{"id":30125,"date":"2026-03-20T12:08:21","date_gmt":"2026-03-20T12:08:21","guid":{"rendered":"https:\/\/itbusinesstoday.com\/?p=30125"},"modified":"2026-03-20T12:08:21","modified_gmt":"2026-03-20T12:08:21","slug":"keeper-security-secures-databases-against-breaches","status":"publish","type":"post","link":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/keeper-security-secures-databases-against-breaches\/","title":{"rendered":"Keeper Security\u306f\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\u3092\u4fb5\u5bb3\u304b\u3089\u4fdd\u8b77\u3057\u307e\u3059\u3002"},"content":{"rendered":"<p>Keeper Security\u306f\u3001RSA Conference 2026\u3067\u30c7\u30d3\u30e5\u30fc\u4e88\u5b9a\u306e\u300cKeeperDB\u300d\u3067PAM\u30b9\u30bf\u30c3\u30af\u306b\u65b0\u3057\u3044\u30ec\u30a4\u30e4\u30fc\u3092\u8ffd\u52a0\u3057\u307e\u3059\u3002\u30a2\u30a4\u30c7\u30a2\u306f\u7c21\u5358\u3067\u3059\u3002\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\u3078\u306e\u30a2\u30af\u30bb\u30b9\u306f\u3001\u307b\u3068\u3093\u3069\u306e\u4f01\u696d\u3067\u307e\u3060\u6df7\u4e71\u3057\u3066\u304a\u308a\u3001\u305d\u306e\u6df7\u4e71\u304c\u30ea\u30b9\u30af\u3092\u84c4\u7a4d\u3057\u3066\u3044\u307e\u3059\u3002.<\/p>\n<p>KeeperDB\u306f\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\u30a2\u30af\u30bb\u30b9\u3092\u76f4\u63a5Keeper vault\u306b\u5f15\u304d\u8fbc\u307f\u307e\u3059\u3002\u6563\u5728\u3059\u308b\u30c4\u30fc\u30eb\u3001\u5171\u6709\u3055\u308c\u305f\u8a8d\u8a3c\u60c5\u5831\u3001\u8ab0\u3082\u5b8c\u5168\u306b\u8ffd\u8de1\u3067\u304d\u306a\u3044\u4e00\u5ea6\u9650\u308a\u306e\u30c8\u30f3\u30cd\u30eb\u306f\u3082\u3046\u5fc5\u8981\u3042\u308a\u307e\u305b\u3093\u3002\u30a2\u30af\u30bb\u30b9\u306f\u30dd\u30ea\u30b7\u30fc\u3067\u5236\u5fa1\u3055\u308c\u3001\u30bb\u30c3\u30b7\u30e7\u30f3\u306f\u30ed\u30b0\u306b\u8a18\u9332\u3055\u308c\u3001\u8a8d\u8a3c\u60c5\u5831\u304c\u30e6\u30fc\u30b6\u30fc\u306b\u516c\u958b\u3055\u308c\u308b\u3053\u3068\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u3053\u308c\u3060\u3051\u3067\u3001\u591a\u304f\u306e\u4e00\u822c\u7684\u306a\u969c\u5bb3\u30dd\u30a4\u30f3\u30c8\u3092\u30b7\u30e3\u30c3\u30c8\u30c0\u30a6\u30f3\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002.<\/p>\n<p>\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\u306f\u5358\u306a\u308b\u8cc7\u7523\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\u3053\u305d\u304c\u8cc7\u7523\u306a\u306e\u3067\u3059\u3002\u3057\u304b\u3057\u3001\u591a\u304f\u306e\u30c1\u30fc\u30e0\u306f\u3001\u4f5c\u696d\u306e\u53ef\u8996\u5316\u3068\u7ba1\u7406\u30b7\u30b9\u30c6\u30e0\u3092\u69cb\u7bc9\u3059\u308b\u5fc5\u8981\u6027\u304b\u3089\u3001\u3044\u307e\u3060\u306b\u53e4\u3044\u30ef\u30fc\u30af\u30d5\u30ed\u30fc\u3092\u4f7f\u7528\u3057\u3066\u3044\u307e\u3059\u3002\u4f1a\u793e\u306f\u3001\u5f93\u696d\u54e1\u306e\u30a2\u30af\u30bb\u30b9\u8cc7\u683c\u60c5\u5831\u306e\u4e0d\u6b63\u958b\u793a\u3092\u542b\u3080\u5185\u90e8\u8105\u5a01\u304b\u3089\u6700\u5927\u306e\u5371\u6a5f\u306b\u76f4\u9762\u3057\u3066\u3044\u307e\u3059\u3002.<\/p>\n<h4>\u3053\u3061\u3089\u3082\u304a\u8aad\u307f\u304f\u3060\u3055\u3044\uff1a <a class=\"p-url\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/japan-targets-threefold-growth-in-domestic-cybersecurity-industry\/\" rel=\"bookmark\">\u56fd\u5185\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7523\u696d\u306e3\u500d\u6210\u9577\u3092\u76ee\u6307\u3059\u65e5\u672c<\/a><\/h4>\n<p>KeeperDB\u306f\u307e\u305f\u3001\u8aad\u307f\u53d6\u308a\u5c02\u7528\u30a2\u30af\u30bb\u30b9\u3001\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u8ffd\u8de1\u3001\u304a\u3088\u3073\u5b8c\u5168\u306a\u30bb\u30c3\u30b7\u30e7\u30f3\u8a18\u9332\u306a\u3069\u306e\u53b3\u683c\u306a\u5236\u5fa1\u3092\u3082\u305f\u3089\u3057\u307e\u3059\u3002\u65e2\u5b58\u306e\u30c4\u30fc\u30eb\u3092\u6368\u3066\u305f\u304f\u306a\u3044\u30c1\u30fc\u30e0\u306e\u305f\u3081\u306b\u3001\u30d7\u30ed\u30ad\u30b7\u30aa\u30d7\u30b7\u30e7\u30f3\u306f\u3001\u96c6\u4e2d\u7ba1\u7406\u3092\u5b9f\u65bd\u3057\u306a\u304c\u3089\u3001\u4e92\u63db\u6027\u3092\u7dad\u6301\u3057\u307e\u3059\u3002.<\/p>\n<p>\u30ba\u30fc\u30e0\u30a2\u30a6\u30c8\u3059\u308c\u3070\u3001\u3053\u308c\u306f\u696d\u754c\u304c\u5411\u304b\u3063\u3066\u3044\u308b\u65b9\u5411\u3068\u4e00\u81f4\u3057\u307e\u3059\u3002\u30bc\u30ed\u30fb\u30c8\u30e9\u30b9\u30c8\u306f\u3082\u306f\u3084ID\u3060\u3051\u306e\u554f\u984c\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u305d\u308c\u306f\u30c7\u30fc\u30bf\u30d9\u30fc\u30b9\u306e\u3088\u3046\u306a\u30a4\u30f3\u30d5\u30e9\u30ec\u30a4\u30e4\u30fc\u306b\u6df1\u304f\u5165\u308a\u8fbc\u3093\u3067\u3044\u307e\u3059\u3002. <a href=\"https:\/\/www.keepersecurity.com\/\">\u30ad\u30fc\u30d1\u30fc<\/a> \u306f\u57fa\u672c\u7684\u306b\u3001\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\u306f\u30ed\u30b0\u30a4\u30f3\u3067\u6b62\u307e\u308b\u3079\u304d\u3067\u306f\u306a\u3044\u3068\u8a00\u3063\u3066\u3044\u308b\u306e\u3067\u3059\u3002\u305d\u308c\u306f\u30c7\u30fc\u30bf\u305d\u306e\u3082\u306e\u306b\u81f3\u308b\u307e\u3067\u7d9a\u304f\u3079\u304d\u3067\u3059\u3002.