Artificial Intelligence (AI) Analysis Technology of Malicious Code (Image-based analysis)This time, I would like to introduce a technology based on Artificial Intelligence (AI) that analyzes malicious code.Jul 27, 2021Jul 27, 2021
Zero Trust in the remote working environmentOf all the changes we experienced as a result of the outbreak of COVID-19, the global epidemic in early 2020, maybe social distancing and…May 23, 2021May 23, 2021
Functions of EDR(Endpoint Detection and Response)In this blog post, we will talk about the function of EDR. Since you already know about anti-virus which is also called vaccine, I will…Mar 31, 2021Mar 31, 2021
What is EDR (Endpoint Detection & Response)?In the last article, we mentioned that Endpoint Detection and Response (EDR) is in line with implementing the concept of Zero Trust…Feb 25, 2021Feb 25, 2021
Zero Trust on Endpoints — Securing VisibilityWe learned about the basic concept of Zero Trust in the previous blog post. In this article, I’d like to continue to address Zero Trust…Feb 11, 2021Feb 11, 2021
Zero Trust in Cyber Security“Don’t trust anyone”. You might have heard this often in movies, and even use it in your daily lives. It is kind of sad to hear this…Jan 19, 2021Jan 19, 2021
White Paper: Tsunami of Ransomware attacks in the era of COVID-19 Pandemic — Proposed…Table of ContentsJan 19, 2021Jan 19, 2021
What is EPP, EDR, EDR, and XDR?The world has faced changes in many areas since COVID-19, and among them, the work environment is also changing and adapting to the new…Nov 6, 2020Nov 6, 2020
Overview of Ransomware incidents, APT market, and Could-based Security marketAs the proportion of remote work due to COVID-19 increases, cybersecurity threats are also increasing due to the changing working…Nov 5, 2020Nov 5, 2020
Limitations of EDRLimitations of reputation analysis According to AV-TEST statistics for 2018, 84% of all malicious codes are known and 16% are unknown. Of…Nov 4, 2020Nov 4, 2020