{"id":24022,"date":"2025-11-17T11:01:15","date_gmt":"2025-11-17T11:01:15","guid":{"rendered":"https:\/\/itbusinesstoday.com\/?p=24022"},"modified":"2025-11-17T11:01:15","modified_gmt":"2025-11-17T11:01:15","slug":"cybereason-launches-its-new-vulnerability-management-tool","status":"publish","type":"post","link":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/cybereason-launches-its-new-vulnerability-management-tool\/","title":{"rendered":"Cybereason\u3001\u65b0\u3057\u3044\u8106\u5f31\u6027\u7ba1\u7406\u30c4\u30fc\u30eb\u3092\u767a\u8868"},"content":{"rendered":"<p>\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30b0\u30ed\u30fc\u30d0\u30eb\u30ea\u30fc\u30c0\u30fc\u3067\u3042\u308bCybereason\u306f\u3001\u65b0\u3057\u3044\u8106\u5f31\u6027\u7ba1\u7406\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u300cCybereason Vulnerability Management\u300d\u3092\u767a\u8868\u3057\u307e\u3057\u305f\u3002\u3053\u306e\u5f37\u529b\u306a\u65b0\u6a5f\u80fd\u306f\u3001Cybereason Endpoint Detection and Response (EDR)\u306b\u30b7\u30fc\u30e0\u30ec\u30b9\u306b\u7d71\u5408\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u65b0\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306f\u3001\u30c7\u30d0\u30a4\u30b9\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u8106\u5f31\u6027\u3092\u7d99\u7d9a\u7684\u304b\u3064\u81ea\u52d5\u7684\u306b\u8a55\u4fa1\u3059\u308b\u3053\u3068\u3067\u3001\u653b\u6483\u5bfe\u8c61\u9818\u57df\u3092\u7a4d\u6975\u7684\u306b\u524a\u6e1b\u3057\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4f53\u5236\u306e\u5f37\u5316\u3092\u652f\u63f4\u3059\u308b\u3088\u3046\u8a2d\u8a08\u3055\u308c\u3066\u3044\u307e\u3059\u3002.<\/p>\n<p>Cybereason Vulnerability Management\u306f\u3001\u7d44\u7e54\u306e\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u4fdd\u8b77\u3092\u3001\u5358\u306a\u308b\u8105\u5a01\u306e\u691c\u77e5\u304b\u3089\u30d7\u30ed\u30a2\u30af\u30c6\u30a3\u30d6\u306a\u30ea\u30b9\u30af\u8efd\u6e1b\u3078\u3068\u62e1\u5f35\u3057\u307e\u3059\u3002\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u4e0a\u306e\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u3092\u7d99\u7d9a\u7684\u306b\u8a55\u4fa1\u3057\u3001\u65e2\u77e5\u306e\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u8106\u5f31\u6027\uff08CVE\uff09\u3092\u7279\u5b9a\u3057\u3001\u6b63\u78ba\u3067\u5b9f\u7528\u7684\u306a\u30d1\u30c3\u30c1\u9069\u7528\u63a8\u5968\u4e8b\u9805\u3092\u63d0\u4f9b\u3059\u308b\u3053\u3068\u3067\u3001\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3001IT\u904b\u7528\u3001\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u306e\u5404\u30c1\u30fc\u30e0\u306f\u3001\u653b\u6483\u8005\u306b\u5f31\u70b9\u3092\u7a81\u304b\u308c\u308b\u524d\u306b\u5f31\u70b9\u3092\u628a\u63e1\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002.<\/p>\n<h4>\u7d71\u5408\u3055\u308c\u305f\u30d7\u30ed\u30a2\u30af\u30c6\u30a3\u30d6\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a2\u30d7\u30ed\u30fc\u30c1<\/h4>\n<p>\u3053\u306e\u65b0\u3057\u3044\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306f\u3001\u8106\u5f31\u6027\u7ba1\u7406\u3092Cybereason EDR\u306b\u76f4\u63a5\u7d71\u5408\u3059\u308b\u3053\u3068\u3067\u3001\u30c4\u30fc\u30eb\u306e\u4e71\u7acb\u3068\u3044\u3046\u8ab2\u984c\u306b\u5bfe\u51e6\u3057\u307e\u3059\u3002\u8907\u96d1\u3055\u3068\u30aa\u30fc\u30d0\u30fc\u30d8\u30c3\u30c9\u3092\u8ffd\u52a0\u3059\u308b\u30b9\u30bf\u30f3\u30c9\u30a2\u30ed\u30f3\u306e\u8106\u5f31\u6027\u30b9\u30ad\u30e3\u30ca\u3068\u306f\u7570\u306a\u308a\u3001\u3053\u306e\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306f\u540c\u3058\u8efd\u91cf\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u3068\u7ba1\u7406\u30b3\u30f3\u30bd\u30fc\u30eb\u3092\u6d3b\u7528\u3057\u3001\u30a2\u30af\u30c6\u30a3\u30d6\u306a\u8105\u5a01\u3068\u6f5c\u5728\u7684\u306a\u8106\u5f31\u6027\u306e\u4e21\u65b9\u3092\u5358\u4e00\u306e\u30ac\u30e9\u30b9\u30da\u30a4\u30f3\u3067\u7d71\u5408\u7684\u306b\u53ef\u8996\u5316\u3057\u307e\u3059\u3002.