{"id":28841,"date":"2026-02-24T11:07:59","date_gmt":"2026-02-24T11:07:59","guid":{"rendered":"https:\/\/itbusinesstoday.com\/?p=28841"},"modified":"2026-02-24T11:07:59","modified_gmt":"2026-02-24T11:07:59","slug":"ai-defense-on-idx-targets-defense-knowledge-leaks","status":"publish","type":"post","link":"https:\/\/itbusinesstoday.com\/ja\/gov-tech\/ai-defense-on-idx-targets-defense-knowledge-leaks\/","title":{"rendered":"\u9632\u885b\u77e5\u8b58\u6f0f\u3048\u3044\u3092\u72d9\u3046IDX\u306eAI\u9632\u885b"},"content":{"rendered":"<p><a href=\"https:\/\/www.aidata.co.jp\/\">\u682a\u5f0f\u4f1a\u793eAI\u30c7\u30fc\u30bf<\/a> \u306f\u3001\u653f\u5e9c\u306e\u5b89\u5168\u4fdd\u969c\u512a\u5148\u8ab2\u984c\u306e\u4e0b\u3001IDX\u3067AI\u9632\u885b\u3092\u958b\u59cb\u3057\u307e\u3057\u305f\u3002\u30d4\u30c3\u30c1\u306f\u30b7\u30f3\u30d7\u30eb\u3067\u3059\u3002\u65e5\u672c\u306e\u9632\u885b\u30a8\u30b3\u30b7\u30b9\u30c6\u30e0\u306b\u306f\u6df1\u3044\u5c02\u9580\u77e5\u8b58\u304c\u3042\u308a\u307e\u3059\u304c\u3001\u305d\u306e\u591a\u304f\u306f\u30b7\u30b9\u30c6\u30e0\u3067\u306f\u306a\u304f\u4eba\u306e\u4e2d\u306b\u3042\u308a\u307e\u3059\u3002.<\/p>\n<p>\u3053\u306e\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306f\u3001\u751f\u6210AI\u3092\u4f7f\u7528\u3057\u3066\u3001\u8a13\u7df4\u8a18\u9332\u3001\u6226\u8853\u30de\u30cb\u30e5\u30a2\u30eb\u3001\u88c5\u5099\u54c1\u30c7\u30fc\u30bf\u3001\u8abf\u9054\u5c65\u6b74\u3001\u5b89\u5168\u57fa\u6e96\u306a\u3069\u3001\u6563\u5728\u3059\u308b\u9632\u885b\u77e5\u8b58\u3092\u7d71\u5408\u3057\u3001\u69cb\u9020\u5316\u3057\u307e\u3059\u3002\u5358\u4e00\u306e\u30a4\u30f3\u30bf\u30fc\u30d5\u30a7\u30a4\u30b9\u3067\u69d8\u3005\u306a\u9818\u57df\u306e\u5168\u30c7\u30fc\u30bf\u306b\u30a2\u30af\u30bb\u30b9\u3067\u304d\u308b\u305f\u3081\u3001\u30e6\u30fc\u30b6\u30fc\u306f\u7570\u306a\u308b\u9818\u57df\u306e\u5168\u60c5\u5831\u3092\u691c\u7d22\u30fb\u6bd4\u8f03\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u3053\u306e\u30b7\u30b9\u30c6\u30e0\u306f\u307e\u305f\u3001\u8a13\u7df4\u30c7\u30fc\u30bf\u306e\u8981\u7d04\u3001\u88c5\u5099\u54c1\u306e\u554f\u984c\u306e\u539f\u56e0\u306e\u7279\u5b9a\u3001\u6226\u8853\u6539\u8a02\u306e\u8ffd\u8de1\u3001\u610f\u601d\u6c7a\u5b9a\u652f\u63f4\u306e\u305f\u3081\u306e\u904e\u53bb\u306e\u4f5c\u6226\u306e\u53c2\u7167\u3082\u30b5\u30dd\u30fc\u30c8\u3057\u307e\u3059\u3002.<\/p>\n<p>\u80cc\u666f\u304c\u91cd\u8981\u65e5\u672c\u306e\u9632\u885b\u5206\u91ce\u306f\u3001\u5c02\u9580\u5bb6\u306e\u9ad8\u9f62\u5316\u3001\u65ad\u7247\u5316\u3055\u308c\u305f\u30c7\u30fc\u30bf\u3001\u6a5f\u5bc6\u4fdd\u6301\u306e\u61f8\u5ff5\u306b\u3088\u308b\u6d77\u5916AI\u306e\u53b3\u3057\u3044\u5229\u7528\u5236\u9650\u306b\u5bfe\u51e6\u3057\u3066\u3044\u307e\u3059\u3002AI Defense on IDX\u306f\u3001\u30c7\u30b8\u30bf\u30eb\u30c8\u30e9\u30f3\u30b9\u30d5\u30a9\u30fc\u30e1\u30fc\u30b7\u30e7\u30f3\u3092\u53ef\u80fd\u306b\u3057\u306a\u304c\u3089\u6a5f\u5bc6\u60c5\u5831\u3092\u4fdd\u6301\u3059\u308b\u305f\u3081\u306b\u8a2d\u8a08\u3055\u308c\u305f\u3001\u5b89\u5168\u306a\u30aa\u30f3\u30d7\u30ec\u30df\u30b9\u307e\u305f\u306f\u30af\u30ed\u30fc\u30ba\u30c9\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306e\u30a4\u30f3\u30d5\u30e9\u3068\u3057\u3066\u4f4d\u7f6e\u3065\u3051\u3089\u308c\u3066\u3044\u307e\u3059\u3002.<\/p>\n<h4>\u3053\u3061\u3089\u3082\u304a\u8aad\u307f\u304f\u3060\u3055\u3044\uff1a <a class=\"p-url\" href=\"https:\/\/itbusinesstoday.com\/ja\/gov-tech\/japans-political-landscape-faces-new-test-as-ai-tools-enter-election-campaigns\/\" rel=\"bookmark\">AI\u304c\u9078\u6319\u6226\u306b\u9032\u51fa\u3057\u3001\u65b0\u305f\u306a\u8a66\u7df4\u306b\u76f4\u9762\u3059\u308b\u65e5\u672c\u306e\u653f\u6cbb\u60c5\u52e2<\/a><\/h4>\n<p>\u3088\u308a\u5e83\u7bc4\u306a\u50be\u5411\u306f\u660e\u3089\u304b\u3067\u3059\u3002\u56fd\u5bb6\u5b89\u5168\u4fdd\u969c\u6226\u7565\u306f\u3001\u4eca\u3084\u30c7\u30fc\u30bf\u30ac\u30d0\u30ca\u30f3\u30b9\u3068AI\u80fd\u529b\u3068\u7d50\u3073\u3064\u3044\u3066\u3044\u307e\u3059\u3002\u9632\u885b\u7d44\u7e54\u304c\u77e5\u8b58\u79fb\u8ee2\u3068\u610f\u601d\u6c7a\u5b9a\u652f\u63f4\u3092\u30b7\u30b9\u30c6\u30e0\u5316\u3067\u304d\u306a\u3051\u308c\u3070\u3001\u5236\u5ea6\u7684\u8a18\u61b6\u3092\u518d\u69cb\u7bc9\u3059\u308b\u3088\u308a\u3082\u65e9\u304f\u5931\u3046\u30ea\u30b9\u30af\u304c\u3042\u308a\u307e\u3059\u3002.