{"id":51017,"date":"2025-10-07T14:09:09","date_gmt":"2025-10-07T20:09:09","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=51017"},"modified":"2025-12-16T23:59:45","modified_gmt":"2025-12-17T06:59:45","slug":"ai-%ec%97%90%ec%9d%b4%ec%a0%84%ed%8a%b8","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ko\/blog\/ai-agents\/","title":{"rendered":"AI \uc5d0\uc774\uc804\ud2b8\uc758 \ub354 \ub098\uc740 \ucc9c\uc0ac\ub4e4"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-56.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Enterprise cityscape masthead representing global connectivity and secure digital infrastructure.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-56.jpg 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-56-300x178.jpg 300w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-56-1024x609.jpg 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-56-768x457.jpg 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2025-10-07T14:09:09-06:00\">10\uc6d4 7, 2025<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Better Angels of AI Agents<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ko\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">5 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ko\/blog\/ai-agents\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ko\/blog\/ai-agents\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Better%20Angels%20of%20AI%20Agents').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fai-agents%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Better%20Angels%20of%20AI%20Agents%3A%20Ethical%20Cybersecurity&url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fai-agents%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fai-agents%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Fai-agents%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2 class=\"wp-block-heading\" id=\"h-better-angels-of-ai-agents-ethical-cybersecurity-in-autonomous-systems-nbsp\">Better Angels of AI Agents: Ethical Cybersecurity in Autonomous Systems&nbsp;<\/h2>\n\n\n\n<div class=\"bs-div bs-div-8d5175a48f2cd3ca3bdd0365063b72cdbcca3051 bs-div---default bs-div--blog-inner-light\"><div class=\"bs-div__inner     \">\n<h4 class=\"wp-block-heading\" id=\"h-what-is-an-ai-agent\">What is an AI Agent?<\/h4>\n\n\n\n<p><em>A goal-driven software entity that an organization has granted the right to act on its behalf to autonomously make decisions and take actions. These entities use AI techniques, combined with components like memory, planning, tooling, and guardrails, to complete tasks and achieve objectives with minimal human supervision.<\/em><\/p>\n<\/div><\/div>\n\n\n\n<p>The hum of servers, the flicker of screens, the relentless march of technological progress \u2013 it can feel as though we are hurtling into a future shaped by forces beyond our control. Yet, as we stand on the precipice of the AI agent revolution, we have a profound opportunity to steer its course. This isn&#8217;t just about building smarter machines; it&#8217;s about invoking what Abraham Lincoln famously called &#8220;the better angels of our nature,&#8221; those nobler impulses that guide us toward cooperation, empathy, and collective good. Just as Steven Pinker meticulously detailed how humanity has, over millennia, increasingly embraced its better angels to reduce violence and elevate reason, we must now consciously imbue our autonomous AI agents with the very same principles, thereby reducing costly errors and cybersecurity risks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Rise of Autonomous Intelligence: A New Chapter in Cybersecurity Progress<\/h2>\n\n\n\n<p>Imagine a world where your AI agent proactively manages your complex cybersecurity projects, not just reminding you of deadlines, but analyzing security data, delegating incident response tasks to other agents, and even drafting initial threat reports \u2013 all while you focus on the creative, strategic core of your security operations.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Promise of AI Agents&nbsp;<\/h3>\n\n\n\n<p>This isn&#8217;t a distant fantasy; it&#8217;s the promise of AI agents. Unlike reactive AI tools that simply respond to your commands, these are autonomous AI entities capable of understanding security goals, planning multi-step solutions for threat detection and response, learning from their environment, and executing actions with minimal human intervention. They are, in essence, digital apprentices, capable of evolving into trusted partners in the<a href=\"https:\/\/swimlane.com\/blog\/what-is-a-security-operations-center-soc\/\"> Security Operations Center (SOC)<\/a>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The Future of AI: A Shift from Passive to Proactive Agents&nbsp;&nbsp;<\/h3>\n\n\n\n<p>This shift from passive tools to proactive collaborators represents a monumental leap. It\u2019s like moving from a calculator (reactive) to a cybersecurity analyst (proactive), but with vastly greater scope and capability. The future of AI is intrinsically linked to the development of these agents, promising to redefine security operations, accelerate threat intelligence, and personalize defense strategies in ways we&#8217;re only beginning to fathom.