{"id":28593,"date":"2026-02-19T11:21:04","date_gmt":"2026-02-19T11:21:04","guid":{"rendered":"https:\/\/itbusinesstoday.com\/?p=28593"},"modified":"2026-02-19T11:21:04","modified_gmt":"2026-02-19T11:21:04","slug":"nri-secure-launches-service-to-support-the-establishment-of-threat-hunting-systems","status":"publish","type":"post","link":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/nri-secure-launches-service-to-support-the-establishment-of-threat-hunting-systems\/","title":{"rendered":"NRI\u30bb\u30ad\u30e5\u30a2\u3001\u8105\u5a01\u691c\u77e5\u30b7\u30b9\u30c6\u30e0\u69cb\u7bc9\u652f\u63f4\u30b5\u30fc\u30d3\u30b9\u3092\u958b\u59cb"},"content":{"rendered":"<p><a href=\"https:\/\/www.nri-secure.co.jp\/\">NRI\u30bb\u30ad\u30e5\u30a2\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30ba<\/a>, \u682a\u5f0f\u4f1a\u793e\u65e5\u7acb\u88fd\u4f5c\u6240\uff08\u672c\u793e\uff1a\u6771\u4eac\u90fd\u54c1\u5ddd\u533a\u3001\u57f7\u884c\u5f79\u793e\u9577\uff1a\u4e2d\u897f \u5b8f\u660e\uff09\u306f\u3001\u4f01\u696d\u3084\u7d44\u7e54\u304c\u7d44\u7e54\u5185\u3067\u52b9\u7387\u7684\u304b\u3064\u52b9\u679c\u7684\u306b\u8105\u5a01\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u3092\u5b9f\u65bd\u3067\u304d\u308b\u72b6\u614b\u3092\u6bb5\u968e\u7684\u306b\u69cb\u7bc9\u30fb\u5b9a\u7740\u3055\u305b\u308b\u3053\u3068\u3092\u652f\u63f4\u3059\u308b\u300c\u8105\u5a01\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u614b\u52e2\u69cb\u7bc9\u652f\u63f4\u30b5\u30fc\u30d3\u30b9\u300d\u3092\u958b\u59cb\u3057\u307e\u3057\u305f\u3002\u30b9\u30ec\u30c3\u30c8\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u3068\u306f\u3001\u30b7\u30b9\u30c6\u30e0\u5185\u306b\u6f5c\u5728\u3059\u308b\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u3092\u691c\u77e5\u3059\u308b\u305f\u3081\u306b\u3001\u80fd\u52d5\u7684\u304b\u3064\u53cd\u5fa9\u7684\uff08\u5b9a\u671f\u7684\uff09\u306b\u8105\u5a01\u3092\u63a2\u7d22\u3059\u308b\u624b\u6cd5\u3002.<\/p>\n<h4><strong>\u5b98\u6c11\u3068\u3082\u306b\u62e1\u5927\u304c\u4e88\u60f3\u3055\u308c\u308b\u8105\u5a01\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0<\/strong><\/h4>\n<p>\u8fd1\u5e74\u3001\u4e0d\u6b63\u306a\u5229\u76ca\u306e\u7372\u5f97\u3092\u76ee\u7684\u3068\u3057\u305f\u5de7\u5999\u304b\u3064\u7d44\u7e54\u7684\u306a\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u3084\u30c7\u30b8\u30bf\u30eb\u72af\u7f6a\u304c\u5f8c\u3092\u7d76\u305f\u305a\u3001\u4f01\u696d\u306b\u6df1\u523b\u306a\u5f71\u97ff\u3092\u53ca\u307c\u3057\u3066\u3044\u307e\u3059\u3002\u7279\u306b\u3001\u6b63\u898f\u306e\u30b7\u30b9\u30c6\u30e0\u6a5f\u80fd\u3092\u60aa\u7528\u3057\u305f\u300cLotL\uff08Living Off the Land\uff09\u300d\u3068\u547c\u3070\u308c\u308b\u624b\u53e3\u3067\u3001\u5f93\u6765\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5bfe\u7b56\u306b\u3088\u308b\u691c\u77e5\u3092\u56de\u907f\u3059\u308b\u653b\u6483\u4e8b\u4f8b\u304c\u5831\u544a\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u3088\u3046\u306a\u72b6\u6cc1\u306e\u4e2d\u3001\u30b7\u30b9\u30c6\u30e0\u5185\u306b\u6f5c\u3080\u672a\u77e5\u306e\u8105\u5a01\u306e\u75d5\u8de1\u3092\u7a4d\u6975\u7684\u304b\u3064\u7e70\u308a\u8fd4\u3057\u63a2\u7d22\u3057\u3001\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u306e\u65e9\u671f\u767a\u898b\u30fb\u5bfe\u5fdc\u306b\u3064\u306a\u3052\u308b\u300c\u8105\u5a01\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u300d\u306e\u91cd\u8981\u6027\u304c\u6025\u901f\u306b\u9ad8\u307e\u3063\u3066\u3044\u307e\u3059\u3002.