{"id":61956,"date":"2025-10-21T04:00:00","date_gmt":"2025-10-21T12:00:00","guid":{"rendered":"https:\/\/www.sumologic.com\/resources\/%ec%97%90%ed%94%bc%ec%86%8c%eb%93%9c-15-%eb%b3%b4%ec%95%88-%eb%8f%84%ea%b5%ac-%ec%b4%88%eb%b3%b4%ec%9e%90-%ea%b0%80%ec%9d%b4%eb%93%9c"},"modified":"2026-01-07T07:26:34","modified_gmt":"2026-01-07T15:26:34","slug":"ep-15-beginners-guide-to-security-tools","status":"publish","type":"resource","link":"https:\/\/www.sumologic.com\/ko\/podcast\/ep-15-beginners-guide-to-security-tools","title":{"rendered":"\uc5d0\ud53c\uc18c\ub4dc 15: \ubcf4\uc548 \ub3c4\uad6c \ucd08\ubcf4\uc790 \uac00\uc774\ub4dc"},"content":{"rendered":"\n<p>\uc774\ubc88 \uc5d0\ud53c\uc18c\ub4dc\uc5d0\uc11c\ub294 \ubcf4\uc548 \ub3c4\uad6c \ucd08\ubcf4\uc790 \uac00\uc774\ub4dc\ub97c \uc0b4\ud3b4\ubcf4\uba70, \uc0ac\ub78c\u00b7\ud504\ub85c\uc138\uc2a4\u00b7\uae30\uc220\uc758 \uc911\uc694\uc131\uc744 \uac15\uc870\ud569\ub2c8\ub2e4. \ubcf4\uc548 \ud504\ub85c\uadf8\ub7a8 \uad6c\ucd95\uc744 \uc704\ud55c \uae30\ubcf8 \uc790\ub8cc\ub85c\uc11c NIST \ud504\ub808\uc784\uc6cc\ud06c\ub97c \uc18c\uac1c\ud558\uace0, \ub9ac\uc2a4\ud06c \uc2dd\ubcc4 \ubc0f \uad00\ub9ac\uc640 \uac19\uc740 \ud575\uc2ec \ub2e8\uacc4\ub4e4\uc744 \uc9da\uc5b4\ubd05\ub2c8\ub2e4. \ub610\ud55c \ube44\ubc00\ubc88\ud638 \uad00\ub9ac\uc790\ub098 \ub2e4\uc911\uc694\uc18c \uc778\uc99d \uac19\uc740 \uae30\ubcf8 \ubcf4\uc548 \ub3c4\uad6c\uac00 \ud53c\uc2f1\uacfc \uac19\uc740 \uc704\ud611\uc5d0 \ub300\uc751\ud558\ub294 \ub370 \uc65c \ud544\uc218\uc801\uc778\uc9c0\ub3c4 \ub17c\uc758\ud569\ub2c8\ub2e4. \ub9c8\uc9c0\ub9c9\uc73c\ub85c \ubcf4\uc548 \ubd84\uc57c\uc5d0\uc11c AI\ub97c \ud1b5\ud569\ud558\uace0, \uc778\uac04\uc758 \uac10\ub3c5\uc744 \uc720\uc9c0\ud558\uba74\uc11c \ud6a8\uc728\uc131\uc744 \ub192\uc77c \uc218 \uc788\ub294 \uc7a0\uc7ac\ub825\ub3c4 \ud568\uaed8 \uc0b4\ud3b4\ubd05\ub2c8\ub2e4.<\/p>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\uc774\ubc88 \uc5d0\ud53c\uc18c\ub4dc\uc5d0\uc11c\ub294 \ubcf4\uc548 \ub3c4\uad6c \ucd08\ubcf4\uc790 \uac00\uc774\ub4dc\ub97c \uc0b4\ud3b4\ubcf4\uba70, \uc0ac\ub78c\u00b7\ud504\ub85c\uc138\uc2a4\u00b7\uae30\uc220\uc758 \uc911\uc694\uc131\uc744 \uac15\uc870\ud569\ub2c8\ub2e4. \ubcf4\uc548 \ud504\ub85c\uadf8\ub7a8 \uad6c\ucd95\uc744 \uc704\ud55c \uae30\ubcf8 \uc790\ub8cc\ub85c\uc11c NIST \ud504\ub808\uc784\uc6cc\ud06c\ub97c \uc18c\uac1c\ud558\uace0, \ub9ac\uc2a4\ud06c \uc2dd\ubcc4 \ubc0f \uad00\ub9ac\uc640 \uac19\uc740 \ud575\uc2ec \ub2e8\uacc4\ub4e4\uc744 \uc9da\uc5b4\ubd05\ub2c8\ub2e4. \ub610\ud55c \ube44\ubc00\ubc88\ud638 \uad00\ub9ac\uc790\ub098 \ub2e4\uc911\uc694\uc18c \uc778\uc99d \uac19\uc740 \uae30\ubcf8 \ubcf4\uc548 \ub3c4\uad6c\uac00 \ud53c\uc2f1\uacfc \uac19\uc740 \uc704\ud611\uc5d0 \ub300\uc751\ud558\ub294 \ub370 \uc65c \ud544\uc218\uc801\uc778\uc9c0\ub3c4 \ub17c\uc758\ud569\ub2c8\ub2e4. \ub9c8\uc9c0\ub9c9\uc73c\ub85c \ubcf4\uc548 \ubd84\uc57c\uc5d0\uc11c AI\ub97c \ud1b5\ud569\ud558\uace0, \uc778\uac04\uc758 \uac10\ub3c5\uc744 \uc720\uc9c0\ud558\uba74\uc11c \ud6a8\uc728\uc131\uc744 \ub192\uc77c \uc218 [&hellip;]<\/p>\n","protected":false},"author":372,"featured_media":55714,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"< 1","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"resource-type":[369],"resource-solution":[363],"translation_priority":[221]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false},"resource-type":[369],"resource-solution":[363],"class_list":["post-61956","resource","type-resource","status-publish","has-post-thumbnail","hentry","resource-type-podcast","resource-solution-secops-and-security-ko"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/resource\/61956","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/types\/resource"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/users\/372"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/media\/55714"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/media?parent=61956"}],"wp:term":[{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/resource-type?post=61956"},{"taxonomy":"resource-solution","embeddable":true,"href":"https:\/\/www.sumologic.com\/ko\/wp-json\/wp\/v2\/resource-solution?post=61956"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}