SlideShare a Scribd company logo
IDG Tech Report
I D G   Te c h   R e p o r t




                                  1
                               IDG Korea
I D G   Te c h   R e p o r t




                                  2
                               IDG Korea
I D G   Te c h   R e p o r t




                                  3
                               IDG Korea
I D G   Te c h   R e p o r t




                                  4
                               IDG Korea
I D G   Te c h   R e p o r t




                                  5
                               IDG Korea
I D G   Te c h   R e p o r t




                                  6
                               IDG Korea
I D G   Te c h   R e p o r t




                                  7
                               IDG Korea
I D G   Te c h   R e p o r t




                                  8
                               IDG Korea
IDG Korea Contacts

More Related Content

Viewers also liked

An Advanced persistent threats
An Advanced persistent threatsAn Advanced persistent threats
An Advanced persistent threats
pcsafe
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent Threat
FireEye, Inc.
 
APT Webinar
APT WebinarAPT Webinar
APT Webinar
Joseph Schorr
 
Paul Coggin - Digital Energy BPT (Basic Persistent Threat)
Paul Coggin - Digital Energy BPT (Basic Persistent Threat)Paul Coggin - Digital Energy BPT (Basic Persistent Threat)
Paul Coggin - Digital Energy BPT (Basic Persistent Threat)
bsidesaugusta
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
NetIQ
 
Larson Macaulay apt_malware_past_present_future_out_of_band_techniques
Larson Macaulay apt_malware_past_present_future_out_of_band_techniquesLarson Macaulay apt_malware_past_present_future_out_of_band_techniques
Larson Macaulay apt_malware_past_present_future_out_of_band_techniques
Scott K. Larson
 
Lifecycle of an advanced persistent threat
Lifecycle of an advanced persistent threatLifecycle of an advanced persistent threat
Lifecycle of an advanced persistent threat
Bee_Ware
 
Amien Harisen - APT1 Attack
Amien Harisen - APT1 AttackAmien Harisen - APT1 Attack
Amien Harisen - APT1 Attack
Indonesia Honeynet Chapter
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
Dan Morrill
 
ESG TechTruth: Advanced Persistent Threat: The Pervasive IT Security Skills S...
ESG TechTruth: Advanced Persistent Threat: The Pervasive IT Security Skills S...ESG TechTruth: Advanced Persistent Threat: The Pervasive IT Security Skills S...
ESG TechTruth: Advanced Persistent Threat: The Pervasive IT Security Skills S...
Enterprise Strategy Group
 
WG-APTPresentation
WG-APTPresentationWG-APTPresentation
WG-APTPresentation
Serhat Cakmakoglu
 
One Way Hackers Steal Data From Your Systems
One Way Hackers Steal Data From Your SystemsOne Way Hackers Steal Data From Your Systems
One Way Hackers Steal Data From Your Systems
William Kiss
 
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Security B-Sides
 
Natural Disasters - A Persistent Threat to Human Security in Pakistan
Natural Disasters - A Persistent Threat to Human Security in PakistanNatural Disasters - A Persistent Threat to Human Security in Pakistan
Natural Disasters - A Persistent Threat to Human Security in Pakistan
Taimur Shan
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
Peter Wood
 
Emerging cyber threats_report2012
Emerging cyber threats_report2012Emerging cyber threats_report2012
Emerging cyber threats_report2012
day4justice
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
Mayur Nanotkar
 
Tripwire Adaptive Threat Protection
Tripwire Adaptive Threat ProtectionTripwire Adaptive Threat Protection
Tripwire Adaptive Threat Protection
Tripwire
 
APT(Advanced Persistent Threats) & strategies to counter APT
APT(Advanced Persistent Threats) & strategies to counter APTAPT(Advanced Persistent Threats) & strategies to counter APT
APT(Advanced Persistent Threats) & strategies to counter APT
Avkash Kathiriya
 

Viewers also liked (19)

