{"id":49597,"date":"2025-08-08T10:59:20","date_gmt":"2025-08-08T16:59:20","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=49597"},"modified":"2026-01-09T03:23:53","modified_gmt":"2026-01-09T10:23:53","slug":"%ec%97%b0%eb%b0%a9-%ec%a0%95%eb%b6%80%ec%9d%98-%ec%82%ac%ec%9d%b4%eb%b2%84-%eb%b3%b4%ec%95%88-%ec%9a%b0%ec%84%a0%ec%88%9c%ec%9c%84%ea%b0%80-%ec%95%88%eb%b3%b4-%ec%a0%84%eb%9e%b5%ec%9d%84-%ec%9e%ac","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ko\/resources\/reports\/federal-cyber-priorities-impact-report\/","title":{"rendered":"\uc5f0\ubc29 \uc815\ubd80\uc758 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc6b0\uc120\uc21c\uc704\uac00 \uc548\ubcf4 \uc804\ub7b5\uc744 \uc7ac\ud3b8\ud569\ub2c8\ub2e4"},"content":{"rendered":"<section class=\"bs-section bs-section-1031ba3af855de1580a8031f0de29293ce51d5d8 bs-section---default bs-section--common-header-with-form bs-section--common-marketo-form bs-section--common-form-sticky\"><div class=\"container\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column col-sm-12   bs-column-5f6574ebb29ac8d58ab608d2aff5b1bbe4f96332 bs-column---default\"><div class=\"bs-lottie-animator bs-lottie-animator---default\" id=\"lottie-c7d5ff8e-a115-40ae-aecb-0a84b90fe739\" data-settings=\"{&quot;desktop&quot;:{&quot;settings&quot;:{&quot;animateViewPort&quot;:0.5,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;Contact_lines1.json&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:1,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/Contact_lines1.json&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}},&quot;mobile&quot;:{&quot;breakpoint&quot;:576,&quot;settings&quot;:{&quot;animateViewPort&quot;:50,&quot;direction&quot;:1,&quot;delay&quot;:0,&quot;loop&quot;:false,&quot;fileName&quot;:&quot;&quot;,&quot;mouseOutAction&quot;:&quot;none&quot;,&quot;numberOfLoops&quot;:0,&quot;playSpeed&quot;:1,&quot;path&quot;:&quot;&quot;,&quot;scrollRelativeTo&quot;:&quot;withinSection&quot;,&quot;trigger&quot;:false,&quot;triggerMethod&quot;:&quot;pageHover&quot;}}}\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"bs-row row   bs-row---default\">\n<div class=\"bs-column  col-md-7 col-sm-0   bs-column-3d962b00decd4fef444449c96db45c42599741ec bs-column---default\">\n<p class=\"common-header__blue-text has-blue-color has-text-color\" style=\"font-size:18px;text-transform:uppercase\"><span>\ubcf4\uace0\uc11c<\/span><\/p>\n\n\n<h1 style=\"font-style:normal;font-weight:400;\" class=\"common-header__gated-page wp-block-post-title has-text-color has-black-color\">\uc5f0\ubc29 \uc815\ubd80\uc758 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc6b0\uc120\uc21c\uc704\uac00 \uc548\ubcf4 \uc804\ub7b5\uc744 \uc7ac\ud3b8\ud569\ub2c8\ub2e4<\/h1>\n\n\n<p>\ucd5c\uadfc \ubbf8\uad6d \uc5f0\ubc29 \uc0ac\uc774\ubc84\ubcf4\uc548 \ud504\ub85c\uadf8\ub7a8\uc758 \ubcc0\ud654, \ud2b9\ud788 CISA \uc608\uc0b0 \uc0ad\uac10\uacfc \uc0ac\uc774\ubc84\uc548\uc804\uc2ec\uc758\uc704\uc6d0\ud68c \ud574\uccb4\ub294 \ubbfc\uac04 \ubd80\ubb38\uc5d0 \uc0c1\ub2f9\ud55c \uc601\ud5a5\uc744 \ubbf8\uce58\uace0 \uc788\uc2b5\ub2c8\ub2e4.&nbsp;<\/p>\n\n\n\n<p>\ubbf8\uad6d\uacfc \uc601\uad6d IT \ubc0f \ubcf4\uc548 \uc758\uc0ac\uacb0\uc815\uad8c\uc790 500\uba85\uc744 \ub300\uc0c1\uc73c\ub85c \ud55c \uc124\ubb38\uc870\uc0ac\ub97c \ubc14\ud0d5\uc73c\ub85c \uc791\uc131\ub41c \uc0c8\ub85c\uc6b4 \ubcf4\uace0\uc11c\uc5d0 \ub530\ub974\uba74, \ubcf4\uc548 \ucc45\uc784\uc790\ub4e4\uc740 \uc704\ud5d8 \ub178\ucd9c \uc99d\uac00, \uac00\uc2dc\uc131 \uc800\ud558, \uc6b4\uc601 \ubd80\ub2f4 \uac00\uc911 \ub4f1\uc758 \ubb38\uc81c\uc5d0 \uc9c1\uba74\ud558\uace0 \uc788\ub294 \uac83\uc73c\ub85c \ub098\ud0c0\ub0ac\uc2b5\ub2c8\ub2e4. \uc774 \uc5f0\uad6c \ubcf4\uace0\uc11c\ub97c \ub2e4\uc6b4\ub85c\ub4dc\ud558\uc5ec \uc870\uc9c1\ub4e4\uc774 \uc774\ub7ec\ud55c \uc0c8\ub85c\uc6b4 \ud658\uacbd\uc5d0 \uc5b4\ub5bb\uac8c \uc801\uc751\ud558\uace0 \uc788\ub294\uc9c0 \uc0b4\ud3b4\ubcf4\uc138\uc694.<\/p>\n<\/div>\n\n\n\n<div class=\"bs-column  col-md-5 col-sm-0   bs-column-4e7708ec1047c5de435a1fcaa9bd912b51781ebd bs-column---default bs-column--form\">\n<div class=\"bs-div bs-div-9bea93ef98765147ecb6579716e4df158c8e6e71 bs-div---default bs-div--form-wrapper\"><div class=\"bs-div__inner\">\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1707\" action=\"\"><input type=\"hidden\" name=\"trp-form-language\" value=\"ko\"\/><\/form>\n<script>\n    var embeddedFormId = 'cda3a6fe6c745d07f8a5e5938651a0899de508b9';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1707';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1707\"><\/div>\n<!