ์„ ๋งค์šฐ ๊ธ์ •์ ์œผ๋กœ ๋ฐ›์•„๋“ค์˜€๊ณ , ์ด๋ฅผ ํ†ตํ•ด ๊ฐœ๋ฐœ๊ณผ ์œ ์ง€๋ณด์ˆ˜์— ๋“ค์–ด๊ฐ€๋Š” ๋…ธ๋ ฅ์ด 50% ์ด์ƒ ์ค„์—ˆ๋‹ค๋Š” ์ ์„ ๋น ๋ฅด๊ฒŒ ํ™•์ธํ•  ์ˆ˜ ์žˆ์—ˆ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

์˜ค์Šค๋ชจ์Šค๋Š” ์ธ์ˆ˜ ์ด์ „ MS ํŒจ๋ธŒ๋ฆญ์šฉ ๋ฐ์ดํ„ฐ ์—์ด์ „ํŠธ์™€ ๋ฐ์ดํ„ฐ๋ธŒ๋ฆญ์Šค์šฉ ๋ฐ์ดํ„ฐ ์—์ด์ „ํŠธ, ์˜ค์Šค๋ชจ์Šค AI ์–ด์‹œ์ŠคํŠธ ์Šค์œ„ํŠธ(์—…๋กœ๋”, ํŒŒ์ดํ”„๋ผ์ธ, ๋ฐ์ดํ„ฐ์…‹)๋ฅผ ์ œ๊ณตํ•ด ์™”๋‹ค. ํšŒ์‚ฌ๋Š” ์ด๋ฅผ AI ๊ธฐ๋ฐ˜ ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘ ๋ฐ ์—”์ง€๋‹ˆ์–ด๋ง ๋„๊ตฌ ๋ชจ์Œ์ด๋ผ๊ณ  ์†Œ๊ฐœํ•˜๋ฉฐ, ์™ธ๋ถ€์—์„œ ์œ ์ž…๋˜๋Š” ๋ณต์žกํ•˜๊ณ  ์ •์ œ๋˜์ง€ ์•Š์€ ๋ฐ์ดํ„ฐ๋ฅผ ์ตœ์†Œํ•œ์˜ ์ˆ˜์ž‘์—…์ด๋‚˜ ์ฝ”๋”ฉ๋งŒ์œผ๋กœ ์šด์˜ ์‹œ์Šคํ…œ์— ์ ์šฉํ•  ์ˆ˜ ์žˆ๋„๋ก ์ž๋™ํ™”ํ•œ๋‹ค๊ณ  ๋ฐํ˜”๋‹ค.

MS์˜ ์˜ค์Šค๋ชจ์Šค ์ธ์ˆ˜๊ฐ€ ๊ธฐ์—…์— ์˜๋ฏธํ•˜๋Š” ๋ฐ”๋Š”?

MS๊ฐ€ ํŒจ๋ธŒ๋ฆญ ๋‚ด์—์„œ ์˜ค์Šค๋ชจ์Šค ๊ธฐ์ˆ ์„ ์–ด๋–ป๊ฒŒ ํ†ตํ•ฉํ• ์ง€์— ๋Œ€ํ•œ ๊ตฌ์ฒด์ ์ธ ์ œํ’ˆ ๋กœ๋“œ๋งต์€ ์•„์ง ๊ณต๊ฐœํ•˜์ง€ ์•Š์•˜๋‹ค. ๋‹ค๋งŒ ์—…๊ณ„ ๋ถ„์„๊ฐ€๋“ค์€ ์ด๋ฒˆ ํ†ตํ•ฉ์ด CIO์™€ ๊ฐœ๋ฐœํŒ€ ๋ชจ๋‘์—๊ฒŒ ๋„์›€์ด ๋  ๊ฐ€๋Šฅ์„ฑ์ด ํฌ๋‹ค๊ณ  ๋ดค๋‹ค.

๋ฌด์–ด ์ธ์‚ฌ์ดํŠธ ์•ค ์ŠคํŠธ๋ž˜ํ‹ฐ์ง€์˜ ์ˆ˜์„ ์• ๋„๋ฆฌ์ŠคํŠธ ๋กœ๋ฒ„ํŠธ ํฌ๋ ˆ์ด๋จธ๋Š” CIO ๊ด€์ ์—์„œ ์ด๋ฒˆ ์ธ์ˆ˜๊ฐ€ ์šด์˜ ํšจ์œจ์„ฑ ๊ฐœ์„  ๋ฐ ๋ถ„์„, AI ์ด๋‹ˆ์…”ํ‹ฐ๋ธŒ์˜ ๊ฐ€์น˜ ์‹คํ˜„ ์†๋„ ๋‹จ์ถ• ๋“ฑ์˜ ํšจ๊ณผ๋ฅผ ๊ฐ€์ ธ์˜ฌ ์ˆ˜ ์žˆ๋‹ค๊ณ  ์„ค๋ช…ํ•˜๋ฉฐ, ํŠนํžˆ ๋ฐ์ดํ„ฐ ์—”์ง€๋‹ˆ์–ด๋ง ์ธ๋ ฅ๊ณผ ์˜ˆ์‚ฐ์ด ์ œํ•œ๋œ ํ™˜๊ฒฝ์—์„œ ํšจ๊ณผ๊ฐ€ ๋‘๋“œ๋Ÿฌ์งˆ ๊ฒƒ์ด๋ผ๊ณ  ์ง„๋‹จํ–ˆ๋‹ค.

