{"id":28833,"date":"2026-02-24T10:55:12","date_gmt":"2026-02-24T10:55:12","guid":{"rendered":"https:\/\/itbusinesstoday.com\/?p=28833"},"modified":"2026-02-24T10:55:12","modified_gmt":"2026-02-24T10:55:12","slug":"securebase-launches-ai-driven-shinobiscan-easm","status":"publish","type":"post","link":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/securebase-launches-ai-driven-shinobiscan-easm\/","title":{"rendered":"\u30bb\u30ad\u30e5\u30a2\u30d9\u30fc\u30b9\u3001AI\u3092\u6d3b\u7528\u3057\u305fShinobiScan EASM\u3092\u767a\u8868"},"content":{"rendered":"<p>\u682a\u5f0f\u4f1a\u793e\u30bb\u30ad\u30e5\u30a2\u30d9\u30fc\u30b9\u306f\u3001AI\u3092\u6d3b\u7528\u3057\u305f\u5916\u90e8\u653b\u6483\u30b5\u30fc\u30d5\u30a7\u30b9\u7ba1\u7406\u30b5\u30fc\u30d3\u30b9\u300cShinobiScan EASM\u300d\u30922026\u5e743\u6708\u3088\u308a\u6b63\u5f0f\u306b\u63d0\u4f9b\u958b\u59cb\u3057\u307e\u3059\u3002.<\/p>\n<p>\u30c7\u30b8\u30bf\u30eb\u30c8\u30e9\u30f3\u30b9\u30d5\u30a9\u30fc\u30e1\u30fc\u30b7\u30e7\u30f3\u304c\u9032\u307f\u3001\u30af\u30e9\u30a6\u30c9\u5229\u7528\u3084\u30ea\u30e2\u30fc\u30c8\u30ef\u30fc\u30af\u304c\u62e1\u5927\u3059\u308b\u4e2d\u3001\u4f01\u696d\u304c\u4fdd\u6709\u3059\u308bIT\u8cc7\u7523\u306f\u5897\u52a0\u30fb\u5206\u6563\u5316\u3057\u3001\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306e\u8d77\u70b9\u3068\u306a\u308a\u5f97\u308b\u4e00\u822c\u516c\u958b\u8cc7\u7523\u3082\u5e83\u304c\u3063\u3066\u3044\u307e\u3059\u3002\u8b66\u5bdf\u5e81\u306e\u8abf\u67fb\uff082024\u5e74\uff09\u306b\u3088\u308b\u3068\u3001\u56fd\u5185\u3067\u767a\u751f\u3057\u305f\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2222\u4ef6\u306e\u3046\u3061\u300180%\u4ee5\u4e0a\u304cVPN\u6a5f\u5668\u3084\u30ea\u30e2\u30fc\u30c8\u30c7\u30b9\u30af\u30c8\u30c3\u30d7\u306a\u3069\u3001\u4e00\u822c\u306b\u5229\u7528\u53ef\u80fd\u306a\u8cc7\u7523\u3092\u7d4c\u7531\u3057\u305f\u4fb5\u5165\u3067\u3057\u305f\u3002\u4e00\u65b9\u3001\u591a\u304f\u306e\u4f01\u696d\u3067\u306f\u3001\u30af\u30e9\u30a6\u30c9\u30b5\u30fc\u30d3\u30b9\u306e\u6025\u901f\u306a\u5229\u7528\u62e1\u5927\u3084\u3001\u4e8b\u696d\u90e8\u3054\u3068\u306e\u500b\u5225\u30b7\u30b9\u30c6\u30e0\u306e\u5c0e\u5165\u3001M&amp;A\u306a\u3069\u306b\u3088\u308a\u3001\u60c5\u5831\u30b7\u30b9\u30c6\u30e0\u90e8\u9580\u304c\u628a\u63e1\u3057\u3066\u3044\u306a\u3044\u300c\u4e0d\u6b63IT\u8cc7\u7523\u300d\u304c\u5897\u52a0\u3057\u3001\u653b\u6483\u8005\u304c\u72d9\u3046\u53ef\u80fd\u6027\u306e\u3042\u308b\u516c\u958b\u8cc7\u7523\u306e\u5b58\u5728\u3092\u7279\u5b9a\u3067\u304d\u306a\u3044\u3053\u3068\u304c\u6df1\u523b\u306a\u554f\u984c\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u3002.<\/p>\n<p>\u3053\u308c\u3092\u53d7\u3051\u3001\u7d4c\u6e08\u7523\u696d\u7701\u306f2023\u5e745\u6708\u3001\u4f01\u696d\u304c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6226\u7565\u306bASM\u3092\u53d6\u308a\u5165\u308c\u308b\u305f\u3081\u306e\u57fa\u672c\u7684\u306a\u8003\u3048\u65b9\u3084\u4e8b\u4f8b\u3092\u307e\u3068\u3081\u305f\u300cASM\u5c0e\u5165\u30ac\u30a4\u30c0\u30f3\u30b9\u300d\u3092\u516c\u8868\u3057\u307e\u3057\u305f\u3002\u307e\u305f\u3001\u56fd\u5bb6\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5ba4\u3067\u306f\u3001\u5404\u5e9c\u7701\u5e81\u3092\u5bfe\u8c61\u3068\u3057\u305f\u6a2a\u65ad\u7684\u306aASM\uff08\u30a2\u30bf\u30c3\u30af\u30fb\u30b5\u30fc\u30d5\u30a7\u30b9\u30fb\u30de\u30cd\u30b8\u30e1\u30f3\u30c8\uff09\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u3092\u5b9f\u65bd\u3057\u3066\u304a\u308a\u3001\u5916\u90e8\u304b\u3089\u306e\u30a2\u30bf\u30c3\u30af\u30fb\u30b5\u30fc\u30d5\u30a7\u30b9\u306e\u53ef\u8996\u5316\u306f\u5b98\u6c11\u5171\u901a\u306e\u55ab\u7dca\u306e\u8ab2\u984c\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u3002.<\/p>\n<h4>\u3053\u3061\u3089\u3082\u304a\u8aad\u307f\u304f\u3060\u3055\u3044\uff1a <a class=\"p-url\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/ubiquitous-ai-and-artifact-partner-on-security-solutions\/\" rel=\"bookmark\">\u30e6\u30d3\u30ad\u30bf\u30b9AI\u3068\u30a2\u30fc\u30c6\u30a3\u30d5\u30a1\u30af\u30c8\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3067\u63d0\u643a<\/a><\/h4>\n<p>\u201c\u30b5\u30a4\u30d0\u30fc\u30ea\u30b9\u30af\u306e\u898b\u3048\u308b\u5316 \u201d\u3092\u30b3\u30f3\u30bb\u30d7\u30c8\u306b\u201d <a href=\"https:\/\/secbase.jp\/\">\u30bb\u30ad\u30e5\u30a2\u30d9\u30fc\u30b9<\/a> \u306f\u3001\u3053\u306e\u55ab\u7dca\u306e\u8ab2\u984c\u3092\u89e3\u6c7a\u3059\u308b\u305f\u3081\u3001\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5206\u91ce\u306e\u77e5\u898b\u3068\u6700\u65b0\u306eAI\u6280\u8853\u3092\u878d\u5408\u3055\u305b\u3001\u5916\u90e8\u653b\u6483\u30b5\u30fc\u30d5\u30a7\u30b9\u3092\u53ef\u8996\u5316\u3059\u308b\u300cShinobiScan EASM\u300d\u3092\u958b\u767a\u3057\u307e\u3057\u305f\u3002.