{"id":25676,"date":"2025-12-22T11:22:13","date_gmt":"2025-12-22T11:22:13","guid":{"rendered":"https:\/\/itbusinesstoday.com\/?p=25676"},"modified":"2025-12-22T11:22:13","modified_gmt":"2025-12-22T11:22:13","slug":"asset-patrol-steps-into-a-security-problem-most-companies-pretend-is-under-control","status":"publish","type":"post","link":"https:\/\/itbusinesstoday.com\/ja\/quick-reads\/asset-patrol-steps-into-a-security-problem-most-companies-pretend-is-under-control\/","title":{"rendered":"\u30a2\u30bb\u30c3\u30c8\u30d1\u30c8\u30ed\u30fc\u30eb\u306f\u3001\u307b\u3068\u3093\u3069\u306e\u4f01\u696d\u304c\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\u3055\u308c\u3066\u3044\u308b\u3075\u308a\u3092\u3057\u3066\u3044\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u554f\u984c\u306b\u8e0f\u307f\u8fbc\u307f\u307e\u3059\u3002"},"content":{"rendered":"<p>\u30ae\u30d6\u30ea\u30fc\u306f\u3001\u653b\u6483\u30b5\u30fc\u30d5\u30a7\u30b9\u7ba1\u7406\u30b5\u30fc\u30d3\u30b9\u300cAsset Patrol\u300d\u3092\u767a\u8868\u3057\u307e\u3057\u305f\u3002\u6b63\u5f0f\u306a\u304a\u62ab\u9732\u76ee\u306f2025\u5e7412\u670822\u65e5\u3002\u3053\u308c\u306f\u6c7a\u3057\u3066\u4e0d\u601d\u8b70\u306b\u601d\u3046\u3079\u304d\u8ab2\u984c\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u4f01\u696d\u306f\u3001\u81ea\u5206\u305f\u3061\u304c\u30a4\u30f3\u30bf\u30fc\u30cd\u30c3\u30c8\u306b\u4f55\u3092\u516c\u958b\u3057\u3066\u3044\u308b\u306e\u304b\u3001\u672c\u5f53\u306e\u3068\u3053\u308d\u306f\u77e5\u308a\u307e\u305b\u3093\u3002\u77e5\u3063\u3066\u3044\u308b\u3064\u3082\u308a\u3067\u3044\u308b\u306e\u3067\u3059\u3002\u901a\u5e38\u306f\u305d\u3046\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002.<\/p>\n<p>\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u306f\u3053\u3053\u6570\u5e74\u3067\u7206\u767a\u7684\u306b\u5897\u52a0\u3002\u305d\u306e\u6570\u306f\u5897\u3048\u7d9a\u3051\u3066\u3044\u307e\u3059\u3002\u540c\u6642\u306b\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c1\u30fc\u30e0\u306f\u624b\u8584\u306b\u306a\u3063\u3066\u3044\u307e\u3059\u3002\u5c02\u9580\u5bb6\u304c\u8db3\u308a\u306a\u3044\u306e\u3067\u3059\u3002\u62c5\u5f53\u8005\u306f\u591a\u304f\u306e\u3053\u3068\u3092\u3053\u306a\u3057\u3059\u304e\u3066\u3044\u307e\u3059\u3002\u305d\u306e\u305f\u3081\u3001\u57fa\u672c\u7684\u306a\u3053\u3068\u304c\u629c\u3051\u843d\u3061\u3066\u3057\u307e\u3046\u306e\u3067\u3059\u3002\u53e4\u3044\u30b5\u30fc\u30d0\u30fc\u304c\u30aa\u30f3\u30e9\u30a4\u30f3\u306e\u307e\u307e\u3002\u30c7\u30d0\u30a4\u30b9\u306e\u8a2d\u5b9a\u30df\u30b9\u3002\u516c\u8846\u5411\u3051\u306e\u8cc7\u7523\u306f\u5fd8\u308c\u53bb\u3089\u308c\u307e\u3059\u3002\u3053\u308c\u3089\u306e\u30c9\u30a2\u304c\u5927\u304d\u304f\u958b\u3044\u3066\u3044\u308c\u3070\u3001\u653b\u6483\u8005\u306b\u30bc\u30ed\u30c7\u30a4\u653b\u6483\u306f\u5fc5\u8981\u3042\u308a\u307e\u305b\u3093\u3002.<\/p>\n<h4><strong>\u3053\u3061\u3089\u3082\u304a\u8aad\u307f\u304f\u3060\u3055\u3044\uff1a <a class=\"p-url\" href=\"https:\/\/itbusinesstoday.com\/ja\/quick-reads\/kindrill-launches-agentic-ai-digital-trust-to-secure-enterprise-ai\/\" rel=\"bookmark\">Kindrill\u3001\u30a8\u30f3\u30bf\u30fc\u30d7\u30e9\u30a4\u30baAI\u3092\u4fdd\u8b77\u3059\u308bAgentic AI Digital Trust\u3092\u767a\u8868<\/a><\/strong><\/h4>\n<p>Asset Patrol\u306f\u3001\u81ea\u52d5\u7684\u304b\u3064\u7d99\u7d9a\u7684\u306a\u76e3\u8996\u3092\u4e2d\u5fc3\u306b\u69cb\u7bc9\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u516c\u958b\u3055\u308c\u3066\u3044\u308b\u8cc7\u7523\u3092\u30b9\u30ad\u30e3\u30f3\u3057\u3001\u5909\u66f4\u3092\u8ffd\u8de1\u3057\u3001\u624b\u52d5\u30c1\u30a7\u30c3\u30af\u3092\u5f85\u3064\u3053\u3068\u306a\u304f\u8106\u5f31\u6027\u3084\u8a2d\u5b9a\u306e\u554f\u984c\u306b\u30d5\u30e9\u30b0\u3092\u7acb\u3066\u307e\u3059\u3002\u307e\u305f\u3001\u30a6\u30a7\u30d6\u30b5\u30a4\u30c8\u306e\u6539\u3056\u3093\u3092\u76e3\u8996\u3057\u3001\u30c0\u30c3\u30b7\u30e5\u30dc\u30fc\u30c9\u3084\u5b9a\u671f\u30ec\u30dd\u30fc\u30c8\u3092\u901a\u3058\u3066\u30ea\u30b9\u30af\u30ec\u30d9\u30eb\u3092\u8868\u793a\u3057\u307e\u3059\u3002\u30ed\u30b0\u304c\u8a18\u9332\u3055\u308c\u308b\u305f\u3081\u3001\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u3092\u4e8b\u5f8c\u7684\u306b\u8ffd\u8de1\u3059\u308b\u3053\u3068\u3082\u53ef\u80fd\u3067\u3059\u3002.