Cloud Security Overview
When focusing on cloud security, one must consider securing infrastructure, network, data, applications, and managing identities and access, security operations, governance, risk, and compliance ma...
When focusing on cloud security, one must consider securing infrastructure, network, data, applications, and managing identities and access, security operations, governance, risk, and compliance ma...
Understanding Information Security: Key Areas and Practices Organizational Structure of Information Security Under the CISO Cyber Defense GRC (Governance, Risk, and Compliance) Security Ope...
Key Drivers of Industry and Regulatory Compliance: Core Standards and Concepts Industry and regulatory compliance is complex and requires adherence to various standards and regulations to ensure s...
Risk Management Methodology Risk management refers to a systematic approach to managing various types of risks that may arise in areas such as People Risk and Cybersecurity Risk. This process can ...
Payment Ecosystem Basic Structure of Payment Systems Card payment systems are built through the collaboration of various participants. The four key entities involved are as follows: Card Hold...
AI는 컴퓨터가 사람과 같은 행동을 할 수 있는 기술을 의미한다. ML은 AI를 달성하기 위해 사용되는 방법 중에 하나이다. 통계학적 기법을 사용하며 명시적 프로그래밍 없이 데이터로부터 학습을 하여 어떠한 문제를 해결 하는 기술이다. Deep learning이란 ML의 기법중에 하나이고 deep neural n...
How to train Supervised Learning은 결과값(y)를 알고 있을 때 쓴다. To predict with continuous variable, 이것은 Regression과 관련이 있다 - Numerical. 하지만 단순히 무엇인가 주어졌을 때 yes or no로 category를 해야한다면 classficia...
What is the Diamond Model of Intrusion Analysis? In the cyber threat intelligence (CTI) industry, several approaches are used to analyze and track the characteristics of cyber intrusions. Among th...
Threat Modeling Practical Guide What is Threat Modeling? Threat modeling is the process of identifying potential security threats during the design phase of an application or system and proactive...
What is Security Information and Event Management (SIEM)? Security Information and Event Management (SIEM) is an integrated security monitoring platform that gathers and analyzes the vast amount o...