ํ•˜์ดํผํ”„๋ ˆ์ž„ ๋ฆฌ์„œ์น˜์˜ AI ์Šคํƒ ๋ถ€๋ฌธ ์ฑ…์ž„์ž์ธ ์Šคํ…ŒํŒŒ๋‹ˆ ์›”ํ„ฐ๋Š” ๋˜ ๋‹ค๋ฅธ ์žฅ์ ์œผ๋กœ, ํ†ต์ œ ๋ฐ ๋ณต์›์ด ๊ฐ€๋Šฅํ•˜๊ณ  ๊ฐ์‚ฌ๊นŒ์ง€ ๊ณ ๋ คํ•œ ๋ฐ์ดํ„ฐ ์—”์ง€๋‹ˆ์–ด๋ง ์ž๋™ํ™”๋ฅผ ๊ตฌํ˜„ํ•  ์ˆ˜ ์žˆ๋‹ค๋Š” ์ ์„ ๊ผฝ์•˜๋‹ค. ์›”ํ„ฐ๋Š” โ€œAI๊ฐ€ ์‹คํ—˜ ๋‹จ๊ณ„๋ฅผ ๋„˜์–ด ๊ธฐ์—… ์ „๋ฐ˜์œผ๋กœ ํ™•์‚ฐ๋˜๋ฉด์„œ, ์‹ ๋ขฐ์„ฑ ๋ฐ ๊ทœ์ • ์ค€์ˆ˜๋ฅผ ์œ ์ง€ํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š” ํ†ต์ œ๋œ ์ž๋™ํ™”๊ฐ€ ํ•„์ˆ˜๊ฐ€ ๋˜๊ณ  ์žˆ๋‹คโ€๋ผ๊ณ  ์–ธ๊ธ‰ํ–ˆ๋‹ค.

๋ฐ˜๋ฉด ํฌ๋ ˆ์ด๋จธ๋Š” ์›”ํ„ฐ์˜ ํ‰๊ฐ€์™€ ๋‹ฌ๋ฆฌ, ๊ธฐ์—…์ด ํŒจ๋ธŒ๋ฆญ ๋‚ด ๋ฐ์ดํ„ฐ ์—”์ง€๋‹ˆ์–ด๋ง์„ ์œ„ํ•ด ์˜ค์Šค๋ชจ์Šค ๊ธฐ์ˆ ์— ์˜์กดํ•  ๊ฒฝ์šฐ ํ”Œ๋žซํผ ์ข…์†์„ฑ์ด ์ปค์งˆ ์ˆ˜ ์žˆ๋‹ค๊ณ  ๊ฒฝ๊ณ ํ–ˆ๋‹ค. ๊ทธ์— ๋”ฐ๋ฅด๋ฉด, ์ข…์†์„ฑ์ด ์ปค์ง€๋ฉด ์—์ด์ „ํ‹ฑ ํŒŒ์ดํ”„๋ผ์ธ ์ธ์ฆ, ๋ณ€๊ฒฝ ์‚ฌํ•ญ์— ๋Œ€ํ•œ ๊ฐ์‚ฌ ๋ฐ ๋กค๋ฐฑ, ์ž์œจ์  ๋ฐ์ดํ„ฐ ์—”์ง€๋‹ˆ์–ด๋ง, ๊ทœ์ œ ๋ฐ ์ปดํ”Œ๋ผ์ด์–ธ์Šค ์š”๊ตฌ ์‚ฌํ•ญ ๊ฐ„ ์ •ํ•ฉ์„ฑ ๋“ฑ ๊ฑฐ๋ฒ„๋„Œ์Šค ๋ฐ ๋ฆฌ์Šคํฌ ๊ด€๋ จ ๋ฌธ์ œ๊ฐ€ ์ œ๊ธฐ๋  ์ˆ˜ ์žˆ๋‹ค.

