ã©ã³ãµã ãŠã§ã¢ã«ãããµã€ããŒæ»æãå¢å ãããªããäŒæ¥ã¯ã©ã®ãããªå¯Ÿçãè¬ããã¹ãããæ¬çš¿ã§ã¯ãEGã»ãã¥ã¢ãœãªã¥ãŒã·ã§ã³ãº åç· åœ¹ CTO/æ å ±åŠçæšé²æ©æ§ïŒIPAïŒéåžžå€ç ç©¶å¡/æè¡å£«ïŒæ å ±å·¥åŠéšéïŒã®åŸ³äžžæµ©æ°ã«ãã©ã³ãµã ãŠã§ã¢ã®æŠèŠãäž»ãªææçµè·¯ãæå¹ãªã»ãã¥ãªãã£ãœãªã¥ãŒã·ã§ã³ãªã©ã«ã€ããŠäŒºã£ãã
-

EGã»ãã¥ã¢ãœãªã¥ãŒã·ã§ã³ãº åç· åœ¹ CTO/æ å ±åŠçæšé²æ©æ§ïŒIPAïŒéåžžå€ç ç©¶å¡/æè¡å£«ïŒæ å ±å·¥åŠéšéïŒã®åŸ³äžžæµ©æ°
ã©ã³ãµã ãŠã§ã¢ãšã¯
ã©ã³ãµã ãŠã§ã¢ã¯ããããããã«ãŠã§ã¢ïŒæªæã®ãããœãããŠã§ã¢ãã³ãŒãã®ç·ç§°ïŒã®äžçš®ãšããŠç¥ãããŠãããææãããšã³ã³ãã¥ãŒã¿ãããã¯ãããããããŒã¿ãæå·åããããããŠã¢ã¯ã»ã¹ã§ããªããªããå ã«æ»ãããã«èº«ä»£éïŒã©ã³ãµã ïŒãèŠæ±ããããã€ãŸãããã«ãŠã§ã¢ã®äžã§ãè è¿«ã«ããééãåŸãããšãç®çãšãããã®ãæããŠããã
ã ãæšä»ã§ã¯ã瀟å ãããã¯ãŒã¯ãªã©ãžå€éšããäŸµå ¥ããŠããŒã¿ãæå·åããããããŒã¿ãçªåããŠå ¬éããªã代ããã«ééãèŠæ±ããããšãã£ããã¿ãŒã³ãç»å ŽããŠããããã®ããããŠã€ã«ã¹ã䜿çšãããåŠãã«ããããããããã¯ãŒã¯ã«äŸµå ¥ã»æ»æããè è¿«ãããã®ãåºãã©ã³ãµã ãŠã§ã¢ãšåŒã¶ããšãå¢ããŠããã
ã©ã³ãµã ãŠã§ã¢ã«ããæ»æã¯å¢å ã®äžéããã©ã£ãŠããã埳䞞æ°ã«ãããšãå ¬éåã®ãŠã§ããµã€ããéçºç°å¢ãæ»æãããäŸããããšãããéçºç°å¢äžã§ãããïŒæ¬æ¥ã¯å¥œãŸãããªããïŒãã¹ãããŒã¿ãšããŠæ¬çªããŒã¿ãå ¥ã£ãŠããã±ãŒã¹ãããããã®å Žåã¯ãæ å ±æŒããã«ã€ãªããå¯èœæ§ãããã
äŸãã°ã2024幎10æã«ã¯äº¬ã»ã©ã³ãã¥ãã±ãŒã·ã§ã³ã·ã¹ãã ãå¥è¯çæé³©çºç«å³æžé€šã®ã·ã¹ãã ãµãŒããŒãã©ã³ãµã ãŠã§ã¢ã«ææããããšãå ¬è¡šããããã®ä»¶ã§ã¯ã·ã¹ãã ã®å°å ¥äœæ¥ã«ãããŠãã·ã¹ãã ç°å¢æ§ç¯äžã®ãµãŒããŒãžã®ã¢ã¯ã»ã¹èšå®ã«äžåãããããã°ã€ã³IDã»ãã¹ã¯ãŒããè§£æãããå€éšããã®äžæ£ã¢ã¯ã»ã¹ãçºçãããšããã
ã©ã³ãµã ãŠã§ã¢æ»æã®åæ¥å