<\/p>\n<p>\u307e\u305f\u30012025\u5e7412\u6708\u306b\u95a3\u8b70\u6c7a\u5b9a\u3055\u308c\u305f\u300c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u300d\u3067\u306f\u30012026\u5e74\u590f\u3092\u76ee\u9014\u306b\u8105\u5a01\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u306e\u666e\u53ca\u30fb\u5b9f\u65bd\u306e\u305f\u3081\u306e\u57fa\u672c\u6307\u91dd\u3092\u7b56\u5b9a\u3059\u308b\u3053\u3068\u3068\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u3053\u3046\u3057\u305f\u52d5\u5411\u3092\u8e0f\u307e\u3048\u3001\u8105\u5a01\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u3092\u7d99\u7d9a\u7684\u306b\u5b9f\u65bd\u3067\u304d\u308b\u4f53\u5236\u3092\u69cb\u7bc9\u3059\u308b\u3053\u3068\u306e\u91cd\u8981\u6027\u306f\u307e\u3059\u307e\u3059\u9ad8\u307e\u3063\u3066\u3044\u307e\u3059\u3002.<\/p>\n<h4><strong>\u3053\u3061\u3089\u3082\u304a\u8aad\u307f\u304f\u3060\u3055\u3044\uff1a <a class=\"p-url\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/hitachi-solutions-boosts-identity-security-with-okta-ispm\/\" rel=\"bookmark\">\u65e5\u7acb\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u30ba\u3001Okta ISPM\u3067ID\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u5f37\u5316<\/a><\/strong><\/h4>\n<h4><strong>\u672c\u30b5\u30fc\u30d3\u30b9\u306e\u6982\u8981\u3068\u7279\u5fb4<\/strong><\/h4>\n<p>\u672c\u30b5\u30fc\u30d3\u30b9\u306f\u3001\u30c7\u30b9\u30af\u30c8\u30c3\u30d7\u30a2\u30bb\u30b9\u30e1\u30f3\u30c8\u3068\u5b9f\u6a5f\u691c\u8a3c\u3092\u901a\u3058\u3066\u3001\u8105\u5a01\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u614b\u52e2\u306e\u69cb\u7bc9\u3092\u652f\u63f4\u3059\u308b\u3082\u306e\u3067\u3059\u3002\u307e\u305a\u3001\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u3001\u30d7\u30ed\u30bb\u30b9\u3001\u7d44\u7e54\u306e\u89b3\u70b9\u304b\u3089\u3001\u304a\u5ba2\u69d8\u306e\u8105\u5a01\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u6e96\u5099\u72b6\u6cc1\u3092\u30c7\u30b9\u30af\u30c8\u30c3\u30d7\u30a2\u30bb\u30b9\u30e1\u30f3\u30c8\u3057\u307e\u3059\u3002\u305d\u306e\u5f8c\u3001\u304a\u5ba2\u69d8\u306e\u5b9f\u6a5f\u3067\u7279\u5b9a\u306e\u8105\u5a01\u3092\u30bf\u30fc\u30b2\u30c3\u30c8\u3068\u3057\u305f\u8105\u5a01\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u3092\u5b9f\u65bd\u3057\u3001\u60f3\u5b9a\u3055\u308c\u308b\u8105\u5a01\u3092\u6a21\u5023\u3057\u305f\u653b\u6483\u306b\u5bfe\u3059\u308b\u691c\u77e5\u80fd\u529b\u3092\u691c\u8a3c\u3057\u307e\u3059\uff08\u30d1\u30fc\u30d7\u30eb\u30c1\u30fc\u30df\u30f3\u30b0\uff09\u3002\u3053\u308c\u3089\u306e\u8a55\u4fa1\u7d50\u679c\u306b\u57fa\u3065\u304d\u3001\u8105\u5a01\u30cf\u30f3\u30c6\u30a3\u30f3\u30b0\u306e\u6e96\u5099\u72b6\u6cc1\u3092\u6539\u5584\u3059\u308b\u305f\u3081\u306e\u63a8\u5968\u4e8b\u9805\u3092\u4f5c\u6210\u3057\u3001\u5831\u544a\u3057\u307e\u3059\u3002.<\/p>\n<p><strong>\u30bd\u30fc\u30b9 <a href=\"https:\/\/prtimes.jp\/main\/html\/rd\/p\/000000193.000052432.html\">PR\u30bf\u30a4\u30e0\u30ba<\/a><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>NRI Secure Technologies, Ltd. launched the &#8220;Threat Hunting Readiness Building Support Service&#8221;, which helps companies and organizations gradually establish and establish a state in which they can efficiently and effectively conduct threat hunting within their organizations. Threat hunting is a method of actively and repeatedly (regularly) searching for threats in order to detect potential cyber threats within systems. Threat hunting is expected to expand in both the public and private sectors In recent years, sophisticated, organized cyberattacks and digital crimes aimed at obtaining illicit profits have been steadily increasing, severely impacting businesses. In particular, there have been reported cases of attacks using &#8220;living off the land (LotL)&#8221; tactics, which exploit [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":28576,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"wprm-recipe-roundup-name":"","wprm-recipe-roundup-description":"","postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[208,184,211,237,206,85],"tags":[109,110,105,106,11498,300,11497],"ppma_author":[205],"class_list":{"0":"post-28593","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apac","8":"category-cybersecurity","9":"category-japan","10":"category-news","11":"category-regional","12":"category-tech","13":"tag-cyber-threats","14":"tag-cybersecurity","15":"tag-itbusinesstoday","16":"tag-news","17":"tag-nri-secure-technologies","18":"tag-support-service","19":"tag-threat-hunting-systems"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NRI