-- Incluing form response options -->\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"","protected":false},"author":43,"featured_media":49598,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"Federal cyber priorities impact report ","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[92],"resource-topic":[133],"resource-industry":[93,94,100],"blog-category":[],"class_list":["post-49597","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-reports","resource-topic-research","resource-industry-automation","resource-industry-incident-response","resource-industry-orchestration"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Federal Cyber Priorities Reshape Security Strategy | Swimlane<\/title>\n<meta name=\"description\" content=\"Shifting ground in federal cyber priorities is impacting the private sector. New report on 500 IT\/security leaders shows increased risk &amp; operational strain.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ko\/\uc790\uc6d0\/\ubcf4\uace0\uc11c\/\uc5f0\ubc29-\uc0ac\uc774\ubc84-\uc6b0\uc120\uc21c\uc704-\uc601\ud5a5-\ubcf4\uace0\uc11c\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Federal Cyber Priorities Reshape Security Strategy\" \/>\n<meta property=\"og:description\" content=\"Shifting ground in federal cyber priorities is impacting the private sector. New report on 500 IT\/security leaders shows increased risk &amp; operational strain.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ko\/\uc790\uc6d0\/\ubcf4\uace0\uc11c\/\uc5f0\ubc29-\uc0ac\uc774\ubc84-\uc6b0\uc120\uc21c\uc704-\uc601\ud5a5-\ubcf4\uace0\uc11c\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-09T10:23:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/Fab-OG.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Shifting ground in federal cyber priorities is impacting the private sector. New report on 500 IT\/security leaders shows increased risk &amp; operational strain.\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/resources\\\/reports\\\/federal-cyber-priorities-impact-report\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/resources\\\/reports\\\/federal-cyber-priorities-impact-report\\\/\",\"name\":\"Federal Cyber Priorities Reshape Security Strategy | Swimlane\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/resources\\\/reports\\\/federal-cyber-priorities-impact-report\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/resources\\\/reports\\\/federal-cyber-priorities-impact-report\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/Fab-OG.png\",\"datePublished\":\"2025-08-08T16:59:20+00:00\",\"dateModified\":\"2026-01-09T10:23:53+00:00\",\"description\":\"Shifting ground in federal cyber priorities is impacting the private sector. New report on 500 IT\\\/security leaders shows increased risk & operational strain.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/resources\\\/reports\\\/federal-cyber-priorities-impact-report\\\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/swimlane.com\\\/ko\\\/resources\\\/reports\\\/federal-cyber-priorities-impact-report\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/resources\\\/reports\\\/federal-cyber-priorities-impact-report\\\/#primaryimage\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/Fab-OG.png\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/Fab-OG.png\",\"width\":1200,\"height\":630,\"caption\":\"Swimlane banner for the 'Federal Cyber Priorities Impact Report' featuring a document cover and 'Learn More' button.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/resources\\\/reports\\\/federal-cyber-priorities-impact-report\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/swimlane.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Federal Cyber Priorities Reshape Security Strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#website\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\\\/\\\/swimlane.com\\\/wp-content\\\/uploads\\\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\\\/\\\/swimlane.com\\\/ko\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/swimlane\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/swimlane\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\uc5f0\ubc29 \uc815\ubd80\uc758 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc6b0\uc120\uc21c\uc704\uac00 \ubcf4\uc548 \uc804\ub7b5\uc744 \uc7ac\ud3b8\ud569\ub2c8\ub2e4 | \uc2a4\uc714\ub808\uc778","description":"\uc5f0\ubc29 \uc815\ubd80\uc758 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc6b0\uc120\uc21c\uc704 \ubcc0\ud654\uac00 \ubbfc\uac04 \ubd80\ubb38\uc5d0 \uc601\ud5a5\uc744 \ubbf8\uce58\uace0 \uc788\uc2b5\ub2c8\ub2e4. 500\uba85\uc758 IT\/\ubcf4\uc548 \ub9ac\ub354\ub97c \ub300\uc0c1\uc73c\ub85c \ud55c \uc0c8\ub85c\uc6b4 \ubcf4\uace0\uc11c\uc5d0 \ub530\ub974\uba74 \uc704\ud5d8 \uc99d\uac00 \ubc0f \uc6b4\uc601 \ubd80\ub2f4 \uac00\uc911\uc774 \ub098\ud0c0\ub098\uace0 \uc788\uc2b5\ub2c8\ub2e4.