Security hot issue: N2SF rollout nears as security buzz rises; countries scramble to respond to Mythos

[Photo: Reve AI]

As South Korea introduces the N2SF national network security system under the National Cybersecurity Basic Guidelines in May, related industries are moving faster to target it.

N2SF includes data security controls based on classification levels such as confidential, sensitive and public. It also includes securing security budgets of at least 15 percent of IT budgets, securing security staff of at least 10 percent of IT staff, mandatory multi-factor authentication for remote workers and information system administrators, and new security measures for AI systems and private cloud services.

Security companies expect demand to rise for solutions that support N2SF and are stepping up efforts to win business.

SGA Solutions plans to support the transition to N2SF centered on a zero-trust-based integrated security portfolio. Igloo Corporation is also strengthening its security strategy to respond to a changing security environment, including N2SF, zero trust and AX. Private Technology formed a partnership with IT infrastructure and information security consulting firm T&D Soft and plans broad cooperation spanning consulting and solutions to expand joint business opportunities in the public sector as adoption of N2SF and zero trust accelerates. Fasoo AI released a new version that adds N2SF support functions to its data protection and management solutions. Fasoo AI is expanding its portfolio for N2SF, a key security task for the government and public institutions, and is accelerating efforts to target the public N2SF market.

ㆍSGA Solutions strengthens response to public security system transition in line with N2SF rollout
ㆍIgloo Corporation obtains 4 patents for core AI technologies…advances “autonomous SOC”
ㆍPrivate Technology and T&D Soft to cooperate on N2SF and zero trust business
ㆍFasoo expands N2SF portfolio…speeds push into public-sector N2SF market

As attention grows over how Mythos, an AI model Anthropic has made available on a limited basis to some companies and institutions, could change the cybersecurity landscape, governments are also busy preparing countermeasures.

ㆍWarning sounded by Mythos…AI security paradigm at a turning point

South Korea’s government is sounding out joining a cooperation table with Anthropic and OpenAI to respond to threats from Anthropic’s AI model Mythos. Some are also calling for the homegrown AI foundation model programme, known as Dokpamo, to be elevated into a national security tool.

ㆍ“Responding to the Mythos shock”…government sounds out cooperation with Anthropic and OpenAI
ㆍCalls rise to elevate Dokpamo into a “national security project”…focus on impact on phase-two evaluation

Bundesbank President Joachim Nagel warned that Anthropic’s Mythos model could quickly find and exploit security vulnerabilities in financial institutions’ software. The U.S. National Security Agency is reported to be introducing and using Anthropic’s new AI model, Mythos Preview.

ㆍGerman central bank president: “Anthropic Mythos may exploit bank security gaps”
ㆍDespite Trump ban…U.S. Department of National Security makes full use of “Anthropic Mythos”

Here is a round-up of domestic and overseas corporate moves related to AI.

Microsoft is integrating AI models, including Anthropic Mythos, into its security development lifecycle. The integration aims to have AI find vulnerabilities at an early stage of development rather than after software release. Microsoft’s strategy is to significantly cut the time from finding vulnerabilities to fixing them.

ㆍMicrosoft strengthens cybersecurity by combining multiple AI models…includes Anthropic Mythos

Wiz, a security company acquired by Google, expanded Wiz Security Graph and added support for Databricks and agent studios including AWS AgentCore, the Gemini Enterprise Agent Platform, Microsoft Azure Copilot Studio and Salesforce Agentforce. The integration makes it possible to identify security risks scattered across multiple development environments in a single security graph. Wiz is also strengthening cooperation with Samsung SDS on cloud security and proactive risk response.

ㆍWiz, now under Google, evolves multi-cloud security platform based on Security Graph
ㆍGoogle Cloud expands alliances with major domestic IT service companies…full-scale AI and security push

Zero Networks, a zero-trust security startup, launched an AI Segmentation function that controls AI agents inside companies on an identity basis and blocks AI-driven network lateral movement. Arctic Wolf unveiled Decipio, a security tool that detects credential theft early. Belgian cybersecurity company Aikido Security launched Endpoint, a lightweight security agent that protects the use of AI on developer workstations and responds to open-source software supply-chain attacks.

ㆍZero Networks unveils AI Segmentation…controls autonomous agents
ㆍArctic Wolf launches Decipio tool for early detection of credential theft
ㆍAikido Security launches Endpoint AI security agent for developer workstations

ICT company Kudo Communication is stepping up AI-based security business in cooperation with AI-based application security company Black Duck. Network security company XGate said its “post-quantum cryptography-based hybrid crypto module” obtained KCMVP certification from the National Intelligence Service. Pionlink is strengthening cooperation with AI platform company Bigs Technology to develop next-generation security solutions.

ㆍKudo Communication starts push into AI code security market with Black Duck “Signal”
ㆍXGate obtains KCMVP certification for PQC-based crypto module
ㆍPionlink cooperates with Bigs Technology on “AI-based autonomous security”…pushes CTEM development

A controversy has erupted after a researcher claimed that Lovable, a vibe-coding platform valued at $6.6 billion, has a security vulnerability that allows a free account to access other users’ source code, database credentials and AI chat history.

ㆍVibe-coding platform Lovable embroiled in security vulnerability controversy…”Free account can access other users’ data”

Click Here For The Original Source

——————————————————–

..........

.

.

National Cyber Security

FREE
VIEW