<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet title="XSL_formatting" type="text/xsl" href="https://newsroom.posco.com/en/wp-content/plugins/posco-rss/posco-rss.xsl"?><rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>
	<channel>
		<title>cybersecurity &#8211; Official POSCO Group Newsroom</title>
		<atom:link href="https://newsroom.posco.com/en/tag/cybersecurity/feed/" rel="self" type="application/rss+xml" />
		<link>https://newsroom.posco.com/en</link>
        <image>
            <url>http://www.posco.co.kr/homepage/images/kor5/common/h1_posco.png</url>
            <title>cybersecurity &#8211; Official POSCO Group Newsroom</title>
            <link>https://newsroom.posco.com/en</link>
        </image>
        <currentYear>2026</currentYear>
        <cssFile>https://newsroom.posco.com/en/wp-content/plugins/posco-rss/posco-rss-xsl.css</cssFile>
        <logo>http://www.posco.co.kr/homepage/images/kor5/common/h1_posco.png</logo>
		<description>What's New on POSCO Newsroom</description>
		<lastBuildDate>Tue, 12 May 2026 09:28:58 +0000</lastBuildDate>
		<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
					<item>
				<title>[Interview] How Does a White Hat Hacker Work? Meet Pro Kim Hee-hyun, a Security Expert at POSCO DX</title>
				<link>https://newsroom.posco.com/en/interview-how-does-a-white-hat-hacker-work-meet-pro-kim-hee-hyun-a-security-expert-at-posco-dx/</link>
				<pubDate>Tue, 12 May 2026 09:00:19 +0000</pubDate>
				<dc:creator><![CDATA[parky]]></dc:creator>
						<category><![CDATA[People & Culture]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[interview]]></category>
		<category><![CDATA[POSCO]]></category>
		<category><![CDATA[POSCO DX]]></category>
		<category><![CDATA[Security Expert]]></category>
		<category><![CDATA[White Hat Hacker]]></category>
									<description><![CDATA[In an era where cyber threats are becoming increasingly sophisticated, the role of security experts in safeguarding corporate information systems has never]]></description>
																<content:encoded><![CDATA[<p><img class="alignnone size-full wp-image-28137" src="https://newsroom.posco.com/en/wp-content/uploads/2026/05/20260507_img_en_00.jpg" alt="" width="960" height="346" srcset="https://newsroom.posco.com/en/wp-content/uploads/2026/05/20260507_img_en_00.jpg 960w, https://newsroom.posco.com/en/wp-content/uploads/2026/05/20260507_img_en_00-800x288.jpg 800w, https://newsroom.posco.com/en/wp-content/uploads/2026/05/20260507_img_en_00-768x277.jpg 768w" sizes="(max-width: 960px) 100vw, 960px" /></p>
<div style="background-color: #eaedf2; font-size: 1em; color: #222; font-family: 'Pretendard', 'Noto Sans KR', Arial, sans-serif; margin-bottom: 24px; border-radius: 8px; padding: 16px 20px;">In an era where cyber threats are becoming increasingly sophisticated, the role of security experts in safeguarding corporate information systems has never been more critical. At the heart of these efforts stands a white hat hacker dedicated to identifying and remediating vulnerabilities within our internal systems. We invite you to explore the vivid professional journey of Pro Kim Hee-hyun from POSCO DX and her heartfelt advice for those aspiring to pursue a career in cybersecurity.</div>
<hr />
<p><img class="alignnone size-full wp-image-28138" src="https://newsroom.posco.com/en/wp-content/uploads/2026/05/20260507_img_en_01.jpg" alt="" width="960" height="150" srcset="https://newsroom.posco.com/en/wp-content/uploads/2026/05/20260507_img_en_01.jpg 960w, https://newsroom.posco.com/en/wp-content/uploads/2026/05/20260507_img_en_01-800x125.jpg 800w, https://newsroom.posco.com/en/wp-content/uploads/2026/05/20260507_img_en_01-768x120.jpg 768w" sizes="(max-width: 960px) 100vw, 960px" /></p>
<div style="background-color: #dfe7ff; padding: 8px 16px; border-radius: 10px; margin: 12px 0; font-family: 'Roboto', Arial, Helvetica, sans-serif; color: #000; line-height: 1.4; font-size: 1em; border: 1px solid #fff;">
<h2 style="margin: 0; font-size: 1.1em; font-weight: normal;"><span style="display: inline-block; background-color: #002693; color: #fff; padding: 2px 6px; border-radius: 6px; font-weight: bold; margin-right: 6px; font-size: 0.95em;">Q.</span><strong>Could you please introduce yourself and your current role? </strong></h2>
</div>