An Advanced persistent threats
An Advanced persistent threatsAn Advanced persistent threats
An Advanced persistent threats
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent Threat
 
APT Webinar
APT WebinarAPT Webinar
APT Webinar
 
Paul Coggin - Digital Energy BPT (Basic Persistent Threat)
Paul Coggin - Digital Energy BPT (Basic Persistent Threat)Paul Coggin - Digital Energy BPT (Basic Persistent Threat)
Paul Coggin - Digital Energy BPT (Basic Persistent Threat)
 
Advanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective ResponsesAdvanced Persistent Threat - Evaluating Effective Responses
Advanced Persistent Threat - Evaluating Effective Responses
 
Larson Macaulay apt_malware_past_present_future_out_of_band_techniques
Larson Macaulay apt_malware_past_present_future_out_of_band_techniquesLarson Macaulay apt_malware_past_present_future_out_of_band_techniques
Larson Macaulay apt_malware_past_present_future_out_of_band_techniques
 
Lifecycle of an advanced persistent threat
Lifecycle of an advanced persistent threatLifecycle of an advanced persistent threat
Lifecycle of an advanced persistent threat
 
Amien Harisen - APT1 Attack
Amien Harisen - APT1 AttackAmien Harisen - APT1 Attack
Amien Harisen - APT1 Attack
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
 
ESG TechTruth: Advanced Persistent Threat: The Pervasive IT Security Skills S...
ESG TechTruth: Advanced Persistent Threat: The Pervasive IT Security Skills S...ESG TechTruth: Advanced Persistent Threat: The Pervasive IT Security Skills S...
ESG TechTruth: Advanced Persistent Threat: The Pervasive IT Security Skills S...
 
WG-APTPresentation
WG-APTPresentationWG-APTPresentation
WG-APTPresentation
 
One Way Hackers Steal Data From Your Systems
One Way Hackers Steal Data From Your SystemsOne Way Hackers Steal Data From Your Systems
One Way Hackers Steal Data From Your Systems
 
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
Advanced Persistent Threats (Shining the Light on the Industries' Best Kept S...
 
Natural Disasters - A Persistent Threat to Human Security in Pakistan
Natural Disasters - A Persistent Threat to Human Security in PakistanNatural Disasters - A Persistent Threat to Human Security in Pakistan
Natural Disasters - A Persistent Threat to Human Security in Pakistan
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
 
Emerging cyber threats_report2012
Emerging cyber threats_report2012Emerging cyber threats_report2012
Emerging cyber threats_report2012
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
 
Tripwire Adaptive Threat Protection
Tripwire Adaptive Threat ProtectionTripwire Adaptive Threat Protection
Tripwire Adaptive Threat Protection
 
APT(Advanced Persistent Threats) & strategies to counter APT
APT(Advanced Persistent Threats) & strategies to counter APTAPT(Advanced Persistent Threats) & strategies to counter APT
APT(Advanced Persistent Threats) & strategies to counter APT
 

More from 성원 정

SW사업 대가산정 가이드(안)
SW사업 대가산정 가이드(안)SW사업 대가산정 가이드(안)
SW사업 대가산정 가이드(안)성원 정
 
적정기술(Appropriate Technology)
적정기술(Appropriate Technology)적정기술(Appropriate Technology)
적정기술(Appropriate Technology)성원 정
 
클라우드 Sla가이드 및_개인정보보호수칙_자료(10.5)
클라우드 Sla가이드 및_개인정보보호수칙_자료(10.5)클라우드 Sla가이드 및_개인정보보호수칙_자료(10.5)
클라우드 Sla가이드 및_개인정보보호수칙_자료(10.5)성원 정
 
기업들의 SNS 활동 한계에 봉착했나, 이제 시작인가?
기업들의 SNS 활동 한계에 봉착했나, 이제 시작인가?기업들의 SNS 활동 한계에 봉착했나, 이제 시작인가?
기업들의 SNS 활동 한계에 봉착했나, 이제 시작인가?성원 정
 