<\/p>","protected":false},"excerpt":{"rendered":"<p>AI Data Corporation has launched AI Defense on IDX under the government\u2019s security priority agenda. The pitch is simple. Japan\u2019s defense ecosystem has deep expertise, but too much of it sits inside people, not systems. The platform uses generative AI to integrate and structure scattered defense knowledge across training records, tactical manuals, equipment data, procurement history, and safety standards. Users can search and compare all information across different domains because the system provides access to all data from various domains through a single interface. The system also supports summarizing training data, identifying causes of equipment issues, tracking tactical revisions, and referencing past operations for decision support. The context matters. Japan\u2019s [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":28872,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"wprm-recipe-roundup-name":"","wprm-recipe-roundup-description":"","postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[208,203,211,237,1838,206],"tags":[2345,2639,278,761,8583],"ppma_author":[572],"class_list":{"0":"post-28841","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apac","8":"category-gov-tech","9":"category-japan","10":"category-news","11":"category-quick-reads","12":"category-regional","13":"tag-ai-data-corporation","14":"tag-ai-defense","15":"tag-digital-transformation","16":"tag-gov-tech","17":"tag-national-security"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AI Defense on IDX works to prevent knowledge leaks<\/title>\n<meta name=\"description\" content=\"AI Data launches AI Defense on IDX to capture and secure defense expertise, turning institutional knowledge into protected digital systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itbusinesstoday.com\/ja\/gov-tech\/ai-defense-on-idx-targets-defense-knowledge-leaks\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI Defense on IDX works to prevent knowledge leaks\" \/>\n<meta property=\"og:description\" content=\"AI Data launches AI Defense on IDX to capture and secure defense expertise, turning institutional knowledge into protected digital systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itbusinesstoday.com\/ja\/gov-tech\/ai-defense-on-idx-targets-defense-knowledge-leaks\/\" \/>\n<meta property=\"og:site_name\" content=\"itbusinesstoday\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-24T11:07:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/02\/AI-Defense-on-IDX-targets-defense-knowledge-leaks.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1201\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"ITBT StaffWriter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"ITBT StaffWriter\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u5206\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI Defense on IDX works to prevent knowledge leaks","description":"AI Data launches AI Defense on IDX to capture and secure defense expertise, turning institutional knowledge into protected digital systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itbusinesstoday.com\/ja\/gov-tech\/ai-defense-on-idx-targets-defense-knowledge-leaks\/","og_locale":"ja_JP","og_type":"article","og_title":"AI Defense on IDX works to prevent knowledge leaks","og_description":"AI Data launches AI Defense on IDX to capture and secure defense expertise, turning institutional knowledge into protected digital systems.","og_url":"https:\/\/itbusinesstoday.com\/ja\/gov-tech\/ai-defense-on-idx-targets-defense-knowledge-leaks\/","og_site_name":"itbusinesstoday","article_published_time":"2026-02-24T11:07:59+00:00","og_image":[{"width":1201,"height":800,"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/02\/AI-Defense-on-IDX-targets-defense-knowledge-leaks.webp","type":"image\/webp"}],"author":"ITBT StaffWriter","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"ITBT StaffWriter","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"2\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itbusinesstoday.com\/gov-tech\/ai-defense-on-idx-targets-defense-knowledge-leaks\/#article","isPartOf":{"@id":"https:\/\/itbusinesstoday.com\/gov-tech\/ai-defense-on-idx-targets-defense-knowledge-leaks\/"},"author":{"name":"ITBT StaffWriter","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15"},"headline":"AI Defense on IDX targets defense knowledge