<p>Hello, I am Kim Hee-hyun, a Pro in the Security Planning Department at POSCO DX. Our department plays a pivotal role in overseeing the company’s entire infrastructure, ranging from corporate security and network systems to data center operations. Beyond supporting the Security Management (SM) of our group affiliates, we work closely with our Security Operations Center (SOC) and penetration testing experts to prevent security breaches and information leaks. Specifically, I am responsible for penetration testing, where I identify and remediate security vulnerabilities across POSCO Group. I approach my work with unwavering dedication every day, striving to enhance system stability and protect our valuable data.</p>
<div style="background-color: #dfe7ff; padding: 8px 16px; border-radius: 10px; margin: 12px 0; font-family: 'Roboto', Arial, Helvetica, sans-serif; color: #000; line-height: 1.4; font-size: 1em; border: 1px solid #fff;">
<h2 style="margin: 0; font-size: 1.1em; font-weight: normal;"><span style="display: inline-block; background-color: #002693; color: #fff; padding: 2px 6px; border-radius: 6px; font-weight: bold; margin-right: 6px; font-size: 0.95em;">Q.</span><strong> What inspired you to pursue a career in cybersecurity, and why did you choose to join POSCO DX?</strong></h2>
</div>
<p>My journey into security began with an incident during my time as a server administrator. One morning, I discovered that a server had been rebooted without authorization, which made me realize that someone had breached our system. Feeling a strong sense of responsibility to protect our systems, I pursued various security-related activities and eventually moved to a specialized information security firm. However, I found that external consulting often focused on short-term assessments, which limited my ability to continuously advance and perfect security frameworks. As my thirst for deeper involvement in security grew, I found the perfect opportunity to join the Security Planning Department at POSCO DX.</p>
<div id="attachment_128870" style="width: 970px" class="wp-caption aligncenter"><img class="wp-image-128870 size-full" src="https://newsroom.posco.com/kr/wp-content/uploads/2026/03/20260331_img_k1_02.jpg" alt="" width="960" height="519" /><p class="wp-caption-text">ⓒ clipartkorea</p></div>
<div style="background-color: #dfe7ff; padding: 8px 16px; border-radius: 10px; margin: 12px 0; font-family: 'Roboto', Arial, Helvetica, sans-serif; color: #000; line-height: 1.4; font-size: 1em; border: 1px solid #fff;">
<h2 style="margin: 0; font-size: 1.1em; font-weight: normal;"><span style="display: inline-block; background-color: #002693; color: #fff; padding: 2px 6px; border-radius: 6px; font-weight: bold; margin-right: 6px; font-size: 0.95em;">Q.</span><strong> What is the fundamental difference between white hat and black hat hackers?</strong></h2>
</div>
<p>While both groups may use similar technical skills, their objectives, ethics, and procedures are fundamentally different. A white hat hacker is a security professional who, with formal authorization from an organization, identifies vulnerabilities based on real-world attack scenarios and provides solutions. Our ultimate goal is to prevent incidents and strengthen security systems. In contrast, black hat hackers engage in illegal activities—such as unauthorized access, data theft, or system sabotage—for criminal or financial gain.</p>
<div style="background-color: #dfe7ff; padding: 8px 16px; border-radius: 10px; margin: 12px 0; font-family: 'Roboto', Arial, Helvetica, sans-serif; color: #000; line-height: 1.4; font-size: 1em; border: 1px solid #fff;">
<h2 style="margin: 0; font-size: 1.1em; font-weight: normal;"><span style="display: inline-block; background-color: #002693; color: #fff; padding: 2px 6px; border-radius: 6px; font-weight: bold; margin-right: 6px; font-size: 0.95em;">Q.</span><strong> What are the primary responsibilities of a white hat hacker at POSCO DX? </strong></h2>
</div>
<p>Before any web-based service developed in-house—such as our main website or E-Procurement system—is launched, it must undergo a rigorous security vulnerability assessment. We meticulously check for any security loopholes. If a vulnerability is found, we submit a report to the development team, and once they have addressed it, we conduct a follow-up verification to ensure the issue is resolved. This process is repeated until all vulnerabilities are cleared, which is a prerequisite for the final service launch.</p>