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Ethical Imperative: Nurturing Our &#8220;Better Angels&#8221; in Code for Cybersecurity<\/h2>\n\n\n\n<p>However, with immense power comes immense responsibility. Just as Pinker illustrates how societal mechanisms like justice systems and commerce have amplified our better angels, we must design similar &#8220;mechanisms&#8221; into our AI agents for cybersecurity.&nbsp;<\/p>\n\n\n\n<p>Without a deliberate, human-centered approach, these powerful tools could inadvertently amplify our lesser angels, biases in threat detection, inefficiencies in incident response, and even unintended harm through misconfigurations or false positives. This is where the concept of ethical AI principles becomes not just theoretical, but absolutely critical for the development of AI agents in the cybersecurity domain.<\/p>\n\n\n\n<p>Consider the &#8220;sympathy&#8221; Pinker describes as one of humanity\u2019s better angels, as our capacity for empathy and care. How do we instill a digital equivalent in an AI agent operating in a SOC? It begins with:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Transparency and Accountability: Building Interpretable AI for Security&nbsp;<\/h3>\n\n\n\n<p>If an AI agent makes a decision that impacts an organization&#8217;s security posture or a significant incident response, we must understand <em>why<\/em> and <em>how<\/em> it arrived at that decision. This isn&#8217;t just about logging data; it&#8217;s about building interpretable AI systems where the logic behind threat assessments and mitigation actions is accessible and auditable by human analysts.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Human-in-the-Loop Design: The Essential Role of Human Oversight&nbsp;<\/h3>\n\n\n\n<p>Even the most sophisticated AI agents in a SOC need a watchful guardian. Just as Pinker argues that reason allows us to step back from impulsive actions, human oversight provides the necessary &#8220;pause button&#8221; and moral compass for autonomous security systems. We must design interfaces that allow for easy intervention, course correction, and the ultimate authority of human judgment in critical security decisions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Fairness and Bias Mitigation: Crafting Responsible AI in Cybersecurity&nbsp;<\/h3>\n\n\n\n<p>Our digital world is riddled with historical biases in data, and if not meticulously addressed, these biases will be ingested and amplified by AI agents learning from existing threat intelligence or security logs. Crafting responsible<a href=\"https:\/\/swimlane.com\/blog\/how-is-ai-used-in-cybersecurity\/\"> AI in cybersecurity<\/a> involves proactively identifying and mitigating these biases, ensuring that agents consider all systems and users with equitable fairness, and do not unfairly target specific groups or applications.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Purpose-Driven Development: Directing AI Capabilities for the Greater Good&nbsp;<\/h2>\n\n\n\n<p>We must consciously direct the incredible capabilities of these agents toward the greater good of cybersecurity. This means fostering AI for good initiatives within security, designing agents that tackle complex global challenges such as ransomware, advanced persistent threats, and protecting critical infrastructure. Imagine AI agents optimizing threat hunting in real-time or accelerating the discovery of new vulnerabilities.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Practical Steps for a Human-Centered AI Approach in Cybersecurity<\/h2>\n\n\n\n<p>Embracing the &#8220;better angels&#8221; of AI agents isn\u2019t a passive hope; it\u2019s an active endeavor requiring collaboration across disciplines in cybersecurity.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>For Developers and Companies:<\/strong> The responsibility begins at the drawing board. We must embed ethical frameworks into the very architecture of AI agent development for security. This includes rigorous testing for unintended consequences in automated responses, prioritizing robust security to prevent misuse or compromise of the agents themselves, and creating intuitive control interfaces that empower security analysts rather than intimidate them.