Discover expert perspectives and experiences
through the latest security trends, innovative technology approaches,
and professional career journeys.

[Policy Proposal] South Korea's Hacking Problem Stems from Government Certification Systems

[Policy Proposal] South Korea's Hacking Problem Stems from Government Certification Systems

Abolishing Korea’s Information Security Certification System and Implementing a Complete Attack Response Strategy

The government-mandated security...

Read more
[Report] Why the ISMS Certification System Is No Longer Valid

[Report] Why the ISMS Certification System Is No Longer Valid

Report on the Technical Irrationalities and Real-World Gaps in Korea’s Information Security Certification System

Overview and Background

Korea’s...

Read more
PLURA Does the Unimaginable

PLURA Does the Unimaginable

🎬 Famous Quote from The Imitation Game

“Sometimes it is the people no one imagines anything of who do the things that no one can imagine.”
“It is...

Read more
How to Check If a Hacking Attack Is Happening Right Now?

How to Check If a Hacking Attack Is Happening Right Now?

“Invisible hacking threats could be happening right now.”

Hacking doesn’t usually happen all at once.
🔓 It often penetrates quietly and deeply, likely...

Read more
If You Deploy SOAR, Then What? No Real Automated Response If It Can’t Act

If You Deploy SOAR, Then What? No Real Automated Response If It Can’t Act

📉 SOAR solutions typically receive security events from SIEM and then carry out automated responses. Yet many organizations report: “We deployed SOAR...

Read more
So You Deployed a SIEM—Now What? If You Can’t Collect or Analyze Logs Properly

So You Deployed a SIEM—Now What? If You Can’t Collect or Analyze Logs Properly

📉 Many companies consider deploying Unified Log Management or a SIEM. However, there’s a critical question: Are you actually collecting your logs? And...

Read more
Comprehensive Summary of the SKT USIM Hacking Incident: Causes, Impact, and Response Measures

Comprehensive Summary of the SKT USIM Hacking Incident: Causes, Impact, and Response Measures

Key Summary
The SK Telecom HSS breach, confirmed on April 18, 2025, exposed USIM authentication data of up to 23 million users. On April 28, SKT...

Read more
Traditional SOC vs. PLURA-XDR-Driven SOC: From Reactive Response to Proactive Defense

Traditional SOC vs. PLURA-XDR-Driven SOC: From Reactive Response to Proactive Defense

⛑️While both a traditional Security Operations Center (SOC) and a PLURA-XDR-Driven SOC serve the common goal of protecting enterprise environments,...

Read more