<\/p>","protected":false},"excerpt":{"rendered":"<p>Keeper Security is adding a new layer to its PAM stack with \u2018KeeperDB,\u2019 set to debut at RSA Conference 2026. The idea is straightforward. Database access is still messy in most companies, and that mess is where risk builds up. KeeperDB pulls database access directly into the Keeper vault. No more scattered tools, shared credentials, or one-off tunnels that nobody fully tracks. Access is controlled through policies, sessions are logged, and credentials are never exposed to the user. That alone shuts down a lot of common fainlure points. This matters because databases are not just another asset. They are the asset. Yet many teams still use their old workflows because [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":30165,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"wprm-recipe-roundup-name":"","wprm-recipe-roundup-description":"","postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[208,184,211,237,1838,206,85],"tags":[9499,110,9229,12050,1491],"ppma_author":[572],"class_list":{"0":"post-30125","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apac","8":"category-cybersecurity","9":"category-japan","10":"category-news","11":"category-quick-reads","12":"category-regional","13":"category-tech","14":"tag-application-development","15":"tag-cybersecurity","16":"tag-keeper-security","17":"tag-keeperdb","18":"tag-pam-solution"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Keeper Security Locks Down Database Access<\/title>\n<meta name=\"description\" content=\"Keeper Security introduces KeeperDB, enhancing its PAM stack to secure database and reduce risks in complex enterprise environments.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/keeper-security-secures-databases-against-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keeper Security Locks Down Database Access\" \/>\n<meta property=\"og:description\" content=\"Keeper Security introduces KeeperDB, enhancing its PAM stack to secure database and reduce risks in complex enterprise environments.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/keeper-security-secures-databases-against-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"itbusinesstoday\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-20T12:08:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/03\/Keeper-Security-adds-KeeperDB\u2122_a-zero-trust-database-access-feature_-to-KeeperPAM.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1201\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"ITBT StaffWriter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"ITBT StaffWriter\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u5206\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Keeper Security Locks Down Database Access","description":"Keeper Security introduces KeeperDB, enhancing its PAM stack to secure database and reduce risks in complex enterprise environments.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/keeper-security-secures-databases-against-breaches\/","og_locale":"ja_JP","og_type":"article","og_title":"Keeper Security Locks Down Database Access","og_description":"Keeper Security introduces KeeperDB, enhancing its PAM stack to secure database and reduce risks in complex enterprise environments.","og_url":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/keeper-security-secures-databases-against-breaches\/","og_site_name":"itbusinesstoday","article_published_time":"2026-03-20T12:08:21+00:00","og_image":[{"width":1201,"height":800,"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/03\/Keeper-Security-adds-KeeperDB\u2122_a-zero-trust-database-access-feature_-to-KeeperPAM.webp","type":"image\/webp"}],"author":"ITBT StaffWriter","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"ITBT StaffWriter","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"2\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/keeper-security-secures-databases-against-breaches\/#article","isPartOf":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/keeper-security-secures-databases-against-breaches\/"},"author":{"name":"ITBT StaffWriter","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15"},"headline":"Keeper Security