<\/li>\n\n\n\n<li><strong>For Regulators and Policymakers:<\/strong> The global nature of cyber threats and AI demands international cooperation. Flexible yet firm AI governance frameworks are essential, encouraging innovation in security solutions while safeguarding against risks posed by autonomous systems. Investing in AI safety research is crucial, as it entails exploring technical solutions as well as examines the societal implications of widespread autonomous security systems.<\/li>\n\n\n\n<li><strong>For Users and the Public:<\/strong> Our role is to be informed and engaged. We must demand transparency and control over the AI agents we interact with, understanding their limitations and advocating for their ethical deployment in protecting our digital lives. Our collective voice can shape the direction of this technology.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">A Call to Conscious AI and Human Coexistence in Cybersecurity<\/h2>\n\n\n\n<p>The &#8220;better angels of our nature,&#8221; as Pinker so eloquently argues, are powerful forces that have slowly but surely guided humanity towards a more peaceful and prosperous existence. Now, as we stand at the threshold of the AI agent era in cybersecurity, we have a profound opportunity, and indeed a moral obligation, to imbue these powerful new entities with the same noble impulses.<\/p>\n\n\n\n<p>The future of AI agents in cybersecurity is not pre-ordained. It is a canvas upon which we, as designers, policymakers, and security professionals, will paint. Let us choose to paint a future where human-centered AI is not just a buzzword, but a guiding philosophy. A future where AI agents are intelligent and also wise in their security decisions; not just efficient in threat response, but also ethical in their operations. Let us consciously choose to build agents that reflect our deepest values, amplifying human potential in the SOC and working tirelessly towards a future shaped by our very own &#8220;better angels.&#8221;<\/p>\n\n\n\n<div class=\"bs-div bs-div-7057d3feda8e1a802f9ebad8b3ebc05c083315db bs-div---default bs-div--blog-inner-light\"><div class=\"bs-div__inner     \">\n<h4 class=\"wp-block-heading\" id=\"h-tl-dr\" style=\"font-size:26px\">TL;DR<\/h4>\n\n\n\n<p>The transition to autonomous AI agents in cybersecurity requires consciously embedding ethical principles (&#8220;better angels&#8221;), specifically, transparency, human oversight, and bias mitigation to ensure they are trustworthy.&nbsp;<\/p>\n\n\n\n<p>This human-centered approach transforms AI agents from mere tools into reliable, ethical partners, ensuring security teams can confidently deploy truly responsible agents.<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"bs-div bs-div-004dbdb6f7a3eb2452215b683cfa0266c7f7a210 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-004dbdb6f7a3eb2452215b683cfa0266c7f7a210 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/OG-2025-SANS-Survey-AI-Security.png' class='img-fluid'   alt='2025 SANS AI Security Survey graphic highlighting key findings on AI use in cybersecurity.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-191e88acf993b1553fe70cae2a5b4937149b9abf bs-div---default\"><div class=\"bs-div__inner     \">\n<p><strong>Report<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">SANS 2025 AI Survey: AI\u2019s Impact on Security Three Years Later<\/h2>\n\n\n\n<p>Generative AI (GenAI) and large language models (LLMs) are already here, shaping the cybersecurity landscape.&nbsp;<\/p>\n\n\n\n<p>The 2025 SANS AI Survey, authored by Ahmed Abugharbia and Brandon Evans, examines how organizations are currently utilizing GenAI for security and identifies the problems and threats posed by these new technologies.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-8511573263de9ea9a7da8a87b1c2e2d0edb4c7ba\"><style>.bs-pro-button-p-btn-8511573263de9ea9a7da8a87b1c2e2d0edb4c7ba .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/reports\/sans-ai-security-survey\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download Report<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/ko\/tag\/ai\/'><span class='tag-content'>AI<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-685a1b01df94aa255c335d03b57561a286e387aa bs-div---default bs-div--related-posts bs-div--right-sticky-related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-resources\">Related Resources<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d13cfed209b bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/global-soc-survey-insights\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__title\">\n        <h5>2025 SANS SOC Survey Insights: Why AI Automation is