์—”์ง€๋‹ˆ์–ด๋ง ๋ฐ˜๋ณต ์ž‘์—…์„ ์ค„์ด๋Š” ํšจ๊ณผ

๊ฐœ๋ฐœ์ž ๊ด€์ ์—์„œ๋„ ์ด๋ฒˆ ์ธ์ˆ˜๋Š” ์ƒ์‚ฐ์„ฑ ํ–ฅ์ƒ์œผ๋กœ ์ด์–ด์งˆ ์ˆ˜ ์žˆ๋‹ค. ํฌ๋ ˆ์ด๋จธ๋Š” ์˜ค์Šค๋ชจ์Šค ์ธ์ˆ˜๊ฐ€ ๋ณต์žกํ•˜๊ณ  ์ •์ œ๋˜์ง€ ์•Š์€ ๋ฐ์ดํ„ฐ๋ฅผ ๋‹ค๋ฃจ๋Š” ๊ณผ์ •์—์„œ ๋ฐœ์ƒํ•˜๋Š” ๋ฐ˜๋ณต์ ์ด๊ณ  ๋ถ€๊ฐ€๊ฐ€์น˜๊ฐ€ ๋‚ฎ์€ ์—”์ง€๋‹ˆ์–ด๋ง ์ž‘์—…์„ ์ค„์—ฌ์ค„ ๊ฐ€๋Šฅ์„ฑ์ด ํฌ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

๊ทธ๋Š” โ€œ๋ฐ์ดํ„ฐ ์ •๋ฆฌ ์ž‘์—…, ์ผ๊ด€์„ฑ์ด ๋–จ์–ด์ง€๋Š” ์™ธ๋ถ€ ๋ฐ์ดํ„ฐ ์†Œ์Šค ๋งคํ•‘, ํŒŒ์ดํ”„๋ผ์ธ ๊ณจ๊ฒฉ ๊ตฌ์„ฑ, ์ŠคํŒŒํฌ ์Šคํƒ€์ผ์˜ ๋ณ€ํ™˜ ์ฝ”๋“œ์™€ ๊ฐ™์€ ์ž‘์—…์„ ์‚ฌ๋žŒ์ด ์ง์ ‘ ์ˆ˜ํ–‰ํ•˜๋Š” ๋Œ€์‹  ์—์ด์ „ํŠธ๊ฐ€ ํ•  ์ˆ˜ ์žˆ๋‹ค. ๊ทธ๋Ÿฌ๋ฉด ์—”์ง€๋‹ˆ์–ด๋Š” ์•„ํ‚คํ…์ฒ˜ ์„ค๊ณ„, ์„ฑ๋Šฅ ์ตœ์ ํ™”, ๋ฐ์ดํ„ฐ ํ’ˆ์งˆ ๊ด€๋ฆฌ, ๊ฐ€๋“œ๋ ˆ์ผ ์„ค๊ณ„์— ์ง‘์ค‘ํ•  ์ˆ˜ ์žˆ๊ฒŒ ๋œ๋‹คโ€๋ผ๊ณ  ์ง„๋‹จํ–ˆ๋‹ค.

์ด์–ด ๊ทธ๋Š” โ€œ๊ฐœ๋ฐœ ๋ผ์ดํ”„์‚ฌ์ดํด ์—ญ์‹œ AI๊ฐ€ ์ƒ์„ฑํ•œ ํŒŒ์ดํ”„๋ผ์ธ๊ณผ ๋ณ€ํ™˜ ๊ฒฐ๊ณผ๋ฅผ ๊ฒ€ํ† ํ•˜๊ณ  ํ…Œ์ŠคํŠธํ•˜๋ฉฐ ์•ˆ์ •์„ฑ์„ ๊ฐ•ํ™”ํ•˜๋Š” ๋ฐฉํ–ฅ์œผ๋กœ ๋ฐ”๋€” ์ˆ˜ ์žˆ๋‹ค. ์ด ๊ณผ์ •์—์„œ ๊ฐ€์‹œ์„ฑ ํ™•๋ณด, ์Šน์ธ ์›Œํฌํ”Œ๋กœ, ๋˜๋Œ๋ฆฌ๊ธฐ ๊ธฐ๋Šฅ์ด ํ•ต์‹ฌ ์„ค๊ณ„ ์š”๊ฑด์œผ๋กœ ์ž๋ฆฌ ์žก์„ ๊ฒƒโ€์ด๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

์ตœ๊ทผ ์ถ”๊ฐ€๋œ ํŒจ๋ธŒ๋ฆญ ๊ธฐ๋Šฅ๊ณผ์˜ ์‹œ๋„ˆ์ง€

๋ถ„์„๊ฐ€๋“ค์€ ์˜ค์Šค๋ชจ์Šค ์ธ์ˆ˜๊ฐ€ ์ตœ๊ทผ ํŒจ๋ธŒ๋ฆญ์˜ ๊ธฐ๋Šฅ ๊ฐœ์„ ์„ ๋ณด์™„ํ•˜๋Š” ์—ญํ• ์„ ํ•  ๊ฒƒ์ด๋ผ๊ณ  ๋‚ด๋‹ค๋ดค๋‹ค.