leaks","datePublished":"2026-02-24T11:07:59+00:00","mainEntityOfPage":{"@id":"https:\/\/itbusinesstoday.com\/gov-tech\/ai-defense-on-idx-targets-defense-knowledge-leaks\/"},"wordCount":217,"publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"image":{"@id":"https:\/\/itbusinesstoday.com\/gov-tech\/ai-defense-on-idx-targets-defense-knowledge-leaks\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/02\/AI-Defense-on-IDX-targets-defense-knowledge-leaks.webp","keywords":["AI Data corporation","AI Defense","digital transformation","Gov tech","National Security"],"articleSection":["APAC","Gov Tech","Japan","News","Quick Reads","Regional"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/itbusinesstoday.com\/gov-tech\/ai-defense-on-idx-targets-defense-knowledge-leaks\/","url":"https:\/\/itbusinesstoday.com\/gov-tech\/ai-defense-on-idx-targets-defense-knowledge-leaks\/","name":"AI Defense on IDX works to prevent knowledge leaks","isPartOf":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itbusinesstoday.com\/gov-tech\/ai-defense-on-idx-targets-defense-knowledge-leaks\/#primaryimage"},"image":{"@id":"https:\/\/itbusinesstoday.com\/gov-tech\/ai-defense-on-idx-targets-defense-knowledge-leaks\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/02\/AI-Defense-on-IDX-targets-defense-knowledge-leaks.webp","datePublished":"2026-02-24T11:07:59+00:00","description":"AI Data launches AI Defense on IDX to capture and secure defense expertise, turning institutional knowledge into protected digital systems.","breadcrumb":{"@id":"https:\/\/itbusinesstoday.com\/gov-tech\/ai-defense-on-idx-targets-defense-knowledge-leaks\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itbusinesstoday.com\/gov-tech\/ai-defense-on-idx-targets-defense-knowledge-leaks\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/gov-tech\/ai-defense-on-idx-targets-defense-knowledge-leaks\/#primaryimage","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/02\/AI-Defense-on-IDX-targets-defense-knowledge-leaks.webp","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/02\/AI-Defense-on-IDX-targets-defense-knowledge-leaks.webp","width":1201,"height":800,"caption":"AI Data Corporation"},{"@type":"BreadcrumbList","@id":"https:\/\/itbusinesstoday.com\/gov-tech\/ai-defense-on-idx-targets-defense-knowledge-leaks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itbusinesstoday.com\/"},{"@type":"ListItem","position":2,"name":"AI Defense on IDX targets defense knowledge leaks"}]},{"@type":"WebSite","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","description":"","publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","width":663,"height":275,"caption":"itbusinesstoday"},"image":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15","name":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png90b3cb23d1d9c08733d969d29ea2d30d","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","caption":"ITBT StaffWriter"},"description":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc\u306f\u3001IT Business Today\u306e\u793e\u5185\u5bc4\u7a3f\u8005\u3067\u3001\u30bf\u30a4\u30e0\u30ea\u30fc\u306a\u30cb\u30e5\u30fc\u30b9\u3068QuickBytes\u306e\u914d\u4fe1\u3092\u62c5\u5f53\u3057\u3066\u3044\u307e\u3059\u3002IT\u3001\u30cf\u30a4\u30c6\u30af\u3001\u4f01\u696d\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u6700\u65b0\u52d5\u5411\u3092\u30ab\u30d0\u30fc\u3057\u3001\u7c21\u6f54\u3067\u30a4\u30f3\u30d1\u30af\u30c8\u306e\u3042\u308b\u6700\u65b0\u60c5\u5831\u3092\u8aad\u8005\u306b\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002","sameAs":["https:\/\/itbusinesstoday.com\/"],"url":"https:\/\/itbusinesstoday.com\/ja\/author\/itbt-staffwriter\/"}]}},"authors":[{"term_id":572,"user_id":7,"is_guest":0,"slug":"itbt-staffwriter","display_name":"ITBT StaffWriter","avatar_url":{"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","url2x":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/28841","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/comments?post=28841"}],"version-history":[{"count":1,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/28841\/revisions"}],"predecessor-version":[{"id":28842,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/28841\/revisions\/28842"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media\/28872"}],"wp:attachment":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media?parent=28841"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/categories?post=28841"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/tags?post=28841"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/ppma_author?post=28841"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}