{"id":30525,"date":"2026-03-27T10:46:41","date_gmt":"2026-03-27T10:46:41","guid":{"rendered":"https:\/\/itbusinesstoday.com\/?p=30525"},"modified":"2026-03-27T10:46:41","modified_gmt":"2026-03-27T10:46:41","slug":"gsx-and-segue-security-streamline-compliance-tasks","status":"publish","type":"post","link":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/gsx-and-segue-security-streamline-compliance-tasks\/","title":{"rendered":"GSX\u3068Segue Security\u304c\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u30bf\u30b9\u30af\u3092\u5408\u7406\u5316"},"content":{"rendered":"<p>\u30b0\u30ed\u30fc\u30d0\u30eb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a8\u30ad\u30b9\u30d1\u30fc\u30c8\u682a\u5f0f\u4f1a\u793e\u306f\u3001\u30bb\u30b0\u30a8\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u682a\u5f0f\u4f1a\u793e\u3068\u63d0\u643a\u3057\u3001\u300c\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c9\u30ad\u30e5\u30e1\u30f3\u30c8\u8a3a\u65ad\u300d\u3092\u958b\u59cb\u3057\u307e\u3057\u305f\u3002\u3053\u306e\u30b7\u30b9\u30c6\u30e0\u306f\u3001\u5b9f\u969b\u306e\u554f\u984c\u3092\u89e3\u6c7a\u3059\u308b\u305f\u3081\u306b\u958b\u767a\u3055\u308c\u307e\u3057\u305f\u3002\u4f01\u696d\u306f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8981\u4ef6\u3092\u6e80\u305f\u3059\u7fa9\u52d9\u3092\u7406\u89e3\u3057\u306a\u304c\u3089\u3082\u3001\u9032\u5316\u3059\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u898f\u5236\u3092\u542b\u3080\u5e83\u7bc4\u306a\u30dd\u30ea\u30b7\u30fc\u6587\u66f8\u306e\u898b\u76f4\u3057\u306b\u6642\u9593\u3068\u30b3\u30b9\u30c8\u3092\u8cbb\u3084\u3055\u306a\u3051\u308c\u3070\u306a\u3089\u306a\u3044\u3068\u3044\u3046\u8ab2\u984c\u306b\u76f4\u9762\u3057\u3066\u3044\u307e\u3059\u3002.<\/p>\n<p>\u3053\u306e\u30b5\u30fc\u30d3\u30b9\u306f\u30d7\u30ed\u30bb\u30b9\u3092\u5206\u5272\u3057\u307e\u3059\u3002\u307e\u305a, <a href=\"https:\/\/segue-sec.co.jp\/\">\u30bb\u30b0\u30a8<\/a>\u2019\u306eAI\u30c4\u30fc\u30ebRiskLoom\u306f\u3001\u793e\u5185\u6587\u66f8\u3092\u30b9\u30ad\u30e3\u30f3\u3057\u3001ISMS JIS Q 27002\u3084CIS Controls\u306e\u3088\u3046\u306a\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u3068\u30de\u30c3\u30d4\u30f3\u30b0\u3057\u307e\u3059\u3002\u3053\u308c\u306b\u3088\u308a\u3001\u30ae\u30e3\u30c3\u30d7\u3001\u6b20\u843d\u9818\u57df\u3001\u5f31\u3044\u6574\u5408\u6027\u304c\u6d6e\u304d\u5f6b\u308a\u306b\u306a\u308a\u307e\u3059\u3002\u305d\u306e\u5f8c\u3001GSX\u306e\u30b3\u30f3\u30b5\u30eb\u30bf\u30f3\u30c8\u304c\u3053\u308c\u3089\u306e\u767a\u898b\u3092\u30ec\u30d3\u30e5\u30fc\u3057\u3001\u5b9f\u969b\u306b\u6ce8\u610f\u304c\u5fc5\u8981\u306a\u3082\u306e\u306b\u512a\u5148\u9806\u4f4d\u3092\u4ed8\u3051\u307e\u3059\u3002.<\/p>\n<p>\u305d\u306e\u7d50\u679c\u3001\u660e\u78ba\u306a\u30ae\u30e3\u30c3\u30d7\u3068\u6b21\u306e\u30b9\u30c6\u30c3\u30d7\u304c\u8a18\u8f09\u3055\u308c\u305f\u7126\u70b9\u306e\u7d5e\u3089\u308c\u305f\u30ec\u30dd\u30fc\u30c8\u304c\u4f5c\u6210\u3055\u308c\u307e\u3059\u3002\u672c\u683c\u7684\u306a\u76e3\u67fb\u306f\u4e0d\u8981\u3067\u3001\u4e0d\u5fc5\u8981\u306a\u30ec\u30a4\u30e4\u30fc\u3082\u3042\u308a\u307e\u305b\u3093\u3002.<\/p>\n<h4>\u3053\u3061\u3089\u3082\u304a\u8aad\u307f\u304f\u3060\u3055\u3044\uff1a <a class=\"p-url\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/neojapan-and-recomot-enable-vpn-free-remote-access\/\" rel=\"bookmark\">\u30cd\u30aa\u30b8\u30e3\u30d1\u30f3\u3068\u30ec\u30b3\u30e2\u30c3\u30c8\u3001VPN\u3092\u5229\u7528\u3057\u306a\u3044\u30ea\u30e2\u30fc\u30c8\u30a2\u30af\u30bb\u30b9\u3092\u5b9f\u73fe<\/a><\/h4>\n<p>\u3053\u308c\u306f\u3001\u7279\u306b\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u3084\u696d\u7a2e\u7279\u6709\u306e\u898f\u5236\u304c\u5f37\u5316\u3055\u308c\u3001\u696d\u754c\u5168\u4f53\u3067\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u3078\u306e\u5727\u529b\u304c\u9ad8\u307e\u3063\u3066\u3044\u308b\u305f\u3081\u3067\u3059\u3002\u307b\u3068\u3093\u3069\u306e\u4f01\u696d\u306f\u3001\u3059\u3079\u3066\u3092\u624b\u4f5c\u696d\u3067\u518d\u30c1\u30a7\u30c3\u30af\u3057\u7d9a\u3051\u308b\u5e2f\u57df\u5e45\u3092\u6301\u3063\u3066\u3044\u307e\u305b\u3093\u3002.<\/p>\n<p>\u4f55 <a href=\"https:\/\/www.gsx.co.jp\/\">GSX<\/a> \u304c\u3053\u3053\u3067\u884c\u3063\u3066\u3044\u308b\u306e\u306f\u5b9f\u8df5\u7684\u306a\u3053\u3068\u3067\u3059\u3002\u7e70\u308a\u8fd4\u3057\u306e\u5206\u6790\u306fAI\u306b\u4efb\u305b\u3001\u5224\u65ad\u306f\u5c02\u9580\u5bb6\u306b\u4efb\u305b\u307e\u3059\u3002\u3053\u306e\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306f\u3001\u73fe\u5728\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u696d\u52d9\u306b\u3088\u308a\u826f\u3044\u7d50\u679c\u3092\u3082\u305f\u3089\u3059\u3068\u540c\u6642\u306b\u3001\u3088\u308a\u8fc5\u901f\u3067\u5b89\u4fa1\u306a\u7d50\u679c\u3092\u63d0\u4f9b\u3057\u307e\u3059\u3002.