์›”ํ„ฐ๋Š” โ€œ์ตœ๊ทผ ํŒจ๋ธŒ๋ฆญ์ด IQ ๋„์ž…, ์ƒˆ๋กœ์šด ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค ์ถ”๊ฐ€, ์›๋ ˆ์ดํฌ ์—ฐ๋™ ๊ฐ•ํ™” ๋“ฑ ์—ฌ๋Ÿฌ ๊ธฐ๋Šฅ์„ ํ™•์žฅํ•˜๋ฉด์„œ ์ด์ œ ๋ฌธ์ œ๋Š” ๋ฐ์ดํ„ฐ์— ์ ‘๊ทผํ•˜๋Š” ๊ฒƒ์ด ์•„๋‹ˆ๋ผ, ๋ถ„์„๊ณผ AI์— ๋ฐ”๋กœ ์“ธ ์ˆ˜ ์žˆ๋„๋ก ๋ฐ์ดํ„ฐ๋ฅผ ์ค€๋น„ํ•˜๋Š” ๋‹จ๊ณ„๋กœ ์˜ฎ๊ฒจ๊ฐ€๊ณ  ์žˆ๋‹ค. ์˜ค์Šค๋ชจ์Šค๋Š” ํŒจ๋ธŒ๋ฆญ ํ™˜๊ฒฝ ์•ˆ์—์„œ ์ง์ ‘ ๋ฐ์ดํ„ฐ ์ˆ˜์ง‘, ๋ณ€ํ™˜, ๊ตฌ์กฐ ๋ณ€๊ฒฝ์„ ์ž๋™ํ™”ํ•จ์œผ๋กœ์จ ๊ฒฉ์ฐจ๋ฅผ ํ•ด์†Œํ•œ๋‹คโ€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

์ด์–ด ๊ทธ๋Š” โ€œํŒจ๋ธŒ๋ฆญ IQ ๊ด€์ ์—์„œ ๋ณด๋ฉด ์˜ค์Šค๋ชจ์Šค๋Š” ์ƒ์œ„ ๋ฐ์ดํ„ฐ ์†Œ์Šค๊ฐ€ ๋ฐ”๋€Œ๋”๋ผ๋„ ์‹œ๋งจํ‹ฑ ๊ณ„์ธต๊ณผ ์ถ”๋ก  ๊ณ„์ธต์— ๊ณต๊ธ‰๋˜๋Š” ๋ฐ์ดํ„ฐ๊ฐ€ ์ง€์†์ ์œผ๋กœ ์ •์ œ๋˜๊ณ  ์•ˆ์ •์ ์œผ๋กœ ์œ ์ง€๋˜๋„๋ก ๋•๋Š”๋‹ค. ์‹œ๋งจํ‹ฑ ์‹œ์Šคํ…œ์€ ๋ฐ์ดํ„ฐ๊ฐ€ ์ผ์ •ํ•˜๊ฒŒ ์œ ์ง€๋˜๊ณ  ์ดํ•ด ๊ฐ€๋Šฅํ•œ ์ƒํƒœ์ผ ๋•Œ๋งŒ ํšจ๊ณผ๋ฅผ ๋‚ผ ์ˆ˜ ์žˆ๋Š”๋ฐ, ์˜ค์Šค๋ชจ์Šค๋Š” ์ด๋ฅผ ๋ฐฉํ•ดํ•˜๋Š” ์šด์˜ ๋‹จ๊ณ„์˜ ๋ถˆํ•„์š”ํ•œ ๋งˆ์ฐฐ์„ ์ค„์ด๋Š” ๋ฐ ์ดˆ์ ์„ ๋งž์ท„๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

์˜ค์Šค๋ชจ์Šค ์ œํ’ˆ ๋ฐ ๊ธฐ์กด ๊ณ ๊ฐ์€?

๋‹ค๋งŒ ์ด๋ฒˆ ์ธ์ˆ˜๊ฐ€ ๋ชจ๋“  ์˜ค์Šค๋ชจ์Šค ๊ณ ๊ฐ์—๊ฒŒ ๊ธ์ •์ ์ธ ์†Œ์‹๋งŒ์€ ์•„๋‹ˆ๋‹ค. ์˜ค์Šค๋ชจ์Šค๋Š” 1์›” ๋‚ด MS ํŒจ๋ธŒ๋ฆญ์šฉ ๋ฐ์ดํ„ฐ ์—์ด์ „ํŠธ, ๋ฐ์ดํ„ฐ๋ธŒ๋ฆญ์Šค์šฉ ๋ฐ์ดํ„ฐ ์—์ด์ „ํŠธ, ์˜ค์Šค๋ชจ์Šค AI ์–ด์‹œ์ŠคํŠธ ์Šค์œ„ํŠธ ๋“ฑ 3๊ฐ€์ง€ ์ œํ’ˆ์˜ ๋…๋ฆฝํ˜• ์„œ๋น„์Šค ์ œ๊ณต์„ ์ค‘๋‹จํ•  ์˜ˆ์ •์ด๋‹ค. ์ด๋Š” ์˜ค์Šค๋ชจ์Šค์˜ ๊ธฐ์ˆ ์€ ๋‹น๋ถ„๊ฐ„ ํŒจ๋ธŒ๋ฆญ ๋‚ด๋ถ€์—์„œ๋งŒ ์ œ๊ณต๋œ๋‹ค๋Š” ์˜๋ฏธ๋‹ค. ๋ฐ์ดํ„ฐ๋ธŒ๋ฆญ์Šค์šฉ ์ œํ’ˆ์ด๋‚˜ AI ์–ด์‹œ์ŠคํŠธ ์Šค์œ„ํŠธ๋ฅผ ์‚ฌ์šฉํ•ด ์˜จ ๊ณ ๊ฐ์€ ๋‹ค๋ฅธ ๋Œ€์•ˆ์„ ์ฐพ๊ฑฐ๋‚˜, MS ํŒจ๋ธŒ๋ฆญ ๊ธฐ๋ฐ˜ ์„œ๋น„์Šค๋กœ ์ „ํ™˜ํ•˜๋Š” ๋ฐฉ์•ˆ์„ ๊ฒ€ํ† ํ•ด์•ผ ํ•œ๋‹ค.
dl-ciokorea@foundryco.com

