Artificial Intelligence (AI) Analysis Technology of Malicious Code (Image-based analysis)This time, I would like to introduce a technology based on Artificial Intelligence (AI) that analyzes malicious code.Jul 27, 2021Jul 27, 2021
Zero Trust in the remote working environmentOf all the changes we experienced as a result of the outbreak of COVID-19, the global epidemic in early 2020, maybe social distancing and…May 23, 2021May 23, 2021
Functions of EDR(Endpoint Detection and Response)In this blog post, we will talk about the function of EDR. Since you already know about anti-virus which is also called vaccine, I will…Mar 31, 2021Mar 31, 2021
What is EDR (Endpoint Detection & Response)?In the last article, we mentioned that Endpoint Detection and Response (EDR) is in line with implementing the concept of Zero Trust…Feb 25, 2021Feb 25, 2021
Zero Trust on Endpoints — Securing VisibilityWe learned about the basic concept of Zero Trust in the previous blog post. In this article, I’d like to continue to address Zero Trust…Feb 11, 2021Feb 11, 2021
Zero Trust in Cyber Security“Don’t trust anyone”. You might have heard this often in movies, and even use it in your daily lives. It is kind of sad to hear this…Jan 19, 2021Jan 19, 2021
White Paper: Tsunami of Ransomware attacks in the era of COVID-19 Pandemic — Proposed…Table of ContentsJan 19, 2021Jan 19, 2021
What is EPP, EDR, EDR, and XDR?The world has faced changes in many areas since COVID-19, and among them, the work environment is also changing and adapting to the new…Nov 6, 2020Nov 6, 2020
Overview of Ransomware incidents, APT market, and Could-based Security marketAs the proportion of remote work due to COVID-19 increases, cybersecurity threats are also increasing due to the changing working…Nov 5, 2020Nov 5, 2020
Limitations of EDRLimitations of reputation analysis According to AV-TEST statistics for 2018, 84% of all malicious codes are known and 16% are unknown. Of…Nov 4, 2020Nov 4, 2020
The key to EDR is ensuring visibility.It is expected that the security industry will continue to move actively with its own key technologies. This can be interpreted as a…Oct 30, 2020Oct 30, 2020
A solution to the arising unknown security threats is EDR.As the name implies, EDR refers to a product that ‘detects’ and ‘response’ to security threats of ‘Endpoint’. Devices such as ‘PC’ or…Oct 28, 2020Oct 28, 2020
We Must Think the Unthinkable oneAdvanced Persistent Threats (APTs), which have emerged with the advancement of cyber attack technologies, have been causing fatal damages…Oct 28, 2020Oct 28, 2020
Cybersecurity products are essential when establishing networks for operationsCybersecurity hardware and software products are essential when establishing networks for operations. Cybersecurity products serve various…Oct 28, 2020Oct 28, 2020
EMAIL IS THE WEAPON OF CHOICE IN ATTACKSA recent study reported that about 87% of security threat incident channels were via email. Traditional security response against targeted…Oct 26, 20201Oct 26, 20201