<\/p>\n<p>\u4eca\u56de\u306e\u767a\u8868\u306f\u3001\u4f01\u696d\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u65b9\u5411\u6027\u3092\u53cd\u6620\u3057\u305f\u3082\u306e\u3067\u3059\u3002\u6d3e\u624b\u306a\u30c4\u30fc\u30eb\u3067\u306f\u306a\u304f\u30a2\u30e9\u30fc\u30c8\u306e\u5897\u52a0\u3067\u3082\u3042\u308a\u307e\u305b\u3093\u3002\u53ef\u8996\u5316\u3068\u81ea\u52d5\u5316\u306b\u3088\u3063\u3066\u3001\u4eba\u9593\u304c\u3082\u306f\u3084\u5b50\u5b88\u3092\u3059\u308b\u6642\u9593\u306e\u306a\u3044\u57fa\u672c\u7684\u306a\u90e8\u5206\u3092\u30ab\u30d0\u30fc\u3059\u308b\u3060\u3051\u3067\u3059\u3002.<\/p>","protected":false},"excerpt":{"rendered":"<p>Gibbly has introduced Asset Patrol, an Attack Surface Management service, and the timing is very indicative. Its official unveiling was scheduled to be on December 22, 2025. This is by no means a challenge that one should ever wonder at. Companies do not really know what they have exposed to the internet. They think they do. They usually do not. Cyberattack traffic has exploded over the years. The numbers keep climbing. At the same time, security teams are stretched thin. There are not enough specialists. The people in charge are juggling too much. So basic things slip. Old servers stay online. Devices are misconfigured. Public-facing assets are forgotten. Attackers do [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":25690,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"wprm-recipe-roundup-name":"","wprm-recipe-roundup-description":"","postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[208,184,211,237,1838,206,85],"tags":[10084,10083,10086,10085,10081,10082,105,106,10087],"ppma_author":[572],"class_list":{"0":"post-25676","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apac","8":"category-cybersecurity","9":"category-japan","10":"category-news","11":"category-quick-reads","12":"category-regional","13":"category-tech","14":"tag-asset-patrol","15":"tag-attack-surface-management-service","16":"tag-continuous-monitoring","17":"tag-flags-vulnerabilities","18":"tag-gibbly","19":"tag-indicative","20":"tag-itbusinesstoday","21":"tag-news","22":"tag-visibility"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Asset Patrol Tackles Security Gaps Many Firms Overlook<\/title>\n<meta name=\"description\" content=\"Gibbly launches Asset Patrol, an attack surface management service to help organizations identify and reduce unknown internet exposures.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itbusinesstoday.com\/ja\/quick-reads\/asset-patrol-steps-into-a-security-problem-most-companies-pretend-is-under-control\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Asset Patrol Tackles Security Gaps Many Firms Overlook\" \/>\n<meta property=\"og:description\" content=\"Gibbly launches Asset Patrol, an attack surface management service to help organizations identify and reduce unknown internet exposures.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itbusinesstoday.com\/ja\/quick-reads\/asset-patrol-steps-into-a-security-problem-most-companies-pretend-is-under-control\/\" \/>\n<meta property=\"og:site_name\" content=\"itbusinesstoday\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-22T11:22:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/12\/Asset-Patrol-Steps-into-a-Security-Problem-Most-Companies-Pretend-Is-Under-Control.