<\/p>","protected":false},"excerpt":{"rendered":"<p>Global Security Experts Co., Ltd. has partnered with Segue Security Co., Ltd. to launch \u2018Security Document Diagnosis.\u2019 The system was developed to solve an actual problem. The companies understand their obligation to meet security requirements yet face challenges because they must spend time and money reviewing extensive policy documents which contain evolving security regulations. The service splits the process. First, Segue\u2019s AI tool RiskLoom scans internal documents and maps them against frameworks like ISMS JIS Q 27002 and CIS Controls. It highlights gaps, missing areas, and weak alignment. Then GSX consultants step in to review those findings and prioritize what actually needs attention. The result is a focused report with [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":30557,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"wprm-recipe-roundup-name":"","wprm-recipe-roundup-description":"","postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[208,184,211,237,1838,206,85],"tags":[110,278,12169,12171,12170],"ppma_author":[572],"class_list":{"0":"post-30525","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apac","8":"category-cybersecurity","9":"category-japan","10":"category-news","11":"category-quick-reads","12":"category-regional","13":"category-tech","14":"tag-cybersecurity","15":"tag-digital-transformation","16":"tag-enterprise-security","17":"tag-global-security-experts","18":"tag-segue-security"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>GSX and Segue Security Tackle Compliance Challenges<\/title>\n<meta name=\"description\" content=\"Global Security Experts and Segue Security launch Security Document Diagnosis to streamline compliance by automating complex policy reviews.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/gsx-and-segue-security-streamline-compliance-tasks\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GSX and Segue Security Tackle Compliance Challenges\" \/>\n<meta property=\"og:description\" content=\"Global Security Experts and Segue Security launch Security Document Diagnosis to streamline compliance by automating complex policy reviews.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/gsx-and-segue-security-streamline-compliance-tasks\/\" \/>\n<meta property=\"og:site_name\" content=\"itbusinesstoday\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-27T10:46:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/03\/GSX-and-Segue-Security-Streamline-Compliance-Tasks.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1201\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"ITBT StaffWriter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"ITBT StaffWriter\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u5206\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GSX and Segue Security Tackle Compliance Challenges","description":"Global Security Experts and Segue Security launch Security Document Diagnosis to streamline compliance by automating complex policy reviews.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/gsx-and-segue-security-streamline-compliance-tasks\/","og_locale":"ja_JP","og_type":"article","og_title":"GSX and Segue Security Tackle Compliance Challenges","og_description":"Global Security Experts and Segue Security launch Security Document Diagnosis to streamline compliance by automating complex policy reviews.","og_url":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/gsx-and-segue-security-streamline-compliance-tasks\/","og_site_name":"itbusinesstoday","article_published_time":"2026-03-27T10:46:41+00:00","og_image":[{"width":1201,"height":800,"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/03\/GSX-and-Segue-Security-Streamline-Compliance-Tasks.webp","type":"image\/webp"}],"author":"ITBT StaffWriter","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"ITBT StaffWriter","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"2\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gsx-and-segue-security-streamline-compliance-tasks\/#article","isPartOf":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gsx-and-segue-security-streamline-compliance-tasks\/"},"author":{"name":"ITBT StaffWriter","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15"},"headline":"GSX and