What is NVIDIAโ€™s CUDA and How is it Used in Cybersecurity?

By: OTW

Welcome back my aspiring cyberwarriors!

You have likely heard of the company NVIDIA. Not only are the dominant company in computer graphics adapters (if you are gamer, you likely have one) and now, artificial intelligence. In recent weeks, they have become the most valuable company in the world ($5 trillion).

The two primary reasons that Nvidia has become so important to artificial intelligence are:

  1. Nvidia chips can process data in multiple threads, in some cases, thousands of threads. This makes doing complex calculations in parallel possible, making them much faster.
  2. Nvidia created a development environment named CUDA for harnessing the power of these powerful CPUโ€™s. This development environment is a favorite among artificial intelligence, data analytics, and cybersecurity professionals.

Letโ€™s a brief moment to examine this powerful environment.

What is CUDA?

Most computers have two main processors:

CPU (Central Processing Unit): General-purpose, executes instructions sequentially or on a small number of cores. These CPUโ€™s such as Intel and AMD provide the flexibility to run many different applications on your computer.

GPU (Graphics Processing Unit): These GPUโ€™s were originally designed to draw graphics for applications such as games and VR environments. These GPUโ€™s contain hundreds or thousands of small cores that excel at doing the same thing many times in parallel.

CUDA (Compute Unified Device Architecture) is NVIDIAโ€™s framework that lets you take control of the GPU for general computing tasks. In other words, CUDA lets you write code that doesnโ€™t just render graphicsโ€”it crunches numbers at massive scale. Thatโ€™s why itโ€™s a favorite for machine learning, password cracking, and scientific computing.

Why Should Hackers & Developers Care?

CUDA matters as an important tool in your cybersecurity toolkit because:

Speed: A GPU can run password hashes or machine learning models orders of magnitude faster than a CPU.

Parallelism: If you need to test millions of combinations, analyze huge datasets, or simulate workloads, CUDA gives you raw power.

Applications in Hacking: Tools like Hashcat and Pyrit use CUDA to massively accelerate brute-force and dictionary attacks. Security researchers who understand CUDA can customize or write their own GPU-accelerated tools.

The CUDA environment sees the GPU as a device with:

Threads: The smallest execution unit (like a tiny worker).

Blocks: Groups of threads.

Grids: Groups of blocks.

Think of it like this:

  • A CPU worker can cook one meal at a time.
  • A GPU is like a kitchen with thousands of cooksโ€”we split the work (threads), organize them into brigades (blocks), and assign the whole team to the job (grid).

Coding With CUDA

CUDA extends C/C++ with some keywords.
Hereโ€™s the simple workflow:

  1. You write a kernel function (runs on the GPU).
  2. You call it from the host code (the CPU side).
  3. Launch thousands of threads in parallel โ†’ GPU executes them fast.

Example skeleton code:

c__global__ void add(int *a, int *b, int *c) {
    int idx = threadIdx.x;
    c[idx] = a[idx] + b[idx];
}

int main() {
    // Allocate memory on host and device
    // Copy data to GPU
    // Run kernel with N threads
    add<<<1, N>>>(dev_a, dev_b, dev_c);
    // Copy results back to host
}

The keywords:

  • __global__ โ†’ A function (kernel) run on the GPU.
  • threadIdx โ†’ Built-in variable identifying which thread you are.
  • <<<1, N>>> โ†’ Tells CUDA to launch 1 block of N threads.

This simple example adds two arrays in parallel. Imagine scaling this to millions of operations at once!

The CUDA Toolchain Setup

If you want to try CUDA make certain you have the following items:

1. an NVIDIA GPU.

2. the CUDA Toolkit (contains compiler nvcc).

3. Write your CUDA programs in C/C++ and compile it with nvcc.

Run and watch your GPU chew through problems.