조직에서 '태도'가 중요한 이유
조직에서 '태도'가 중요한 이유조직에서 '태도'가 중요한 이유
조직에서 '태도'가 중요한 이유성원 정
 
스마트워킹이 가져온 사회 변화와 기회
스마트워킹이 가져온 사회 변화와 기회스마트워킹이 가져온 사회 변화와 기회
스마트워킹이 가져온 사회 변화와 기회성원 정
 
스마트워크 보안 이슈 및 대응
스마트워크 보안 이슈 및 대응스마트워크 보안 이슈 및 대응
스마트워크 보안 이슈 및 대응성원 정
 
스마트워킹의 의미와 효과적 실행 방향
스마트워킹의 의미와 효과적 실행 방향스마트워킹의 의미와 효과적 실행 방향
스마트워킹의 의미와 효과적 실행 방향성원 정
 
NFC 기술과 서비스의 현재와 미래 전망
NFC 기술과 서비스의 현재와 미래 전망NFC 기술과 서비스의 현재와 미래 전망
NFC 기술과 서비스의 현재와 미래 전망성원 정
 
Bluecoat security report1_apt
Bluecoat security report1_aptBluecoat security report1_apt
Bluecoat security report1_apt성원 정
 
IT전문인력의 업무 환경 현황과 시사점
IT전문인력의 업무 환경 현황과 시사점IT전문인력의 업무 환경 현황과 시사점
IT전문인력의 업무 환경 현황과 시사점
성원 정
 

More from 성원 정 (11)

SW사업 대가산정 가이드(안)
SW사업 대가산정 가이드(안)SW사업 대가산정 가이드(안)
SW사업 대가산정 가이드(안)
 
적정기술(Appropriate Technology)
적정기술(Appropriate Technology)적정기술(Appropriate Technology)
적정기술(Appropriate Technology)
 
클라우드 Sla가이드 및_개인정보보호수칙_자료(10.5)
클라우드 Sla가이드 및_개인정보보호수칙_자료(10.5)클라우드 Sla가이드 및_개인정보보호수칙_자료(10.5)
클라우드 Sla가이드 및_개인정보보호수칙_자료(10.5)
 
기업들의 SNS 활동 한계에 봉착했나, 이제 시작인가?
기업들의 SNS 활동 한계에 봉착했나, 이제 시작인가?기업들의 SNS 활동 한계에 봉착했나, 이제 시작인가?
기업들의 SNS 활동 한계에 봉착했나, 이제 시작인가?
 
조직에서 '태도'가 중요한 이유
조직에서 '태도'가 중요한 이유조직에서 '태도'가 중요한 이유
조직에서 '태도'가 중요한 이유
 
스마트워킹이 가져온 사회 변화와 기회
스마트워킹이 가져온 사회 변화와 기회스마트워킹이 가져온 사회 변화와 기회
스마트워킹이 가져온 사회 변화와 기회
 
스마트워크 보안 이슈 및 대응
스마트워크 보안 이슈 및 대응스마트워크 보안 이슈 및 대응
스마트워크 보안 이슈 및 대응
 
스마트워킹의 의미와 효과적 실행 방향
스마트워킹의 의미와 효과적 실행 방향스마트워킹의 의미와 효과적 실행 방향
스마트워킹의 의미와 효과적 실행 방향
 
NFC 기술과 서비스의 현재와 미래 전망
NFC 기술과 서비스의 현재와 미래 전망NFC 기술과 서비스의 현재와 미래 전망
NFC 기술과 서비스의 현재와 미래 전망
 
Bluecoat security report1_apt
Bluecoat security report1_aptBluecoat security report1_apt
Bluecoat security report1_apt
 
IT전문인력의 업무 환경 현황과 시사점
IT전문인력의 업무 환경 현황과 시사점IT전문인력의 업무 환경 현황과 시사점
IT전문인력의 업무 환경 현황과 시사점
 

Recently uploaded

Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 

Recently uploaded (20)

Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 

Advanced Persistent Threat