Segue Security Streamline Compliance Tasks","datePublished":"2026-03-27T10:46:41+00:00","mainEntityOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gsx-and-segue-security-streamline-compliance-tasks\/"},"wordCount":199,"publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gsx-and-segue-security-streamline-compliance-tasks\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/03\/GSX-and-Segue-Security-Streamline-Compliance-Tasks.webp","keywords":["cybersecurity","digital transformation","Enterprise Security","Global Security Experts","Segue Security"],"articleSection":["APAC","Cybersecurity","Japan","News","Quick Reads","Regional","Tech"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gsx-and-segue-security-streamline-compliance-tasks\/","url":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gsx-and-segue-security-streamline-compliance-tasks\/","name":"GSX and Segue Security Tackle Compliance Challenges","isPartOf":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gsx-and-segue-security-streamline-compliance-tasks\/#primaryimage"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gsx-and-segue-security-streamline-compliance-tasks\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/03\/GSX-and-Segue-Security-Streamline-Compliance-Tasks.webp","datePublished":"2026-03-27T10:46:41+00:00","description":"Global Security Experts and Segue Security launch Security Document Diagnosis to streamline compliance by automating complex policy reviews.","breadcrumb":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gsx-and-segue-security-streamline-compliance-tasks\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gsx-and-segue-security-streamline-compliance-tasks\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gsx-and-segue-security-streamline-compliance-tasks\/#primaryimage","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/03\/GSX-and-Segue-Security-Streamline-Compliance-Tasks.webp","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/03\/GSX-and-Segue-Security-Streamline-Compliance-Tasks.webp","width":1201,"height":800,"caption":"GSX"},{"@type":"BreadcrumbList","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gsx-and-segue-security-streamline-compliance-tasks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itbusinesstoday.com\/"},{"@type":"ListItem","position":2,"name":"GSX and Segue Security Streamline Compliance Tasks"}]},{"@type":"WebSite","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","description":"","publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","width":663,"height":275,"caption":"itbusinesstoday"},"image":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15","name":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png90b3cb23d1d9c08733d969d29ea2d30d","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","caption":"ITBT StaffWriter"},"description":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc\u306f\u3001IT Business Today\u306e\u793e\u5185\u5bc4\u7a3f\u8005\u3067\u3001\u30bf\u30a4\u30e0\u30ea\u30fc\u306a\u30cb\u30e5\u30fc\u30b9\u3068QuickBytes\u306e\u914d\u4fe1\u3092\u62c5\u5f53\u3057\u3066\u3044\u307e\u3059\u3002IT\u3001\u30cf\u30a4\u30c6\u30af\u3001\u4f01\u696d\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u6700\u65b0\u52d5\u5411\u3092\u30ab\u30d0\u30fc\u3057\u3001\u7c21\u6f54\u3067\u30a4\u30f3\u30d1\u30af\u30c8\u306e\u3042\u308b\u6700\u65b0\u60c5\u5831\u3092\u8aad\u8005\u306b\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002","sameAs":["https:\/\/itbusinesstoday.com\/"],"url":"https:\/\/itbusinesstoday.com\/ja\/author\/itbt-staffwriter\/"}]}},"authors":[{"term_id":572,"user_id":7,"is_guest":0,"slug":"itbt-staffwriter","display_name":"ITBT StaffWriter","avatar_url":{"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","url2x":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/30525","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/comments?post=30525"}],"version-history":[{"count":2,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/30525\/revisions"}],"predecessor-version":[{"id":30554,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/30525\/revisions\/30554"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media\/30557"}],"wp:attachment":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media?parent=30525"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/categories?post=30525"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/tags?post=30525"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/ppma_author?post=30525"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}