To install the CUDA toolkit in Kali Linux, simply enter;

kali > sudo apt install nvidia-cuda-toolkit

Next, write your code and compile it with nvcc, such as;

kali > nvcc hackersarise.cu -o hackersarise

Practical Applications of CUDA

CUDA is already excelling at hacking and computing applications such as;

  1. Password cracking (Hashcat, John the Ripper with GPU support).
  2. AI & ML (TensorFlow/PyTorch use CUDA under the hood). Our application of using Wi-Fi to see through walls uses CUDA.
  3. Cryptanalysis (breaking encryption) & simulation tasks.
  4. Network packet analysis at high scale.

As a beginner, start with small projectsโ€”then explore how to take compute-heavy tasks and offload them to the GPU.

Summary

CUDA is NVIDIAโ€™s way of letting you program GPUs for general-purpose computing. To the hacker or cybersecurity pro, itโ€™s a way to supercharge computation-heavy tasks.

Learn the thread-block-grid model, write simple kernels, and then think: what problems can I solve dramatically faster if run in parallel?


Data Dilemmas: Balancing Privacy Rights in the Age of Big Tech

By: galidon

The world is becoming increasingly more digital and, whilst this is a good thing for a number of different reasons, this huge shift brings with it questions and scrutiny as to what exactly these huge tech companies are doing with such vast amounts of data.

The leading tech companies, including Google, Apple, Meta, Amazon and Microsoft โ€“ giants within the tech world โ€“ have all recently been accused of following unethical practices.

From Meta being questioned in courts over its advertising regime, to Amazon facing concerns over the fact that their Echo devices are potentially recording private conversations within the home, itโ€™s not surprising that users are looking for more information as to how their data is being used.

With this comes the counterargument that big tech companies are doing what they can to strike the balance between privacy rights and ensuring that their product and the experience users get from using them donโ€™t change.ย  But, how exactly are the big tech companies using and utilising sensitive and personal data while ensuring they still meet and adhere to the ever-expanding list of privacy rights? Letโ€™s take a look.

Is Our Data The Price We Pay For Free?

In marketplaces and stores, we exchange legitimate currency for goods and services. But, with social media and other online platforms, weโ€™re instead paying with our attention. A lot of online users are unaware of the expansive trail of browsing and search history that they leave behind.

Almost everything is logged and monitored online, right from the very first interaction and, depending on the web browser you use, some will collect more information than others. There are costs involved in almost every digital and online service we use and it costs money to host servers and sites โ€“ so why do we get to browse for free?

Simply because the cost is being underwritten in other ways. The most common form is through advertising, but the ways that only a few people think about, or want to think about, is through the harvesting and use of our data. Every single website is tracked or recorded in different ways and by different people, from marketing agencies who analyze the performance of a website to broadband providers who check connections.

Users will struggle to understand why companies want their data, but thatโ€™s simply because they donโ€™t quite understand the value behind it. Data is currently considered to be one of the most valuable assets, mainly because it is a non-rival entity โ€“ this means that it can be replicated for free and with little to no impact on the quality. The nature of data means that it can be used for product research, market analysis or to train and better inform AI systems. All companies want more data in order to have as many financial and legal incentives and rights as they can.

What Are Cookies?

Data tracking is done through cookies, which are small files of letters and numbers which are downloaded onto your computer when you visit a website. They are used by almost all websites for a number of reasons, such as remembering your browsing preferences, keeping a record of what youโ€™ve added to your shopping basket or counting how many people visit the site. Cookies are why you might see ads online months after visiting a website or get emails when youโ€™ve left something in a shopping basket online.

Why Do Big Tech Companies Want User Data?

How Laws Have Changed How Companies Use Your Data

In the EU, data is more heavily protected than it is in the US, for example. EU laws have taken a more hardline stance against the big tech companies when it comes to protecting users, with the General Data Protection Regulation, or GDPR, in place to offer the โ€œtoughest privacy and security law in the worldโ€.

This law makes it compulsory for companies, particularly big tech companies, to outline specifically what it is they are using data for. This law was passed in 2016 and any company which violates it is subjected to fines which either total 4% of the companyโ€™s overall revenue, or โ‚ฌ20 million โ€“ whichever is greater. In 2019, Google was fined a huge โ‚ฌ57 million for violating GDPR laws, citing that they posed huge security risks.

Unlike the EU, the US does not have comprehensive laws to protect online users, which is what allows these companies to have access to data that they can then use to take advantage of said data. Following the EUโ€™s introduction of GDPR, both Facebook and Google had to change and update their privacy rights and laws, but in the US, there is still some way to go.

This is because Google makes a lot of money from their user data. Over 80% of Googleโ€™s revenue comes from the advertising aspect of its business, which allows advertisers to target ads for services and products based on what users are searching for, with this information gathered from Google. Google is the largest search engine in the world, so all of these userโ€™s data quickly adds up. Itโ€™s been said that โ€œGoogle sells the data that they collect so the ads can be better suited to userโ€™s interests.โ€.