Non-Negotiable<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t\n\n\t\t\t\t\t<div class=\"bs-post bs-post-69d13cfed3612 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/resources\/webinar-ai-reality-check\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__title\">\n        <h5>AI Reality Check: CISO\u2019s Unpack its Role in Cybersecurity<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Watch Now<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d13cfed4a8b bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/hero-ai-model-updates\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__title\">\n        <h5>Elevated Intelligence: Hero AI Now Powered by 3x Larger Model<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"bs-div bs-div-7a5be0abd58610f08cf9c9d564fee477ee90844a bs-div---default bs-div--blog-inner-single-post\"><div class=\"bs-div__inner     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d13cfed6195 bs-single-post---default bs-single-post--home-resources-alt enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/resources\/reports\/sans-ai-security-survey\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class='bs-post__image'>\n                            <figure class='figure'>\n                                <img src='https:\/\/swimlane.com\/wp-content\/uploads\/OG-2025-SANS-Survey-AI-Security-1.png' class='img-fluid' alt='SANS AI Security Survey ' title='OG 2025 SANS Survey AI Security'   \/>\n                                <figcaption class='figure-caption'><\/figcaption>\n                            <\/figure>\n                        <\/div><div class=\"bs-post__details\">    <div class=\"bs-post__title\">\n        <h5>SANS 2025 AI Survey: AI\u2019s Impact on Security Three Years Later<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":51021,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":51020,"learn_more_label":"","image_alt_text":"Better Angels of AI Agents: Ethical Cybersecurity","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[202],"resource-type":[67],"resource-topic":[215],"resource-industry":[],"blog-category":[],"class_list":["post-51017","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-ai","resource-type-blogs","resource-topic-ai"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Better Angels of AI Agents: Ethical Cybersecurity<\/title>\n<meta name=\"description\" content=\"Discover how AI agents are shaping ethical cybersecurity. Learn why human-centered design, governance, &amp; responsible AI matter for digital defense.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/ai-\uc5d0\uc774\uc804\ud2b8\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Better Angels of AI Agents: Ethical Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Discover how AI agents are shaping ethical cybersecurity. Learn why human-centered design, governance, &amp; responsible AI matter for digital defense.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/ai-\uc5d0\uc774\uc804\ud2b8\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-17T06:59:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-35.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Better Angels of AI Agents: Ethical Cybersecurity\" \/>\n<meta name=\"twitter:description\" content=\"Discover how AI agents are shaping ethical cybersecurity. Learn why human-centered design, governance, &amp; responsible AI matter for digital defense.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-35.jpg\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"7\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ai-agents\/\",\"url\":\"https:\/\/swimlane.com\/ko\/blog\/ai-agents\/\",\"name\":\"Better Angels of AI Agents: Ethical Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ai-agents\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ai-agents\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-56.jpg\",\"datePublished\":\"2025-10-07T20:09:09+00:00\",\"dateModified\":\"2025-12-17T06:59:45+00:00\",\"description\":\"Discover how AI agents are shaping ethical cybersecurity. Learn why human-centered design, governance, & responsible AI matter for digital defense.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ai-agents\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/ko\/blog\/ai-agents\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ai-agents\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-56.jpg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-56.jpg\",\"width\":1120,\"height\":666,\"caption\":\"Enterprise cityscape masthead representing global connectivity and secure digital infrastructure.