åæ°ãè¿å¹Žã®ã©ã³ãµã ãŠã§ã¢æ»æã®ç¹åŸŽãšããŠæããã®ã¯ãã忥åãã ãæ»æãè¡ãåŽãããäŸµå ¥çµè·¯ãèŠã€ããçµç¹ïŒå人ïŒãããããŒã«ãæ»æããŠããŠãæäŸããçµç¹ïŒå人ïŒãããããŠãå®éã«æ»æãè¡ãçµç¹ïŒå人ïŒããšåæ¥ããã±ãŒã¹ãå¢ããŠããã®ã ãšããã
ãã®éãVPNæ©åšã®è匱æ§ããã端æ«ãªã©ã®äŸµå ¥çµè·¯ãæ¢ããIPã¢ãã¬ã¹ãšäŸµå ¥æ¹æ³ããããã¯äŸµå ¥ããŠå ¥æããIDããã¹ã¯ãŒããæž¡ãçµç¹ïŒå人ïŒããIABïŒInitial Access BrokerïŒããšåŒã¶ããŸããããŒã«ãæ»æããŠããŠãæäŸããçµç¹ïŒå人ïŒã¯ãRaaSïŒRansomware as a ServiceïŒãããã€ããŒããšåŒã°ããæäŸãããããŒã«ãå©çšããŠãã¢ãã£ãªãšã€ãããå®åéšéãšããŠæ»æãå®è¡ããæ§æã«ãªã£ãŠããã
ã©ã³ãµã ãŠã§ã¢ã®ææçµè·¯
ã©ã³ãµã ãŠã§ã¢ã®ææçµè·¯ã«ã€ããŠåŸ³äžžæ°ã¯ããã®ãã¬ã³ãã¯å€åããŠããããšè©±ãã
以åäž»æµã ã£ãã®ã¯ãé»åã¡ãŒã«ã«æ·»ä»ãããMicrosoft Officeãã¡ã€ã«ãªã©ãçµç±ããŠãŠã€ã«ã¹ã«ææãããæå£ã ããŠãŒã¶ãŒãæ·»ä»ãã¡ã€ã«ãéãããšã§åã蟌ãŸãããã¯ããã¹ã¯ãªãããèµ·åããããããŠã€ã«ã¹ã«ææããåŒãéãšãªãã
ãããããã®æå£ãåºãŸã£ãããšã§ãMicrosoftãèªç€Ÿè£œåã®ã»ãã¥ãªãã£ã匷åãããªã©å¯Ÿçã宿œããŠããããŠãŒã¶ãŒåŽãããäžå¯©ãªæ·»ä»ãã¡ã€ã«ã¯éããªãããšãã£ãç€Ÿå æè²ã培åºããäŒæ¥ãå¢ããããã®çµæãæ·»ä»ãã¡ã€ã«ãåæäŸµå ¥ã®ãã£ãããšããæå£ã¯æžå°ããŠããã
çŸåšäž»æµãšãªã£ãŠããã®ã¯VPNæ©åšã®è匱æ§ãçªããŠäŸµå ¥ãããã¿ãŒã³ã ãåæ°ã¯ãã³ããçŠã§åšå® å€åãªã©ãå¢ããããšãããã®æå£ãå¢å ããçç±ã§ã¯ãªããããšåæããã
ãŸãããVPNæ©åšã ãã§ãªãããªã¢ãŒããã¹ã¯ãããçšã®æ©èœãRemote Desktop ProtocolïŒRDPïŒãçµç±ã®ææãæå€ãšå€ããã®ã ãšãããéåžžã®ç°å¢ã§ããã°ãRDPããªãŒãã³ãªç¶æ ã§æå¹ã«ãªã£ãŠããããšã¯ãªãããäŸãã°ããVPNã®æºåãæŽã£ãŠããªãã®ã§RDPãéæŸããŠç€Ÿå€ããã¢ã¯ã»ã¹ã§ããç°å¢ãäœãããªã©ãäœããã®çç±ã§RDPãšããŒããéããããŸãŸã«ãªã£ãŠããŸãããšãèããããããã ããã®ç¶æ³ã§æ»æè ããµãŒããŒã«ã¢ã¯ã»ã¹ããŠäŸµå ¥ãããšãã£ãã±ãŒã¹ãå°ãªããããããšããã
ãã®ã»ããSIMã«ãŒããæ¿ããŠéä¿¡ã§ããããŒãPCã«ãããŠåºå®ã®ã°ããŒãã«IPã¢ãã¬ã¹ãå²ãåœãŠãŠããå Žåã«å±éºæ§ãé«ãŸããã°ããŒãã«IPã¢ãã¬ã¹ãå€å¥ãããããã§RDPãæå¹ã«ãªã£ãŠãããšãIDãšãã¹ã¯ãŒãããçªç Žã§ããã°RDPã§PCãæäœãããŠããŸãã