<\/p>\n<h4>\u3053\u3061\u3089\u3082\u304a\u8aad\u307f\u304f\u3060\u3055\u3044\uff1a <a class=\"p-url\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/hitachi-and-radware-unveil-ai-powered-web-ddos-defense\/\" rel=\"bookmark\">\u65e5\u7acb\u3068\u30e9\u30c9\u30a6\u30a7\u30a2\u3001AI\u3092\u6d3b\u7528\u3057\u305fWeb DDoS\u9632\u5fa1\u3092\u767a\u8868<\/a><\/h4>\n<p>\u3053\u306e\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306f\u3001Cybereason\u30bb\u30f3\u30b5\u30fc\u304c\u30a4\u30f3\u30b9\u30c8\u30fc\u30eb\u3055\u308c\u305f\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u304b\u3089\u30e1\u30bf\u30c7\u30fc\u30bf\u3092\u7d99\u7d9a\u7684\u306b\u53ce\u96c6\u3059\u308b\u3053\u3068\u3067\u6a5f\u80fd\u3057\u307e\u3059\u3002\u3053\u306e\u30c7\u30fc\u30bf\u306f\u3001\u5805\u7262\u3067\u7d99\u7d9a\u7684\u306b\u66f4\u65b0\u3055\u308c\u308b\u8106\u5f31\u6027\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\u3068\u6bd4\u8f03\u3055\u308c\u307e\u3059\u3002\u4e00\u81f4\u3059\u308b\u8106\u5f31\u6027\u304c\u898b\u3064\u304b\u308b\u3068\u3001\u30b7\u30b9\u30c6\u30e0\u306f\u8106\u5f31\u6027\u306b\u30d5\u30e9\u30b0\u3092\u7acb\u3066\u3001Cybereason Defense Platform\u30b3\u30f3\u30bd\u30fc\u30eb\u5185\u3067\u512a\u5148\u9806\u4f4d\u4ed8\u3051\u3055\u308c\u305f\u8a73\u7d30\u306a\u30ac\u30a4\u30c0\u30f3\u30b9\u3092\u63d0\u4f9b\u3057\u307e\u3059\u3002.<\/p>\n<p><a href=\"https:\/\/www.cybereason.co.jp\/\">\u30b5\u30a4\u30d9\u30ea\u30a2\u30f3<\/a> \u306f\u3001\u7c73\u56fd\u306b\u672c\u793e\u3092\u7f6e\u304d\u300140\u30ab\u56fd\u4ee5\u4e0a\u306b\u9867\u5ba2\u3092\u6301\u3064\u975e\u4e0a\u5834\u306e\u56fd\u969b\u4f01\u696d\u3067\u3059\u3002XDR\u3001EDR\u3001EPP\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3001MDR\u30b5\u30fc\u30d3\u30b9\u306a\u3069\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30fc\u30d3\u30b9\u3092\u63d0\u4f9b\u3057\u3001\u30a8\u30f3\u30c9\u30dd\u30a4\u30f3\u30c8\u3084\u30af\u30e9\u30a6\u30c9\u3092\u542b\u3080\u4f01\u696d\u306e\u30a8\u30b3\u30b7\u30b9\u30c6\u30e0\u5168\u4f53\u3092\u6a19\u7684\u3068\u3057\u305f\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306b\u7d42\u6b62\u7b26\u3092\u6253\u3063\u3066\u3044\u307e\u3059\u3002.<\/p>\n<p><strong>\u30bd\u30fc\u30b9 <a href=\"https:\/\/prtimes.jp\/main\/html\/rd\/p\/000000073.000088140.html\">PR\u30bf\u30a4\u30e0\u30ba<\/a><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Cybereason, a global cybersecurity leader, launched its new vulnerability management solution, Cybereason Vulnerability Management. This powerful new capability is seamlessly integrated into Cybereason Endpoint Detection and Response (EDR). The new solution is designed to help organizations proactively reduce their attack surface and strengthen their security posture by continuously and automatically assessing device software vulnerabilities. Cybereason Vulnerability Management extends an organization&#8217;s endpoint protection from purely reactive threat detection to proactive risk mitigation. It continuously assesses applications on endpoints, identifies known software vulnerabilities (CVEs), and provides accurate, actionable patching recommendations, enabling information security, IT operations, and compliance teams to understand their weaknesses before attackers exploit them. An integrated, proactive security approach This [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":24023,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"wprm-recipe-roundup-name":"","wprm-recipe-roundup-description":"","postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[208,184,211,237,206,85],"tags":[3567,110,1696,3154,9214],"ppma_author":[205],"class_list":{"0":"post-24022","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apac","8":"category-cybersecurity","9":"category-japan","10":"category-news","11":"category-regional","12":"category-tech","13":"tag-cybereason","14":"tag-cybersecurity","15":"tag-endpoint-security","16":"tag-ransomware","17":"tag-vulnerability-management"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybereason debuts \u201cVulnerability Management\u201d solution<\/title>\n<meta name=\"description\" content=\"Cybereason launches a new vulnerability management solution integrated with its EDR platform, helping cut risk and enhance security posture.