Advertisers will also make use of Googleโ€™s Analytic data, which is a service that gives companies insight into their website activity by tracking users who land on there. A few years ago, there were rumours that Google Analytics wrongly gave U.S intelligence agencies access to data from French users, whilst Google hadnโ€™t done enough in order to ensure privacy when this data was transferred between the US and Europe.

Reasons Why Big Tech Companies Want Your User Data

  • Social media apps want information on how you use their platform in order to give you content that you actually want. TikTok in particular works to build you a customised and personalised algorithm to try and show you videos that you will actually engage with to keep you on the app for longer based on ads and content that you have previously watched and engaged with.
  • Big tech companies will be interested in your data so that they can show you relevant ads. Most of the big tech companies make a lot of money through advertising on their platform, so they want to ensure that they keep advertisers happy by showing their services or products to the consumers who are more likely to convert.
  • Your data will be used to personalise your browsing and platform experience to keep you coming back.

How Is Data Collection Changing?

One of the biggest reasons why companies are using your data is in order to serve you better when you are online. But, in terms of big tech companies, these reasons are often very different. With more and more people relying on technology provided by the likes of Google, Apple, Microsoft and Amazon, these companies need to be more reliable and be held to accountability more so that the rights of consumers are protected.

Changes and popularity in technology such as AI and cryptocurrency are becoming increasingly more common, and with these technologies comes the increase in risks of scams and fraud, such as the recent Hyperverse case. It is important now more than ever for these companies to put userโ€™s minds at ease and improve their privacy rights.

Originally posted 2024-04-13 23:13:36. Republished by Blog Post Promoter

The post Data Dilemmas: Balancing Privacy Rights in the Age of Big Tech first appeared on Information Technology Blog.

Worry-free Pentesting: Continuous Oversight In Offensive Security Testing

In your cybersecurity practice, do you ever worry that youโ€™ve left your back door open and an intruder might sneak inside? If you answered yes, youโ€™re not alone. The experience can be a common one, especially for security leaders of large organizations with multiple layers of tech and cross-team collaboration to accomplish live, continuous security workflows.

At Synack, the better way to pentest is one thatโ€™s always on, can scale to test for urgent vulnerabilities or compliance needs, and provides transparent, thorough reporting and coverage insight.

Know whatโ€™s being tested, where itโ€™s happening and how often itโ€™s occurringย 

With Synack365, our Premier Security Testing Platform, you can find relief in the fact that weโ€™re always checking for unlocked doors. To provide better testing oversight, we maintain reports that list all web assets being tested, which our customers have praised. Customer feedback indicated that adding continuous oversight into host assets would also help to know which host or web assets are being tested, when and where theyโ€™re being tested, and how much testing has occurred.ย 

Synackโ€™s expanded Coverage Analytics tells you all that and more for host assets, in addition to our previous coverage details on web applications and API endpoints, all found within the Synack platform. With Coverage Analytics, Synack customers are able to identify which web or host assets have been tested and the nature of the testing performed. This is helpful for auditing purposes and provides proof of testing activity, not just that an asset is in scope. Additionally, Coverage Analytics gives customers an understanding of areas that havenโ€™t been tested as heavily for vulnerabilities and can provide internal red team leaders with direction for supplemental testing and prioritization.ย 

Unmatched Oversight of Coverageย 

Other forms of security testing are unable to provide the details and information Synack Coverage Analytics does. Bug bounty testing typically goes through the untraceable public internet or via tagged headers, which require security researcher cooperation. The number of researchers and hours that they are testing are not easily trackable via these methods, if at all. Traditional penetration testing doesnโ€™t have direct measurement capabilities. Our LaunchPoint infrastructure stands between the Synack Red Team, our community of 1,500 security researchers, and customer assets, so customers have better visibility of the measurable traffic during a test. More and more frequently, we hear that customers are required to provide this kind of information to their auditors in financial services and other industries.ย 

A look at the Classified Traffic & Vulnerabilities view in Synackโ€™s Coverage Analytics. Sample data has been used for illustration purposes.

Benefits of Coverage Analyticsย 

  • Know whatโ€™s being tested within your web and host assets: where, when and how muchย 
  • View the traffic generated by the Synack Red Team during pentesting
  • Take next steps with confidence; identify where you may need supplemental testing and how to prioritize such testing

Starting today, security leaders can reduce their teamsโ€™ fears of pentesting in the dark by knowing whatโ€™s being tested, where and how much at any time across both web and host assets. Coverage Analytics makes sharing findings with executive leaders, board members or auditors simple and painless.

Current Synack customers can log in to the Synack Platform to explore Coverage Analytics today. If you have questions or are interested in learning more about Coverage Analytics, part of Synackโ€™s Better Way to Pentest, donโ€™t hesitate to contact us today!

The post Worry-free Pentesting: Continuous Oversight In Offensive Security Testing appeared first on Synack.