ãã®ãããªæå£ã§ã¯ã1å°ã®ããœã³ã³ããã£ãããã«ãŠã§ã¢ã«ææããããã®ããœã³ã³ã瀟å ãããã¯ãŒã¯ã«æ¥ç¶ãããéã«ãã©ãã©ã«ã ãŒãã¡ã³ãïŒæ°Žå¹³å±éïŒããããããã¯ãŒã¯å šäœã«ææãåºãããããè¢«å®³ã®æ¡å€§ãäºæ³ãããã
ã©ã³ãµã ãŠã§ã¢æ»æãžã®å¯Ÿç
ã§ã¯ãã©ã³ãµã ãŠã§ã¢æ»æã®è¢«å®³ã«éããªãããã«ã¯ãã©ã®ãããªå¯Ÿçãèããããã®ãã
åæäŸµå ¥ãžã®å¯Ÿç
埳䞞æ°ã¯åæäŸµå ¥ã®æå£ã«ãããåãã¹ã察çã¯ç°ãªããšããããã§ãVPNæ©åšã®è匱æ§ã«é¢ããŠã¯ãå¿ èŠã«å¿ããŠããããåœãŠãããšãéèŠã ãšããããŸããVPNã«çšããIDããã¹ã¯ãŒãã匷åºãªãã®ã«ããããšãæçšã ãšããã
ãªã¢ãŒããã¹ã¯ããããå©çšããå Žåã¯ããããŒããå€éšå ¬éããªãããšãéèŠãã ãšåæ°ã¯åã蟌ããããŸããVPNæ©åšãšåæ§ã«ãIDããã¹ã¯ãŒãã匷åºãªãã®ã«ãããšãããåœããåã®ããšãããŸãããããšèªãã
äžæ¹ã§åŸ³äžžæ°ããåä»ã ããšè¿°ã¹ãã®ã¯ãã¡ãŒã«æ·»ä»åãžã®å¯Ÿçã§ãããããžãã¹ã«ãããŠå¿ èŠãªæ å ±ãæ·»ä»ãã¡ã€ã«ã§éãã·ãŒã³ãéåžžã«å€ãããããã¡ã€ã«ãéãããšãçŠæ¢ããããæ·»ä»ããããšèªäœãå¶éãããããããšã¯é£ããããŸããã»ãã¥ãªãã£ããªã·ãŒã«åºã¥ããäœãããã®å¶éãããããšããŠããååŒå ãè£ ã£ãã¡ãŒã«ãªã©ãã€ãéããŠããŸãããšã¯ååã«èããããã
åæ°ã«ãããšãã¡ãŒã«æ·»ä»åã®å ŽåãMicrosoft Officeã§ã¯ã»ãã¥ãªãã£ã匷åãããŠãããããæ·»ä»ãã¡ã€ã«ãéãã ãã§ææããããšã¯å°ãªãã®ã ãšãããåé¡ãªã®ã¯ãéããåŸã«ããã¯ããæå¹ã«ããæäœãããŠããŸãããšã ã
ããã§èšãããã¯ããæå¹ã«ããæäœããšã¯ããã³ã³ãã³ãã®æå¹åããã¿ã³ã®ã¯ãªãã¯ã§ããããããäžçšæã«æå¹åããããšã§ãææãå§ãŸãããã ãããèããã«æå¹åããŠããŸãããšãããã°ãã¡ãŒã«ãæ·»ä»ãã¡ã€ã«å ã«èšãããæå¹åãä¿ãã¡ãã»ãŒãžã«çŽ çŽã«åŸã£ãŠããŸã人ãå°ãªããªãïŒç¹ã«æ¥æ¬äººã¯çŽ çŽã«åŸãããããšããïŒã察çãšããŠããŸãã¯åŸæ¥å¡ã«åŸ¹åºããã»ãã¥ãªãã£æè²ãè¡ãããã®ãããªæ»æã®æå£ãåšç¥ããŠããããšã倧åã ãšããã