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/cybereason-launches-its-new-vulnerability-management-tool\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybereason debuts \u201cVulnerability Management\u201d solution\" \/>\n<meta property=\"og:description\" content=\"Cybereason launches a new vulnerability management solution integrated with its EDR platform, helping cut risk and enhance security posture.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/cybereason-launches-its-new-vulnerability-management-tool\/\" \/>\n<meta property=\"og:site_name\" content=\"itbusinesstoday\" \/>\n<meta property=\"article:published_time\" content=\"2025-11-17T11:01:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/11\/Cybereason-launches-vulnerability-management-solution.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"NewsDesk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"NewsDesk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u5206\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybereason\u3001\u300c\u8106\u5f31\u6027\u7ba1\u7406\u300d\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3092\u767a\u8868","description":"Cybereason\u306f\u3001EDR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3068\u7d71\u5408\u3057\u305f\u65b0\u3057\u3044\u8106\u5f31\u6027\u7ba1\u7406\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3092\u767a\u8868\u3057\u3001\u30ea\u30b9\u30af\u524a\u6e1b\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u614b\u52e2\u306e\u5f37\u5316\u3092\u652f\u63f4\u3057\u307e\u3059\u3002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/cybereason-launches-its-new-vulnerability-management-tool\/","og_locale":"ja_JP","og_type":"article","og_title":"Cybereason debuts \u201cVulnerability Management\u201d solution","og_description":"Cybereason launches a new vulnerability management solution integrated with its EDR platform, helping cut risk and enhance security posture.","og_url":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/cybereason-launches-its-new-vulnerability-management-tool\/","og_site_name":"itbusinesstoday","article_published_time":"2025-11-17T11:01:15+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/11\/Cybereason-launches-vulnerability-management-solution.webp","type":"image\/webp"}],"author":"NewsDesk","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"NewsDesk","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"2\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/cybereason-launches-its-new-vulnerability-management-tool\/#article","isPartOf":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/cybereason-launches-its-new-vulnerability-management-tool\/"},"author":{"name":"NewsDesk","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/d58d81f55e8acd257ab63d49fb4ea812"},"headline":"Cybereason launches its new Vulnerability Management tool","datePublished":"2025-11-17T11:01:15+00:00","mainEntityOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/cybereason-launches-its-new-vulnerability-management-tool\/"},"wordCount":274,"publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/cybereason-launches-its-new-vulnerability-management-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/11\/Cybereason-launches-vulnerability-management-solution.webp","keywords":["Cybereason","cybersecurity","Endpoint