Cybersecurity?
What Cybersecurity Means to Me Cybersecurity is about building trust. In the security field, there is a saying: “There is no free lunch for security.” This means that enhancing security inevitab...
What Cybersecurity Means to Me Cybersecurity is about building trust. In the security field, there is a saying: “There is no free lunch for security.” This means that enhancing security inevitab...
LLM Security Checklist (Based on OWASP Top 10) 1. Prompt Injection Description: Manipulate the LLM’s output and behavior through user inputs. Example Attack Types Direct Prompt Inje...
AI Agent Architecture: Beyond LLMs to Action-Oriented AI Large Language Models (LLMs) are now evolving beyond their ability to understand and generate text into ‘AI Agents’ that can set their own ...
Retrieval-Augmented Generation (RAG) Large Language Models (LLMs) have demonstrated incredible capabilities, becoming a core technology for many services. However, LLMs have fundamental limitation...
AI Model Context Protocol (MCP) Interacting with Artificial Intelligence (AI) models, especially Large Language Models (LLMs), often makes us expect the model to ‘remember’ previous conversations ...
What is Generative AI (GenAI)? Generative AI (GenAI) is a branch of artificial intelligence focused on learning from existing data to create new data. It has the capability to generate various typ...
Assumed Breach: A Paradigm Shift in Security Architecture In modern cybersecurity, a purely “defensive” mindset is no longer sufficient. Advanced threat actors infiltrate systems through increasin...
EDR Bypass Techniques: Understanding Attack Methods and Defense Strategies Overview While Endpoint Detection and Response (EDR) solutions are core components of modern cybersecurity, continuously...
Understanding EDR: Endpoint Detection and Response What is EDR? Endpoint Detection and Response (EDR) is a cybersecurity technology that continuously monitors and collects data from endpoints to ...
Complete Guide to AWS Network Security: VPC, NACL, and Security Groups When building network security in the AWS cloud environment, three fundamental components come into play: Virtual Private Clo...