Secure Launches Threat Hunting Support Service<\/title>\n<meta name=\"description\" content=\"NRI Secure Technologies launches a Threat Hunting Readiness service to help organizations proactively detect and manage cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/nri-secure-launches-service-to-support-the-establishment-of-threat-hunting-systems\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NRI Secure Launches Threat Hunting Support Service\" \/>\n<meta property=\"og:description\" content=\"NRI Secure Technologies launches a Threat Hunting Readiness service to help organizations proactively detect and manage cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/nri-secure-launches-service-to-support-the-establishment-of-threat-hunting-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"itbusinesstoday\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-19T11:21:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/02\/NRI-Secure-launches-service-to-support-the-establishment-of-threat-hunting-systems.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"NewsDesk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"NewsDesk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u5206\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NRI Secure Launches Threat Hunting Support Service","description":"NRI Secure Technologies launches a Threat Hunting Readiness service to help organizations proactively detect and manage cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/nri-secure-launches-service-to-support-the-establishment-of-threat-hunting-systems\/","og_locale":"ja_JP","og_type":"article","og_title":"NRI Secure Launches Threat Hunting Support Service","og_description":"NRI Secure Technologies launches a Threat Hunting Readiness service to help organizations proactively detect and manage cyber threats.","og_url":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/nri-secure-launches-service-to-support-the-establishment-of-threat-hunting-systems\/","og_site_name":"itbusinesstoday","article_published_time":"2026-02-19T11:21:04+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/02\/NRI-Secure-launches-service-to-support-the-establishment-of-threat-hunting-systems.webp","type":"image\/webp"}],"author":"NewsDesk","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"NewsDesk","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"2\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/nri-secure-launches-service-to-support-the-establishment-of-threat-hunting-systems\/#article","isPartOf":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/nri-secure-launches-service-to-support-the-establishment-of-threat-hunting-systems\/"},"author":{"name":"NewsDesk","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/d58d81f55e8acd257ab63d49fb4ea812"},"headline":"NRI Secure launches service to support the establishment of threat hunting systems","datePublished":"2026-02-19T11:21:04+00:00","mainEntityOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/nri-secure-launches-service-to-support-the-establishment-of-threat-hunting-systems\/"},"wordCount":308,"publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/nri-secure-launches-service-to-support-the-establishment-of-threat-hunting-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/02\/NRI-Secure-launches-service-to-support-the-establishment-of-threat-hunting-systems.webp","keywords":["cyber threats","cybersecurity","itbusinesstoday","News","NRI Secure Technologies","support service","threat hunting