<p>We screen for 26 types of vulnerabilities, including SQL Injection, Cross-Site Scripting (XSS), and file upload vulnerabilities. Beyond web applications, we also perform penetration testing for mobile apps and security configuration audits for infrastructure systems (Unix, Windows, network equipment, DBs, etc.).</p>
<p>Furthermore, we visit group affiliates, including POSCO Holdings and POSCO, to conduct on-site inspections. Since each affiliate has different business models and system scales, our focus areas vary accordingly. When we identify potential risks that could lead to hacking or data leaks and provide guidance on improvements, the local security teams often tell us how valuable our support is. I believe these activities play a meaningful role in elevating the overall security posture of the entire POSCO Group.</p>
<p><img class="alignnone size-full wp-image-28139" src="https://newsroom.posco.com/en/wp-content/uploads/2026/05/20260507_img_en_02.jpg" alt="" width="960" height="541" srcset="https://newsroom.posco.com/en/wp-content/uploads/2026/05/20260507_img_en_02.jpg 960w, https://newsroom.posco.com/en/wp-content/uploads/2026/05/20260507_img_en_02-640x360.jpg 640w, https://newsroom.posco.com/en/wp-content/uploads/2026/05/20260507_img_en_02-800x451.jpg 800w, https://newsroom.posco.com/en/wp-content/uploads/2026/05/20260507_img_en_02-768x433.jpg 768w" sizes="(max-width: 960px) 100vw, 960px" /></p>
<div style="background-color: #dfe7ff; padding: 8px 16px; border-radius: 10px; margin: 12px 0; font-family: 'Roboto', Arial, Helvetica, sans-serif; color: #000; line-height: 1.4; font-size: 1em; border: 1px solid #fff;">
<h2 style="margin: 0; font-size: 1.1em; font-weight: normal;"><span style="display: inline-block; background-color: #002693; color: #fff; padding: 2px 6px; border-radius: 6px; font-weight: bold; margin-right: 6px; font-size: 0.95em;">Q.</span><strong> What do you believe is the core value of white hat hacking? </strong></h2>
</div>
<p>The core value lies in &#8220;prevention&#8221;—identifying and blocking risks before they manifest into problems. Security incidents can cause massive financial losses, service disruptions, and data breaches; therefore, eliminating potential threats in advance is the most efficient strategy.</p>
<p>By testing systems using the same methods as actual attackers, white hat hackers find the &#8220;doors&#8221; that intruders might use and provide ways to lock them. This process also helps uncover early-stage issues in corporate operations, policies, and organizational structures. In essence, white hat hacking is a strategic asset that safeguards a company’s financial value, brand reputation, and operational stability.</p>
<div style="background-color: #dfe7ff; padding: 8px 16px; border-radius: 10px; margin: 12px 0; font-family: 'Roboto', Arial, Helvetica, sans-serif; color: #000; line-height: 1.4; font-size: 1em; border: 1px solid #fff;">
<h2 style="margin: 0; font-size: 1.1em; font-weight: normal;"><span style="display: inline-block; background-color: #002693; color: #fff; padding: 2px 6px; border-radius: 6px; font-weight: bold; margin-right: 6px; font-size: 0.95em;">Q.</span><strong> What has been the most challenging aspect of your work?</strong></h2>
</div>
<p>The greatest challenge lies in consistently delivering results that meet the high expectations of our stakeholders. As hacking techniques evolve daily, it is not easy for a limited team to master new technologies and apply them immediately to the field. To ensure we provide the top-tier expertise expected of us, we actively participate in technical seminars and external training to internalize these capabilities.</p>
<p>Recently, we have been working to shift the paradigm of our security operations by integrating AI. We are currently testing various ways to incorporate AI into our penetration testing and security monitoring processes to reduce time and costs while building a more seamless security framework.</p>
<div style="background-color: #dfe7ff; padding: 8px 16px; border-radius: 10px; margin: 12px 0; font-family: 'Roboto', Arial, Helvetica, sans-serif; color: #000; line-height: 1.4; font-size: 1em; border: 1px solid #fff;">
<h2 style="margin: 0; font-size: 1.1em; font-weight: normal;"><span style="display: inline-block; background-color: #002693; color: #fff; padding: 2px 6px; border-radius: 6px; font-weight: bold; margin-right: 6px; font-size: 0.95em;">Q.</span><strong> Do you have a personal philosophy that guides your work? </strong></h2>