The Case for Integrating Dark Web Intelligence Into Your Daily Operations

Some of the best intelligence an operator or decision-maker can obtain comes straight from the belly of the beast. Thatโ€™s why dark web intelligence can be incredibly valuable to your security operations center (SOC). By leveraging this critical information, operators can gain a better understanding of the tactics, techniques and procedures (TTPs) employed by threat actors. With that knowledge in hand, decision-makers can better position themselves to protect their organizations.

This is in line with the classic teachings from Sun Tzu about knowing your enemy, and the entire passage containing that advice is particularly relevant to cybersecurity:

โ€œIf you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.โ€

Letโ€™s translate the middle section of this passage into colloquial cybersecurity talk: You can have the best security operations center in the world with outstanding cyber hygiene, but if you arenโ€™t feeding it the right information, you may suffer defeats โ€” and much of that information comes from dark web intelligence.

Completing Your Threat Intelligence Picture

To be candid, if youโ€™re not looking at the dark web, there is a big gap in your security posture. Why? Because thatโ€™s where a lot of serious action happens. To paraphrase Sir Winston Churchill, the greatest defense against a cyber menace is to attack the enemyโ€™s operations as near as possible to the point of departure.

Now, this is not a call to get too wrapped up in the dark web. Rather, a solid approach would be to go where the nefarious acts are being discussed and planned so you can take the appropriate proactive steps to prevent an attack on your assets.

The first step is to ensure that you have a basic understanding of the dark web. One common way to communicate over the dark web involves using peer-to-peer networks on Tor and I2P (Invisible Internet Project). In short, both networks are designed to provide secure communications and hide all types of information. Yes, this is only a basic illustration of dark web communications, but if your security operations center aims to improve its capabilities in the dark web intelligence space, you must be able to explain the dark web in these simple terms for two reasons:

  1. You cannot access these sites as you would any other website.
  2. Youโ€™re going to have to warn your superiors what youโ€™re up to. The dark web is an unsavory place, full of illegal content. Your decision-makers need to know what will be happening with their assets at a high level, which makes it vitally important to speak their language.

And this part is critical: If you want to get the most out of dark web intelligence, you may have to put on a mask and appear to โ€œbe one of the bad guys.โ€ You will need to explain to your decision-makers why full-time staff might have to spend entire days as someone else. This is necessary because when you start searching for granular details related to your organization, you may have to secure the trust of malicious actors to gain entry into their circles. Thatโ€™s where the truly rich intelligence is.

This could involve transacting in bitcoins or other cryptocurrencies, stumbling upon things the average person would rather not see, trying to decipher between coded language and broken language, and the typical challenges that come with putting up an act โ€” all so you can become a trusted persona. Just like any other relationship you develop in life, this doesnโ€™t happen overnight.

Of course, there are organizations out there that can provide their own โ€œpersonasโ€ for a fee and do the work for you. Using these services can be advantageous for small and medium businesses that may not have the resources to do all of this on their own. But the bigger your enterprise is, the more likely it becomes that you will want these capabilities in-house. In general, itโ€™s also a characteristic of good operational security to be able to do this in-house.

Determining What Intelligence You Need

One of the most difficult challenges you will face when you decide to integrate dark web intelligence into your daily operations is figuring out what intelligence could help your organization. A good start is to cluster the information you might collect into groups. Here are some primer questions you can use to develop these groups:

  • What applies to the cybersecurity world in general?
  • What applies to your industry?
  • What applies to your organization?
  • What applies to your people?

For the first question, there are plenty of service providers who make it their business to scour the dark web and collect such information. This is an area where it may make more sense to rely on these service providers and integrate their knowledge feeds into existing ones within your security operations center. With the assistance of artificial intelligence (AI) to manage and make sense of all these data points, you can certainly create a good defensive perimeter and take remediation steps if you identify gaps in your network.

Itโ€™s the second, third and fourth clusters that may require some tailoring and additional resources. Certain service providers can provide industry-specific dark web intelligence โ€” and you would be wise to integrate that into your workflow โ€” but at the levels of your organization and its people, you will need to do the work on your own. Effectively, you would be doing human intelligence work on the dark web.

Why Human Operators Will Always Be Needed

No matter how far technological protections advance, when places like the dark web exist, there will always be the human element to worry about. Weโ€™re not yet at the stage where machines are deciding what to target โ€” itโ€™s still humans who make those decisions.

Therefore, having top-level, industrywide information feeds can be great and even necessary, but it may not be enough. You need to get into the weeds here because when malicious actors move on a specific target, that organization has to play a large role in protecting itself with specific threat intelligence. A key component of ensuring protections are in place is knowing what people are saying about you, even on the dark web.

As Sun Tzu said: โ€œIf you know the enemy and know yourself, you need not fear the result of a hundred battles.โ€ Thereโ€™s a lot of wisdom in that, even if it was said some 2,500 years ago.

The post The Case for Integrating Dark Web Intelligence Into Your Daily Operations appeared first on Security Intelligence.

โŒ