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1201\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"ITBT StaffWriter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"ITBT StaffWriter\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"1\u5206\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Asset Patrol Tackles Security Gaps Many Firms Overlook","description":"Gibbly launches Asset Patrol, an attack surface management service to help organizations identify and reduce unknown internet exposures.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itbusinesstoday.com\/ja\/quick-reads\/asset-patrol-steps-into-a-security-problem-most-companies-pretend-is-under-control\/","og_locale":"ja_JP","og_type":"article","og_title":"Asset Patrol Tackles Security Gaps Many Firms Overlook","og_description":"Gibbly launches Asset Patrol, an attack surface management service to help organizations identify and reduce unknown internet exposures.","og_url":"https:\/\/itbusinesstoday.com\/ja\/quick-reads\/asset-patrol-steps-into-a-security-problem-most-companies-pretend-is-under-control\/","og_site_name":"itbusinesstoday","article_published_time":"2025-12-22T11:22:13+00:00","og_image":[{"width":1201,"height":800,"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/12\/Asset-Patrol-Steps-into-a-Security-Problem-Most-Companies-Pretend-Is-Under-Control.webp","type":"image\/webp"}],"author":"ITBT StaffWriter","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"ITBT StaffWriter","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"1\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itbusinesstoday.com\/quick-reads\/asset-patrol-steps-into-a-security-problem-most-companies-pretend-is-under-control\/#article","isPartOf":{"@id":"https:\/\/itbusinesstoday.com\/quick-reads\/asset-patrol-steps-into-a-security-problem-most-companies-pretend-is-under-control\/"},"author":{"name":"ITBT StaffWriter","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15"},"headline":"Asset Patrol Steps into a Security Problem Most Companies Pretend Is Under Control","datePublished":"2025-12-22T11:22:13+00:00","mainEntityOfPage":{"@id":"https:\/\/itbusinesstoday.com\/quick-reads\/asset-patrol-steps-into-a-security-problem-most-companies-pretend-is-under-control\/"},"wordCount":229,"publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"image":{"@id":"https:\/\/itbusinesstoday.com\/quick-reads\/asset-patrol-steps-into-a-security-problem-most-companies-pretend-is-under-control\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/12\/Asset-Patrol-Steps-into-a-Security-Problem-Most-Companies-Pretend-Is-Under-Control.webp","keywords":["Asset Patrol","Attack Surface Management service","continuous monitoring","flags vulnerabilities","Gibbly","indicative","itbusinesstoday","News","visibility"],"articleSection":["APAC","Cybersecurity","Japan","News","Quick Reads","Regional","Tech"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/itbusinesstoday.com\/quick-reads\/asset-patrol-steps-into-a-security-problem-most-companies-pretend-is-under-control\/","url":"https:\/\/itbusinesstoday.com\/quick-reads\/asset-patrol-steps-into-a-security-problem-most-companies-pretend-is-under-control\/","name":"Asset Patrol Tackles Security Gaps Many Firms Overlook","isPartOf":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itbusinesstoday.com\/quick-reads\/asset-patrol-steps-into-a-security-problem-most-companies-pretend-is-under-control\/#primaryimage"},"image":{"@id":"https:\/\/itbusinesstoday.com\/quick-reads\/asset-patrol-steps-into-a-security-problem-most-companies-pretend-is-under-control\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/12\/Asset-Patrol-Steps-into-a-Security-Problem-Most-Companies-Pretend-Is-Under-Control.webp","datePublished":"2025-12-22T11:22:13+00:00","description":"Gibbly