Secures Databases Against Breaches","datePublished":"2026-03-20T12:08:21+00:00","mainEntityOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/keeper-security-secures-databases-against-breaches\/"},"wordCount":237,"publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/keeper-security-secures-databases-against-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/03\/Keeper-Security-adds-KeeperDB\u2122_a-zero-trust-database-access-feature_-to-KeeperPAM.webp","keywords":["application development","cybersecurity","Keeper Security","KeeperDB","PAM solution"],"articleSection":["APAC","Cybersecurity","Japan","News","Quick Reads","Regional","Tech"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/keeper-security-secures-databases-against-breaches\/","url":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/keeper-security-secures-databases-against-breaches\/","name":"Keeper Security Locks Down Database Access","isPartOf":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/keeper-security-secures-databases-against-breaches\/#primaryimage"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/keeper-security-secures-databases-against-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/03\/Keeper-Security-adds-KeeperDB\u2122_a-zero-trust-database-access-feature_-to-KeeperPAM.webp","datePublished":"2026-03-20T12:08:21+00:00","description":"Keeper Security introduces KeeperDB, enhancing its PAM stack to secure database and reduce risks in complex enterprise environments.","breadcrumb":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/keeper-security-secures-databases-against-breaches\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/keeper-security-secures-databases-against-breaches\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/keeper-security-secures-databases-against-breaches\/#primaryimage","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/03\/Keeper-Security-adds-KeeperDB\u2122_a-zero-trust-database-access-feature_-to-KeeperPAM.webp","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/03\/Keeper-Security-adds-KeeperDB\u2122_a-zero-trust-database-access-feature_-to-KeeperPAM.webp","width":1201,"height":800,"caption":"Keeper Security"},{"@type":"BreadcrumbList","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/keeper-security-secures-databases-against-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itbusinesstoday.com\/"},{"@type":"ListItem","position":2,"name":"Keeper Security Secures Databases Against Breaches"}]},{"@type":"WebSite","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","description":"","publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","width":663,"height":275,"caption":"itbusinesstoday"},"image":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15","name":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png90b3cb23d1d9c08733d969d29ea2d30d","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","caption":"ITBT StaffWriter"},"description":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc\u306f\u3001IT Business Today\u306e\u793e\u5185\u5bc4\u7a3f\u8005\u3067\u3001\u30bf\u30a4\u30e0\u30ea\u30fc\u306a\u30cb\u30e5\u30fc\u30b9\u3068QuickBytes\u306e\u914d\u4fe1\u3092\u62c5\u5f53\u3057\u3066\u3044\u307e\u3059\u3002IT\u3001\u30cf\u30a4\u30c6\u30af\u3001\u4f01\u696d\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u6700\u65b0\u52d5\u5411\u3092\u30ab\u30d0\u30fc\u3057\u3001\u7c21\u6f54\u3067\u30a4\u30f3\u30d1\u30af\u30c8\u306e\u3042\u308b\u6700\u65b0\u60c5\u5831\u3092\u8aad\u8005\u306b\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002","sameAs":["https:\/\/itbusinesstoday.com\/"],"url":"https:\/\/itbusinesstoday.com\/ja\/author\/itbt-staffwriter\/"}]}},"authors":[{"term_id":572,"user_id":7,"is_guest":0,"slug":"itbt-staffwriter","display_name":"ITBT StaffWriter","avatar_url":{"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","url2x":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/30125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/comments?post=30125"}],"version-history":[{"count":1,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/30125\/revisions"}],"predecessor-version":[{"id":30126,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/30125\/revisions\/30126"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media\/30165"}],"wp:attachment":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media?parent=30125"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/categories?post=30125"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/tags?post=30125"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/ppma_author?post=30125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}