<\/p>\n<p><strong>\u30bd\u30fc\u30b9 <a href=\"https:\/\/prtimes.jp\/main\/html\/rd\/p\/000000003.000052703.html\">PR\u30bf\u30a4\u30e0\u30ba<\/a><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>SecureBase Inc. will officially launch its AI-driven external attack surface management service, &#8220;ShinobiScan EASM,&#8221; in March 2026. As digital transformation advances and cloud usage and remote work expand, the number of IT assets owned by companies is increasing and becoming more scattered, and publicly available assets that could serve as the starting point for cyberattacks are also becoming more widespread. According to a survey by the National Police Agency (2024), of the 222 ransomware cases in Japan, more than 80% were intrusions via publicly available assets such as VPN devices and remote desktops. Meanwhile, at many companies, the rapid expansion of cloud service usage, the introduction of individual systems by [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":28834,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"wprm-recipe-roundup-name":"","wprm-recipe-roundup-description":"","postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[208,184,211,237,206,85],"tags":[1323,110,11606,11605,9214],"ppma_author":[205],"class_list":{"0":"post-28833","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apac","8":"category-cybersecurity","9":"category-japan","10":"category-news","11":"category-regional","12":"category-tech","13":"tag-ai-agents","14":"tag-cybersecurity","15":"tag-securebase","16":"tag-shinobiscan-easm","17":"tag-vulnerability-management"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SecureBase introduces AI-powered ShinobiScan EASM<\/title>\n<meta name=\"description\" content=\"SecureBase will launch its AI-driven ShinobiScan EASM service, helping organizations monitor and manage external cyber risk exposure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/securebase-launches-ai-driven-shinobiscan-easm\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SecureBase introduces AI-powered ShinobiScan EASM\" \/>\n<meta property=\"og:description\" content=\"SecureBase will launch its AI-driven ShinobiScan EASM service, helping organizations monitor and manage external cyber risk exposure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/securebase-launches-ai-driven-shinobiscan-easm\/\" \/>\n<meta property=\"og:site_name\" content=\"itbusinesstoday\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-24T10:55:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/02\/Launch-of-AI-driven-external-attack-surface-management-service.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"NewsDesk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"NewsDesk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u5206\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SecureBase introduces AI-powered ShinobiScan EASM","description":"SecureBase will launch its AI-driven ShinobiScan EASM service, helping organizations monitor and manage external cyber risk exposure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/securebase-launches-ai-driven-shinobiscan-easm\/","og_locale":"ja_JP","og_type":"article","og_title":"SecureBase introduces AI-powered ShinobiScan EASM","og_description":"SecureBase will launch its AI-driven ShinobiScan EASM service, helping organizations monitor and manage external cyber risk exposure.","og_url":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/securebase-launches-ai-driven-shinobiscan-easm\/","og_site_name":"itbusinesstoday","article_published_time":"2026-02-24T10:55:12+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/02\/Launch-of-AI-driven-external-attack-surface-management-service.webp","type":"image\/webp"}],"author":"NewsDesk","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"NewsDesk","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"2\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/securebase-launches-ai-driven-shinobiscan-easm\/#article","isPartOf":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/securebase-launches-ai-driven-shinobiscan-easm\/"},"author":{"name":"NewsDesk","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/d58d81f55e8acd257ab63d49fb4ea812"},"headline":"SecureBase