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/ai-agents\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Better Angels of AI Agents\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/ko\/#website\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/ko\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI \uc5d0\uc774\uc804\ud2b8\uc758 \ub354 \ub098\uc740 \ud65c\uc6a9\ubc95: \uc724\ub9ac\uc801 \uc0ac\uc774\ubc84 \ubcf4\uc548","description":"AI \uc5d0\uc774\uc804\ud2b8\uac00 \uc724\ub9ac\uc801 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc744 \uc5b4\ub5bb\uac8c \ubcc0\ud654\uc2dc\ud0a4\uace0 \uc788\ub294\uc9c0 \uc54c\uc544\ubcf4\uc138\uc694. \ub514\uc9c0\ud138 \ubc29\uc5b4\uc5d0 \uc788\uc5b4 \uc778\uac04 \uc911\uc2ec \uc124\uacc4, \uac70\ubc84\ub10c\uc2a4 \ubc0f \ucc45\uc784 \uc788\ub294 AI\uac00 \uc911\uc694\ud55c \uc774\uc720\ub97c \ubc30\uc6b0\uc2ed\uc2dc\uc624.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/ai-\uc5d0\uc774\uc804\ud2b8\/","og_locale":"ko_KR","og_type":"article","og_title":"Better Angels of AI Agents: Ethical Cybersecurity","og_description":"Discover how AI agents are shaping ethical cybersecurity. Learn why human-centered design, governance, & responsible AI matter for digital defense.","og_url":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/ai-\uc5d0\uc774\uc804\ud2b8\/","og_site_name":"AI Security Automation","article_modified_time":"2025-12-17T06:59:45+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-35.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Better Angels of AI Agents: Ethical Cybersecurity","twitter_description":"Discover how AI agents are shaping ethical cybersecurity. Learn why human-centered design, governance, & responsible AI matter for digital defense.","twitter_image":"https:\/\/swimlane.com\/wp-content\/uploads\/AutomationSocialTile-35.jpg","twitter_site":"@swimlane","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"7\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ko\/blog\/ai-agents\/","url":"https:\/\/swimlane.com\/ko\/blog\/ai-agents\/","name":"AI \uc5d0\uc774\uc804\ud2b8\uc758 \ub354 \ub098\uc740 \ud65c\uc6a9\ubc95: \uc724\ub9ac\uc801 \uc0ac\uc774\ubc84 \ubcf4\uc548","isPartOf":{"@id":"https:\/\/swimlane.com\/ko\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ko\/blog\/ai-agents\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ko\/blog\/ai-agents\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-56.jpg","datePublished":"2025-10-07T20:09:09+00:00","dateModified":"2025-12-17T06:59:45+00:00","description":"AI \uc5d0\uc774\uc804\ud2b8\uac00 \uc724\ub9ac\uc801 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc744 \uc5b4\ub5bb\uac8c \ubcc0\ud654\uc2dc\ud0a4\uace0 \uc788\ub294\uc9c0 \uc54c\uc544\ubcf4\uc138\uc694. \ub514\uc9c0\ud138 \ubc29\uc5b4\uc5d0 \uc788\uc5b4 \uc778\uac04 \uc911\uc2ec \uc124\uacc4, \uac70\ubc84\ub10c\uc2a4 \ubc0f \ucc45\uc784 \uc788\ub294 AI\uac00 \uc911\uc694\ud55c \uc774\uc720\ub97c \ubc30\uc6b0\uc2ed\uc2dc\uc624.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ko\/blog\/ai-agents\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ko\/blog\/ai-agents\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/blog\/ai-agents\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-56.jpg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/Masthead-56.jpg","width":1120,"height":666,"caption":"Enterprise cityscape masthead representing global connectivity and secure digital infrastructure."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ko\/blog\/ai-agents\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Better Angels of AI Agents"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ko\/#website","url":"https:\/\/swimlane.com\/ko\/","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","description":"\ubaa8\ub4e0 \ubcf4\uc548 \uae30\ub2a5\uc744 \uc704\ud55c \uc5d0\uc774\uc804\ud2b8 \uae30\ubc18 AI \uc790\ub3d9\ud654","publisher":{"@id":"https:\/\/swimlane.com\/ko\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ko\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ko\/#organization","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","url":"https:\/\/swimlane.com\/ko\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/51017","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/51017\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media\/51021"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media?parent=51017"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/tags?post=51017"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-type?post=51017"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-topic?post=51017"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-industry?post=51017"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/blog-category?post=51017"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}