Artificial Intelligence (AI) Analysis Technology of Malicious Code (Image-based analysis)This time, I would like to introduce a technology based on Artificial Intelligence (AI) that analyzes malicious code.Jul 27, 20215Jul 27, 20215
Zero Trust in the remote working environmentOf all the changes we experienced as a result of the outbreak of COVID-19, the global epidemic in early 2020, maybe social distancing and…May 23, 202134May 23, 202134
Functions of EDR(Endpoint Detection and Response)In this blog post, we will talk about the function of EDR. Since you already know about anti-virus which is also called vaccine, I will…Mar 31, 202140Mar 31, 202140
What is EDR (Endpoint Detection & Response)?In the last article, we mentioned that Endpoint Detection and Response (EDR) is in line with implementing the concept of Zero Trust…Feb 25, 202167Feb 25, 202167
Zero Trust on Endpoints — Securing VisibilityWe learned about the basic concept of Zero Trust in the previous blog post. In this article, I’d like to continue to address Zero Trust…Feb 11, 2021130Feb 11, 2021130
Zero Trust in Cyber Security“Don’t trust anyone”. You might have heard this often in movies, and even use it in your daily lives. It is kind of sad to hear this…Jan 19, 2021127Jan 19, 2021127
White Paper: Tsunami of Ransomware attacks in the era of COVID-19 Pandemic — Proposed…Table of ContentsJan 19, 2021113Jan 19, 2021113
What is EPP, EDR, EDR, and XDR?The world has faced changes in many areas since COVID-19, and among them, the work environment is also changing and adapting to the new…Nov 6, 2020112Nov 6, 2020112
Overview of Ransomware incidents, APT market, and Could-based Security marketAs the proportion of remote work due to COVID-19 increases, cybersecurity threats are also increasing due to the changing working…Nov 5, 2020117Nov 5, 2020117
Limitations of EDRLimitations of reputation analysis According to AV-TEST statistics for 2018, 84% of all malicious codes are known and 16% are unknown. Of…Nov 4, 2020113Nov 4, 2020113
The key to EDR is ensuring visibility.It is expected that the security industry will continue to move actively with its own key technologies. This can be interpreted as a…Oct 30, 2020Oct 30, 2020
A solution to the arising unknown security threats is EDR.As the name implies, EDR refers to a product that ‘detects’ and ‘response’ to security threats of ‘Endpoint’. Devices such as ‘PC’ or…Oct 28, 2020Oct 28, 2020
We Must Think the Unthinkable oneAdvanced Persistent Threats (APTs), which have emerged with the advancement of cyber attack technologies, have been causing fatal damages…Oct 28, 2020Oct 28, 2020
Cybersecurity products are essential when establishing networks for operationsCybersecurity hardware and software products are essential when establishing networks for operations. Cybersecurity products serve various…Oct 28, 2020Oct 28, 2020
EMAIL IS THE WEAPON OF CHOICE IN ATTACKSA recent study reported that about 87% of security threat incident channels were via email. Traditional security response against targeted…Oct 26, 20201Oct 26, 20201