Security","Ransomware","vulnerability management"],"articleSection":["APAC","Cybersecurity","Japan","News","Regional","Tech"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/cybereason-launches-its-new-vulnerability-management-tool\/","url":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/cybereason-launches-its-new-vulnerability-management-tool\/","name":"Cybereason\u3001\u300c\u8106\u5f31\u6027\u7ba1\u7406\u300d\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3092\u767a\u8868","isPartOf":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/cybereason-launches-its-new-vulnerability-management-tool\/#primaryimage"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/cybereason-launches-its-new-vulnerability-management-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/11\/Cybereason-launches-vulnerability-management-solution.webp","datePublished":"2025-11-17T11:01:15+00:00","description":"Cybereason\u306f\u3001EDR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3068\u7d71\u5408\u3057\u305f\u65b0\u3057\u3044\u8106\u5f31\u6027\u7ba1\u7406\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3092\u767a\u8868\u3057\u3001\u30ea\u30b9\u30af\u524a\u6e1b\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u614b\u52e2\u306e\u5f37\u5316\u3092\u652f\u63f4\u3057\u307e\u3059\u3002.","breadcrumb":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/cybereason-launches-its-new-vulnerability-management-tool\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/cybereason-launches-its-new-vulnerability-management-tool\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/cybereason-launches-its-new-vulnerability-management-tool\/#primaryimage","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/11\/Cybereason-launches-vulnerability-management-solution.webp","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/11\/Cybereason-launches-vulnerability-management-solution.webp","width":1200,"height":800,"caption":"Cybereason"},{"@type":"BreadcrumbList","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/cybereason-launches-its-new-vulnerability-management-tool\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itbusinesstoday.com\/"},{"@type":"ListItem","position":2,"name":"Cybereason launches its new Vulnerability Management tool"}]},{"@type":"WebSite","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","description":"","publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","width":663,"height":275,"caption":"itbusinesstoday"},"image":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/d58d81f55e8acd257ab63d49fb4ea812","name":"\u30cb\u30e5\u30fc\u30b9\u30c7\u30b9\u30af","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png74f313ad3d6fa27a1eee85c30be63d03","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png","caption":"NewsDesk"},"sameAs":["https:\/\/itbusinesstoday.com"],"url":"https:\/\/itbusinesstoday.com\/ja\/author\/newsdesk\/"}]}},"authors":[{"term_id":205,"user_id":4,"is_guest":0,"slug":"newsdesk","display_name":"NewsDesk","avatar_url":{"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png","url2x":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/24022","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/comments?post=24022"}],"version-history":[{"count":2,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/24022\/revisions"}],"predecessor-version":[{"id":24041,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/24022\/revisions\/24041"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media\/24023"}],"wp:attachment":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media?parent=24022"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/categories?post=24022"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/tags?post=24022"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/ppma_author?post=24022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}