systems"],"articleSection":["APAC","Cybersecurity","Japan","News","Regional","Tech"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/nri-secure-launches-service-to-support-the-establishment-of-threat-hunting-systems\/","url":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/nri-secure-launches-service-to-support-the-establishment-of-threat-hunting-systems\/","name":"NRI Secure Launches Threat Hunting Support Service","isPartOf":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/nri-secure-launches-service-to-support-the-establishment-of-threat-hunting-systems\/#primaryimage"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/nri-secure-launches-service-to-support-the-establishment-of-threat-hunting-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/02\/NRI-Secure-launches-service-to-support-the-establishment-of-threat-hunting-systems.webp","datePublished":"2026-02-19T11:21:04+00:00","description":"NRI Secure Technologies launches a Threat Hunting Readiness service to help organizations proactively detect and manage cyber threats.","breadcrumb":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/nri-secure-launches-service-to-support-the-establishment-of-threat-hunting-systems\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/nri-secure-launches-service-to-support-the-establishment-of-threat-hunting-systems\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/nri-secure-launches-service-to-support-the-establishment-of-threat-hunting-systems\/#primaryimage","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/02\/NRI-Secure-launches-service-to-support-the-establishment-of-threat-hunting-systems.webp","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/02\/NRI-Secure-launches-service-to-support-the-establishment-of-threat-hunting-systems.webp","width":1200,"height":800,"caption":"NRI Secure launches service to support the establishment of threat hunting systems"},{"@type":"BreadcrumbList","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/nri-secure-launches-service-to-support-the-establishment-of-threat-hunting-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itbusinesstoday.com\/"},{"@type":"ListItem","position":2,"name":"NRI Secure launches service to support the establishment of threat hunting systems"}]},{"@type":"WebSite","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","description":"","publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","width":663,"height":275,"caption":"itbusinesstoday"},"image":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/d58d81f55e8acd257ab63d49fb4ea812","name":"\u30cb\u30e5\u30fc\u30b9\u30c7\u30b9\u30af","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png74f313ad3d6fa27a1eee85c30be63d03","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png","caption":"NewsDesk"},"sameAs":["https:\/\/itbusinesstoday.com"],"url":"https:\/\/itbusinesstoday.com\/ja\/author\/newsdesk\/"}]}},"authors":[{"term_id":205,"user_id":4,"is_guest":0,"slug":"newsdesk","display_name":"NewsDesk","avatar_url":{"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png","url2x":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/28593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/comments?post=28593"}],"version-history":[{"count":1,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/28593\/revisions"}],"predecessor-version":[{"id":28594,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/28593\/revisions\/28594"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media\/28576"}],"wp:attachment":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media?parent=28593"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/categories?post=28593"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/tags?post=28593"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/ppma_author?post=28593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}