ãŸããEDRïŒEndpoint Detection and ResponseïŒãœãªã¥ãŒã·ã§ã³ã®å°å ¥ã广çã ãšåŸ³äžžæ°ã¯èª¬æãããEDRã¯ä»®ã«ãã¯ããåãåºããŠããŸã£ããšããŠãããã®åŸã®æåãæ€ç¥ãããããã¯ãŒã¯ãéé¢ãããªã©ã®å¯ŸçããšããEDRã¯ããœã³ã³ãäžéšã®ãµãŒããŒãªã©ã®ãšã³ããã€ã³ããä¿è·ãããã®ã ãããã®ç¯å²ããããã¯ãŒã¯ãã¯ã©ãŠãç°å¢ãŸã§åºãããœãªã¥ãŒã·ã§ã³ãšããŠãXDRïŒExtended Detection and ResponseïŒãããã
æšä»ã倧æäŒæ¥ã®äžè«ãäŒæ¥ãã©ã³ãµã ãŠã§ã¢ã«ææããããããæ å ±ãæŽ©ãããšããäºæ¡ãå¢ããŠããã埳䞞æ°ã¯ããã§ã«ããåãã®ããäžè«ãäŒæ¥ã«EDRãå°å ¥ããŠããããšããã®ã¯ãçŸå®çã«ã¯é£ããããšããããã§ãããšã¯ããä»åŸã¯ãEDR ãå«ããã»ãã¥ãªãã£å¯Ÿçã®æç¡ãçºæ³šå ã®éžå®ã«åœ±é¿ãããããªã±ãŒã¹ãå¢ãããããããªãããšèŠè§£ã瀺ããã
ã©ãã©ã«ã ãŒãã¡ã³ããžã®å¯Ÿç
åæäŸµå ¥ããããœã³ã³ãªã©ãè¶³æããã«ãåäžãããã¯ãŒã¯å ã®ä»ã®ããœã³ã³ãªã©ãžææãåºããã©ãã©ã«ã ãŒãã¡ã³ããžã®å¯Ÿçã«ã€ããŠã¯ã©ãããããããè匱æ§ãžã¯ããããåœãŠãã宿ãªIDããã¹ã¯ãŒãã䜿çšããªããšãã£ãåºæ¬çãªçããåè¿°ã®EDRãæå¹ã§ããããšã¯ä»ã®æ»æãžã®å¯Ÿçãšåæ§ã ã
ãã®ä»ã«ãã埳䞞æ°ã¯ããã€ãã®å¯Ÿçã瀺ããã1ã€ã¯ããããã¯ãŒã¯ãã§ããã ãåºåãããããšã§ãããéå»ã«ã¯ãæµ·å€ã®åäŒç€Ÿãã©ã³ãµã ãŠã§ã¢æ»æãåããããšããã£ããã§ãã°ããŒãã«ãªäŒæ¥ãããã¯ãŒã¯ãéãã芪äŒç€Ÿã«ææãåºãã£ãäºæ¡ãããããã®ãããActive Directoryãåããçžäºã®ã¢ã¯ã»ã¹ãæäœéã«ãããªã©ãã§ããã ãå³ããå¶éããããããšãæå¹ã ãšãããæšä»å°å ¥ãé²ããŒããã©ã¹ãã§ãããããã¯ãŒã¯ã现ååããŠãŠãŒã¶ãŒIDããšã«ãã©ãã£ãã¯ãªã©ã管çããããã€ã¯ãã»ã°ã¡ã³ããŒã·ã§ã³ããéèŠèŠãããŠããããšã¯ãããå°å ¥ã倧ãããã«ãªãããšããã宿œã«èžã¿åãã®ãé£ãããšãã課é¡ãããã
ãŸããã©ã³ãµã ãŠã§ã¢ãžã®å¯ŸçãšããŠåæ°ã匷調ããã®ããããã¯ã¢ããããã£ãããšãããšããšããŠããããšããã¡ããšç¢ºèªããããšã ãåæ©çãªããããããã¯ã¢ãããããŠããã€ããã ã£ãããããŸãã§ããŠããªãã£ãããšãã£ãã±ãŒã¹ã¯æå€ãšããã®ã ãšããã