launches AI-driven ShinobiScan EASM","datePublished":"2026-02-24T10:55:12+00:00","mainEntityOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/securebase-launches-ai-driven-shinobiscan-easm\/"},"wordCount":273,"publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/securebase-launches-ai-driven-shinobiscan-easm\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/02\/Launch-of-AI-driven-external-attack-surface-management-service.webp","keywords":["AI agents","cybersecurity","SecureBase","ShinobiScan EASM","vulnerability management"],"articleSection":["APAC","Cybersecurity","Japan","News","Regional","Tech"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/securebase-launches-ai-driven-shinobiscan-easm\/","url":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/securebase-launches-ai-driven-shinobiscan-easm\/","name":"SecureBase introduces AI-powered ShinobiScan EASM","isPartOf":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/securebase-launches-ai-driven-shinobiscan-easm\/#primaryimage"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/securebase-launches-ai-driven-shinobiscan-easm\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/02\/Launch-of-AI-driven-external-attack-surface-management-service.webp","datePublished":"2026-02-24T10:55:12+00:00","description":"SecureBase will launch its AI-driven ShinobiScan EASM service, helping organizations monitor and manage external cyber risk exposure.","breadcrumb":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/securebase-launches-ai-driven-shinobiscan-easm\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/securebase-launches-ai-driven-shinobiscan-easm\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/securebase-launches-ai-driven-shinobiscan-easm\/#primaryimage","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/02\/Launch-of-AI-driven-external-attack-surface-management-service.webp","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/02\/Launch-of-AI-driven-external-attack-surface-management-service.webp","width":1200,"height":800,"caption":"SecureBase"},{"@type":"BreadcrumbList","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/securebase-launches-ai-driven-shinobiscan-easm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itbusinesstoday.com\/"},{"@type":"ListItem","position":2,"name":"SecureBase launches AI-driven ShinobiScan EASM"}]},{"@type":"WebSite","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","description":"","publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","width":663,"height":275,"caption":"itbusinesstoday"},"image":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/d58d81f55e8acd257ab63d49fb4ea812","name":"\u30cb\u30e5\u30fc\u30b9\u30c7\u30b9\u30af","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png74f313ad3d6fa27a1eee85c30be63d03","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png","caption":"NewsDesk"},"sameAs":["https:\/\/itbusinesstoday.com"],"url":"https:\/\/itbusinesstoday.com\/ja\/author\/newsdesk\/"}]}},"authors":[{"term_id":205,"user_id":4,"is_guest":0,"slug":"newsdesk","display_name":"NewsDesk","avatar_url":{"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png","url2x":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/28833","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/comments?post=28833"}],"version-history":[{"count":1,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/28833\/revisions"}],"predecessor-version":[{"id":28835,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/28833\/revisions\/28835"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media\/28834"}],"wp:attachment":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media?parent=28833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/categories?post=28833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/tags?post=28833"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/ppma_author?post=28833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}