</div>
<p>I adhere to the principle of &#8216;thoroughness until I am fully satisfied.&#8217; I believe that if you rush an assessment due to time constraints, problems are bound to occur. While it is not always easy to uphold this principle during peak periods due to various internal and external factors, I keep in mind that this rigor is the only way to truly prevent accidents.</p>
<div id="attachment_128872" style="width: 970px" class="wp-caption aligncenter"><img class="wp-image-128872 size-full" src="https://newsroom.posco.com/kr/wp-content/uploads/2026/03/20260331_img_k1_04.jpg" alt="" width="960" height="640" /><p class="wp-caption-text">ⓒ clipartkorea</p></div>
<div style="background-color: #dfe7ff; padding: 8px 16px; border-radius: 10px; margin: 12px 0; font-family: 'Roboto', Arial, Helvetica, sans-serif; color: #000; line-height: 1.4; font-size: 1em; border: 1px solid #fff;">
<h2 style="margin: 0; font-size: 1.2em; font-weight: normal;"><span style="display: inline-block; background-color: #002693; color: #fff; padding: 2px 6px; border-radius: 6px; font-weight: bold; margin-right: 6px; font-size: 0.95em;">Q.</span><strong> Why is digital security becoming increasingly critical in industrial sectors, particularly in steel and manufacturing?</strong></h2>
</div>
<p>As closed-off factories of the past transition into smart factories, cyberattacks are no longer limited to simple data leaks; they can lead to massive operational losses, such as factory shutdowns or physical destruction. Therefore, digital security in the steel and manufacturing industries has become an essential safety mechanism that goes beyond data protection—it is now vital for &#8220;preventing factory downtime&#8221; and &#8220;ensuring the safety and lives of our field workers.&#8221;</p>
<div style="background-color: #dfe7ff; padding: 8px 16px; border-radius: 10px; margin: 12px 0; font-family: 'Roboto', Arial, Helvetica, sans-serif; color: #000; line-height: 1.4; font-size: 1em; border: 1px solid #fff;">
<h2 style="margin: 0; font-size: 1.1em; font-weight: normal;"><span style="display: inline-block; background-color: #002693; color: #fff; padding: 2px 6px; border-radius: 6px; font-weight: bold; margin-right: 6px; font-size: 0.95em;">Q.</span><strong> What do you think is the most important competency for a security expert? </strong></h2>
</div>
<p>The most critical competency is &#8220;practical problem-solving.&#8221; It is not enough to have technical knowledge; one must be able to identify the risks inherent in that technology and propose realistic solutions. If you aspire to be a security expert, you must develop a comprehensive mindset that allows you to grasp the technical essence of a risk and provide &#8220;actionable solutions&#8221; optimized for the organization’s business environment.</p>
<div style="background-color: #dfe7ff; padding: 8px 16px; border-radius: 10px; margin: 12px 0; font-family: 'Roboto', Arial, Helvetica, sans-serif; color: #000; line-height: 1.4; font-size: 1em; border: 1px solid #fff;">
<h2 style="margin: 0; font-size: 1.1em; font-weight: normal;"><span style="display: inline-block; background-color: #002693; color: #fff; padding: 2px 6px; border-radius: 6px; font-weight: bold; margin-right: 6px; font-size: 0.95em;">Q.</span><strong> Finally, do you have any advice for those dreaming of becoming security experts? </strong></h2>
</div>
<p>To grow as a white hat hacker or security expert, you need a solid understanding of overall IT infrastructure, including Operating Systems (OS), networks, and programming. Since the targets and services change constantly, you must also possess strong problem-solving skills and diverse practical experience. Relying on a single technology will eventually lead to a dead end. I recommend practicing with various hacking tools, participating in bug bounty programs, and staying updated on the latest security trends to cultivate flexible thinking and response capabilities.</p>
<p>Lastly, you need persistence and passion. Finding and fixing hidden vulnerabilities involves many failures. If you have the persistence and passion to overcome every challenge, you will surely become an excellent security expert.</p>
]]></content:encoded>
																				</item>
			</channel>
</rss>