This article was written by Hanna Kim, Ph.D. student at the Korea Advanced Institute of Science and Technology (KAIST) Large Language Models (LLMs), such as OpenAI’s GPT and Google’s Gemini, have made significant advancements in understanding and using human language. They now demonstrate near-expert reasoning, generation, and interaction across various domains. However, as LLMs grow […]
Opinion articles offer readers a rare opportunity to learn directly from experts. Over the past three years, a variety of professionals, including our own reporters, have contributed columns to The Readable, covering topics from quantum security to deepfake crimes. Some articles take a deep dive into technical challenges, while others examine the broader societal implications […]
Dear Readers, As the year comes to a close, I want to take a moment to thank you for your unwavering support of The Readable. Your engagement and encouragement have been the driving force behind our success in 2024. Please note that The Readable will take a brief holiday break from December 23, 2024, to […]
In 2011, I came across a vendor on an online second-hand store who was selling a music player that I had been craving for years, the iPod Touch. The price was 100,000 won (almost $80), less than one third of the cost of the original product. The deal was too good to be true for […]
By Vinny Sagar, Solution Architect of swIDch Traditional perimeter-centric network security is based around a well-defined network boundary where all enterprise resources such as devices, file servers, applications, etc. were inside the network and users’ access to the network was strictly controlled. I like to compare traditional perimeter-centric network security to old forts since they […]
The Readable has expanded its readership by publishing quarterly magazines in hard copy. The magazines are distributed only through The Readable’s readership network and are not published online. If you would like to have a copy, please contact us through email. Below is an editor’s note, which was printed on April 14 in the first […]
By Julien Provenzano, CEO and co-founder of RALFKAIROS The emergence of large language models (LLMs) has piqued the curiosity of cybersecurity experts, who are delving into how these potent tools can fortify their security strategies. As the CEO of RALFKAIROS, I have been keeping a watchful eye on the digital landscape and the escalating importance […]
By Ravi Ithal, Founder and CTO of Normalyze Updated Apr. 6, 2023 5:57PM GMT+9 Back when thieves physically stole cash and treasure from bank vaults, an infamous criminal was asked, “Why do you rob banks?” “Because that’s where the money is,” he replied. The modern version of treasure is data—especially the sensitive data of customers, […]
By Kihong Kim, CEO of SANDS Lab “Technology-driven intelligence companies, such as SANDS Lab, can have a positive impact on the security market by entering KOSDAQ.” This is the suggestion that I heard from an industry expert after completing the final evaluation for technology special listing last January. Although SANDS Lab was initially founded as […]
By Grace Han, CEO of SSNC In today’s digital age, security threats are constantly evolving, making it increasingly difficult for organizations to keep their networks and data secure. One of the key components of network security is the firewall, which acts as a barrier between an organization’s internal network and the outside world. Firewall policies […]
Being in the spotlight can bring pain and distress to the protagonist. On Thursday, almost all media outlets in South Korea gathered at one place in Seoul to listen to Hwang Hyeon-sik, CEO at LG Uplus, the telecommunication conglomerate which has been brought to the center of attention regarding the recent breaches that took place […]
By Thomas Park, General Manager of Korea Operations at Foxit Software Updated Feb. 10, 2023 2:17PM GMT+9 Portable Document Format (PDF) security is critical in today’s digital age because PDF is widely used as a standard for sharing documents with external parties. Created by Adobe’s founder in 1993, PDF has become a dominant file format […]
It is not surprising for online banking service users in South Korea to encounter a website pop-up announcing the need to install all mandatory security applications if users want to get access to their banking account. This pop-up window redirects users to a download page with at least one or more security applications that are […]