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ko\/\uc790\uc6d0\/\ubcf4\uace0\uc11c\/\uc5f0\ubc29-\uc0ac\uc774\ubc84-\uc6b0\uc120\uc21c\uc704-\uc601\ud5a5-\ubcf4\uace0\uc11c\/","og_locale":"ko_KR","og_type":"article","og_title":"Federal Cyber Priorities Reshape Security Strategy","og_description":"Shifting ground in federal cyber priorities is impacting the private sector. New report on 500 IT\/security leaders shows increased risk & operational strain.","og_url":"https:\/\/swimlane.com\/ko\/\uc790\uc6d0\/\ubcf4\uace0\uc11c\/\uc5f0\ubc29-\uc0ac\uc774\ubc84-\uc6b0\uc120\uc21c\uc704-\uc601\ud5a5-\ubcf4\uace0\uc11c\/","og_site_name":"AI Security Automation","article_modified_time":"2026-01-09T10:23:53+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/Fab-OG.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_description":"Shifting ground in federal cyber priorities is impacting the private sector. New report on 500 IT\/security leaders shows increased risk & operational strain.","twitter_site":"@swimlane","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"1\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ko\/resources\/reports\/federal-cyber-priorities-impact-report\/","url":"https:\/\/swimlane.com\/ko\/resources\/reports\/federal-cyber-priorities-impact-report\/","name":"\uc5f0\ubc29 \uc815\ubd80\uc758 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc6b0\uc120\uc21c\uc704\uac00 \ubcf4\uc548 \uc804\ub7b5\uc744 \uc7ac\ud3b8\ud569\ub2c8\ub2e4 | \uc2a4\uc714\ub808\uc778","isPartOf":{"@id":"https:\/\/swimlane.com\/ko\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ko\/resources\/reports\/federal-cyber-priorities-impact-report\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ko\/resources\/reports\/federal-cyber-priorities-impact-report\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Fab-OG.png","datePublished":"2025-08-08T16:59:20+00:00","dateModified":"2026-01-09T10:23:53+00:00","description":"\uc5f0\ubc29 \uc815\ubd80\uc758 \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc6b0\uc120\uc21c\uc704 \ubcc0\ud654\uac00 \ubbfc\uac04 \ubd80\ubb38\uc5d0 \uc601\ud5a5\uc744 \ubbf8\uce58\uace0 \uc788\uc2b5\ub2c8\ub2e4. 500\uba85\uc758 IT\/\ubcf4\uc548 \ub9ac\ub354\ub97c \ub300\uc0c1\uc73c\ub85c \ud55c \uc0c8\ub85c\uc6b4 \ubcf4\uace0\uc11c\uc5d0 \ub530\ub974\uba74 \uc704\ud5d8 \uc99d\uac00 \ubc0f \uc6b4\uc601 \ubd80\ub2f4 \uac00\uc911\uc774 \ub098\ud0c0\ub098\uace0 \uc788\uc2b5\ub2c8\ub2e4.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ko\/resources\/reports\/federal-cyber-priorities-impact-report\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ko\/resources\/reports\/federal-cyber-priorities-impact-report\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/resources\/reports\/federal-cyber-priorities-impact-report\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Fab-OG.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Fab-OG.png","width":1200,"height":630,"caption":"Swimlane banner for the 'Federal Cyber Priorities Impact Report' featuring a document cover and 'Learn More' button."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ko\/resources\/reports\/federal-cyber-priorities-impact-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Federal Cyber Priorities Reshape Security Strategy"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ko\/#website","url":"https:\/\/swimlane.com\/ko\/","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","description":"\ubaa8\ub4e0 \ubcf4\uc548 \uae30\ub2a5\uc744 \uc704\ud55c \uc5d0\uc774\uc804\ud2b8 \uae30\ubc18 AI \uc790\ub3d9\ud654","publisher":{"@id":"https:\/\/swimlane.com\/ko\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ko\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ko\/#organization","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","url":"https:\/\/swimlane.com\/ko\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/49597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/users\/43"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/49597\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media\/49598"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media?parent=49597"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/tags?post=49597"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-type?post=49597"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-topic?post=49597"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-industry?post=49597"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/blog-category?post=49597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}