ããã¯ã¢ããã¯ã3-2-1ã«ãŒã«ãã«ã®ã£ãšã£ã宿œãæšå¥šããããããã¯ã3ã€ã®ããã¯ã¢ããããšãã2ã€ã®ç°ãªãã¡ãã£ã¢ïŒææ³ïŒã§ä¿åãã1ã€ã¯å¥ã®å Žæã«ä¿ç®¡ãããšããèãæ¹ã ã埳䞞æ°ã¯ããå¥ã®å Žæãã«é¢ããŠããããã¯ãŒã¯ããéé¢ããããªãã©ã€ã³ããã¯ã¢ããã§ä¿åãããã倿Žã»åé€ãã§ããªãã€ãã¥ãŒã¿ãã«ãªããã¯ã¢ããæ¹åŒã䜿ããšãã£ãææ³ã瀺ããã
æåŸã«ãå¿ããã¡ãªã®ããèšç·Žã§ãããã©ã³ãµã ãŠã§ã¢æ»æãå€§èŠæš¡çœå®³ãæ³å®ãã埩æ§èšç·Žãè¡ãããšããåæ°ã¯åŒ·ãèŠãããå®éã«èšç·ŽãããŠã¿ããšãèšå®ã®åé¡ã§ããã¯ã¢ãããè¶³ããŠããªãã£ããããšããŠãããšæã£ãŠããããŒã¿ããšããŠããªãã£ãããšããåé¡ãæŽãåºãããããã¯ã¢ããããã ãã§ãªããããŒã¿ããã¡ããšæ»ãããšãããŸã§ã確èªããããšã倧äºãªã®ã ã
ã©ã³ãµã ãŠã§ã¢ææåŸã®äžæå¯Ÿå¿
察çãå ¥å¿µã«è¡ã£ãŠããŠããã©ã³ãµã ãŠã§ã¢ã«ææããå¯èœæ§ã¯ãããã§ã¯å®éã«ææããå ŽåããŸãã©ããã¹ããªã®ãã埳䞞æ°ã¯ã察çç¶æ³ãå°å ¥ãœãªã¥ãŒã·ã§ã³ã®çš®é¡ã«ãã£ãŠãã©ããããã¯å€ããããšããããã§ããããã¯ãŒã¯ããéé¢ãããã©ãããå«ãããããããèªç€Ÿã§ã©ã®ããã«åãã®ããããªã·ãŒãšããŠæ±ºããŠããã¹ããã ãšç¶ããã
ããªã·ãŒã«æ²¿ã£ãåæå¯Ÿå¿ãããåŸã¯ãå°éå®¶ãšãšãã«ãäŸµå®³ç¶æ³ã®ç¢ºèªã端æ«ããã³ããŒã¿ã®ä¿®åŸ©ãªã©ã«çæããããšã«ãªãã
ã©ã³ãµã ãŠã§ã¢å¯Ÿçã®ãã¬ã³ã
æåŸã«ã埳䞞æ°ã«ã©ã³ãµã ãŠã§ã¢å¯Ÿçã®ãã¬ã³ãã«ã€ããŠäŒºã£ããæ³šç®ãã¹ãã¯ãZTNAïŒZero Trust Network AccessïŒãã§ãããããã¯ãŒããã©ã¹ãã«åºã¥ããã¢ã¯ã»ã¹å¶åŸ¡ã®æŠå¿µã§ãããVPNæ©åšãå€éšå ¬éããã°ããŒãã«IPã¢ãã¬ã¹ãäžèŠãšãªããã©ãããã©ããžãããã¯ãŒã¯ãæ¥ç¶ããããªã©ã现ããå¶åŸ¡ã§ãããããããå®å šæ§ãé«ãŸããšãããããã«ãã¯ã©ãŠããžã®æ¥ç¶ãšãªããããã¢ã¯ã»ã¹ãã€ã³ããäŒæ¥åŽã§ä¿æããå¿ èŠããªãç¹ãã¡ãªããã ãçŸç¶ãã©ã³ãµã ãŠã§ã¢ã®äž»ãªææçµè·¯ãVPNæ©åšãšRDPçµç±ã§ããããšãèãããšãæçãªææ®µã ãšèšããã ããã
ãŸããåæ°ã¯å人çãªèŠè§£ãšãã€ã€ãäžéšã®VPNæ©åšãèªåã¢ããããŒãã«å¯Ÿå¿ããŠããããšãããVPNæ©åšã®ãœãããŠã§ã¢ãèªåã¢ããããŒãã«ãã¹ããã ãšè¿°ã¹ãããŸãã«æŽæ°ããã°ã©ã ã®äžå ·åãªã©ã§æ©åšãåäœããªããªããšãããªã¹ã¯ãèãããããããã以äžã«ãã©ã³ãµã ãŠã§ã¢ã«ææããã»ãããã被害ã倧ãããæŽæ°ããã°ã©ã ã®åé¡ã§ããããã¯ãŒã¯ãæ¢ãŸãå¯èœæ§ããããããã¡ãã¯ãã³ããŒã®å¯Ÿå¿ã§åŸ©æ§ã§ããå¯èœæ§ãé«ããåãããã«æ¢ãŸããªã¹ã¯ã¯ãããã®ã®ã被害ã®é倧æ§ãèããããèªåã¢ããããŒããéžæããã¹ãããšããã