launches Asset Patrol, an attack surface management service to help organizations identify and reduce unknown internet exposures.","breadcrumb":{"@id":"https:\/\/itbusinesstoday.com\/quick-reads\/asset-patrol-steps-into-a-security-problem-most-companies-pretend-is-under-control\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itbusinesstoday.com\/quick-reads\/asset-patrol-steps-into-a-security-problem-most-companies-pretend-is-under-control\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/quick-reads\/asset-patrol-steps-into-a-security-problem-most-companies-pretend-is-under-control\/#primaryimage","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/12\/Asset-Patrol-Steps-into-a-Security-Problem-Most-Companies-Pretend-Is-Under-Control.webp","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/12\/Asset-Patrol-Steps-into-a-Security-Problem-Most-Companies-Pretend-Is-Under-Control.webp","width":1201,"height":800,"caption":"Asset Patrol Steps into a Security Problem Most Companies Pretend Is Under Control"},{"@type":"BreadcrumbList","@id":"https:\/\/itbusinesstoday.com\/quick-reads\/asset-patrol-steps-into-a-security-problem-most-companies-pretend-is-under-control\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itbusinesstoday.com\/"},{"@type":"ListItem","position":2,"name":"Asset Patrol Steps into a Security Problem Most Companies Pretend Is Under Control"}]},{"@type":"WebSite","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","description":"","publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","width":663,"height":275,"caption":"itbusinesstoday"},"image":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15","name":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png90b3cb23d1d9c08733d969d29ea2d30d","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","caption":"ITBT StaffWriter"},"description":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc\u306f\u3001IT Business Today\u306e\u793e\u5185\u5bc4\u7a3f\u8005\u3067\u3001\u30bf\u30a4\u30e0\u30ea\u30fc\u306a\u30cb\u30e5\u30fc\u30b9\u3068QuickBytes\u306e\u914d\u4fe1\u3092\u62c5\u5f53\u3057\u3066\u3044\u307e\u3059\u3002IT\u3001\u30cf\u30a4\u30c6\u30af\u3001\u4f01\u696d\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u6700\u65b0\u52d5\u5411\u3092\u30ab\u30d0\u30fc\u3057\u3001\u7c21\u6f54\u3067\u30a4\u30f3\u30d1\u30af\u30c8\u306e\u3042\u308b\u6700\u65b0\u60c5\u5831\u3092\u8aad\u8005\u306b\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002","sameAs":["https:\/\/itbusinesstoday.com\/"],"url":"https:\/\/itbusinesstoday.com\/ja\/author\/itbt-staffwriter\/"}]}},"authors":[{"term_id":572,"user_id":7,"is_guest":0,"slug":"itbt-staffwriter","display_name":"ITBT StaffWriter","avatar_url":{"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","url2x":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/25676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/comments?post=25676"}],"version-history":[{"count":1,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/25676\/revisions"}],"predecessor-version":[{"id":25677,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/25676\/revisions\/25677"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media\/25690"}],"wp:attachment":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media?parent=25676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/categories?post=25676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/tags?post=25676"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/ppma_author?post=25676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}