Cybersecurity?
What Cybersecurity Means to Me Cybersecurity is about building trust. In the security field, there is a saying: “There is no free lunch for security.” This means that enhancing security inevitab...
What Cybersecurity Means to Me Cybersecurity is about building trust. In the security field, there is a saying: “There is no free lunch for security.” This means that enhancing security inevitab...
OpenCTI is best understood as “a knowledge base and hub that organizes threat intelligence so that people and organizations can actually use it.” Instead of focusing on internal software architectu...
All About the Cyber Kill Chain and Attack Infrastructure Overview The Cyber Kill Chain is an information security model developed by Lockheed Martin to defend its own internal network. The framewo...
Key Roles in Data Governance and System Security In the cybersecurity landscape of a large organization, a clear distribution of responsibilities is essential for effectively protecting data and s...
LLM Security Audit Checklist (Based on OWASP Top 10) and Defense Strategies This article identifies attack types based on the OWASP Top 10 for LLM and covers concrete defense strategies for them. ...
AI Agent Architecture: Beyond LLMs to Action-Oriented AI Large Language Models (LLMs) are now evolving beyond their ability to understand and generate text into ‘AI Agents’ that can set their own ...
Retrieval-Augmented Generation (RAG) Large Language Models (LLMs) have demonstrated incredible capabilities, becoming a core technology for many services. However, LLMs have fundamental limitation...
AI Model Context Protocol (MCP) Interacting with Artificial Intelligence (AI) models, especially Large Language Models (LLMs), often makes us expect the model to ‘remember’ previous conversations ...
What is Generative AI (GenAI)? Generative AI (GenAI) is a branch of artificial intelligence focused on learning from existing data to create new data. It has the capability to generate various typ...
Assumed Breach: A Paradigm Shift in Security Architecture In modern cybersecurity, a purely “defensive” mindset is no longer sufficient. Advanced threat actors infiltrate systems through increasin...