*ã*ã*
è¿å¹Žå¢å ã®äžéããã©ãã©ã³ãµã ãŠã§ã¢ã«ãããµã€ããŒæ»æã«åããåºæ¬çãªå¯ŸçããšãããšãäŒæ¥ã«ã¯æ±ããããŠããã埳䞞æ°ã®èŠè§£ãåèã«ãæ¹ããŠã©ã³ãµã ãŠã§ã¢ãžã®å¯Ÿçãçèãããã
ã»ãã¥ãªãã£é¢é£ã®æ³šç®ãã¯ã€ãããŒããŒ
æ±äºåæãèŠæ®ããæ¬¡äžä»£ã®ã»ãã¥ãªãã£å¯Ÿçïœãã€ã¯ãã»ã°ã¡ã³ããŒã·ã§ã³æè¡ãšã¯ïœSASEãå°å ¥ããçµç¹ãçŽé¢ãã課é¡ãšã¯ããªãSWGãCASBã®æ©èœãæå€§éã«çãããªãã®ã
ã»ãã¥ãªãã£ã確ä¿ããããã®ãã³ã57ãå ¬éããããããååãªé²åŸ¡äœå¶ãæ·ããŠããã«ã¯
èªæ²»äœãæ¥åã§ã¯ã©ãŠããµãŒãã¹ãå©çšããã«ããããæ±ããããã»ãã¥ãªãã£å¯Ÿçãšã¯
ã»ãã¥ãªãã£ã®åºæ¬ãç¥ã! ãªã¹ã¹ã¡èšäº
ã©ã³ãµã ãŠã§ã¢ã«ã©ã察å¿ãã¹ãããå®è·µæ¹æ³ãã¬ã¯ãã£ãŒããã«ãŠã§ã¢å¯Ÿçã¬ã€ããææçµè·¯ããªã¹ã¯ãäºé²çãæå
EDRãMDRãXDRãšã¯? æŒãããŠããããã»ãã¥ãªãã£ã®ããŒã¯ãŒãã解説
ãšã³ããã€ã³ãã»ãã¥ãªãã£ã®åºæ¬ã解説 - ãªã¹ã¯ãæžããããã«ãã¹ãããšãšã¯
ãŒããã©ã¹ããåºæ¬ãã解説! â誰ãä¿¡é Œããªãâã»ãã¥ãªãã£ãšã¯?
ãããã¯ãŒã¯ã»ãã¥ãªãã£ãé«ããã«ã¯? æŒãããŠããããSASEã®åºæ¬
ã»ãã¥ãªãã£åŒ·åã®ããã«ç¥ã£ãŠãããããµã€ããŒæ»æ - ååãšå¯Ÿç
ç¥ã£ãŠãããããµã€ããŒæ»æ - ååãšå¯Ÿç
æ å ±è³ç£ãå®ãããã«å¿ èŠãªãããã¯ãŒã¯ã»ãã¥ãªãã£ã®åºæ¬
ä»ãè£œé æ¥ãèããã¹ãã»ãã¥ãªãã£å¯Ÿçãšã¯?
ã©ã³ãµã ãŠã§ã¢å¯Ÿçã®åºç€ç¥è - ææçµè·¯ã察çãçºèŠåŸã®å¯Ÿå¿
AIãæªçšãããµã€ããŒæ»æã«ããã«å¯ŸåŠãã¹ãã
ãã£ãã·ã³ã°æ»æãšã¯ - äž»ãªææ³ããªã¹ã¯ãææ°ã®å¯Ÿçæ¹æ³ã埳䞞æ°ã解説
OWASP Top 10ããã²ãè§£ããªã¹ã¯ãå°éå®¶ã解説 - Webã»ãã¥ãªãã£æ åœè å¿ èŠ!
OWASP Top 10 for LLM ApplicationsããèŠããLLMã«ãããã»ãã¥ãªãã£ãªã¹ã¯ãšã¯
DDoSæ»æãšã¯ - æ»æææ³ãã察çãŸã§ãã»ãã¥ãªãã£ã®å°éå®¶ã解説

