{"id":30528,"date":"2026-03-27T10:47:30","date_gmt":"2026-03-27T10:47:30","guid":{"rendered":"https:\/\/itbusinesstoday.com\/?p=30528"},"modified":"2026-03-27T10:47:30","modified_gmt":"2026-03-27T10:47:30","slug":"riskloom-focuses-on-clearer-compliance-processes","status":"publish","type":"post","link":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/riskloom-focuses-on-clearer-compliance-processes\/","title":{"rendered":"RiskLoom\u3001\u3088\u308a\u660e\u78ba\u306a\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u30fb\u30d7\u30ed\u30bb\u30b9\u306b\u6ce8\u529b"},"content":{"rendered":"<p><a href=\"https:\/\/segue-sec.co.jp\/\">\u30bb\u30b0\u30a8\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u682a\u5f0f\u4f1a\u793e<\/a>.\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u6587\u66f8\u3092\u8907\u6570\u306e\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u306b\u7167\u3089\u3057\u5408\u308f\u305b\u3066\u30c1\u30a7\u30c3\u30af\u3059\u308bAI\u3092\u6d3b\u7528\u3057\u305f\u30b5\u30fc\u30d3\u30b9\u300cRiskLoom\u300d\u306e\u63d0\u4f9b\u3092\u958b\u59cb\u3057\u307e\u3057\u305f\u3002\u3053\u306e\u30b5\u30fc\u30d3\u30b9\u306f\u8907\u96d1\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u4f01\u696d\u306f\u3059\u3067\u306b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u306b\u5f93\u304a\u3046\u3068\u3057\u3066\u3044\u307e\u3059\u304c\u3001\u6587\u66f8\u304c\u5b9f\u969b\u306b\u305d\u306e\u57fa\u6e96\u306b\u5408\u81f4\u3057\u3066\u3044\u308b\u304b\u3069\u3046\u304b\u3092\u691c\u8a3c\u3059\u308b\u306e\u306f\u9762\u5012\u3067\u3001\u624b\u4f5c\u696d\u3067\u3042\u308a\u3001\u591a\u304f\u306e\u5834\u5408\u3001\u305d\u308c\u3092\u51e6\u7406\u3059\u308b\u4eba\u306b\u4f9d\u5b58\u3057\u307e\u3059\u3002.<\/p>\n<p>RiskLoom\u306f\u305d\u308c\u3092\u89e3\u6c7a\u3057\u307e\u3059\u3002\u3042\u306a\u305f\u306e\u65b9\u91dd\u3068\u624b\u9806\u3092\u30a2\u30c3\u30d7\u30ed\u30fc\u30c9\u3057\u3001AI\u30b7\u30b9\u30c6\u30e0\u304cISMS\u6a19\u6e96\u3001CIS\u30b3\u30f3\u30c8\u30ed\u30fc\u30eb\u3001\u7279\u5b9a\u306e\u696d\u754c\u30ac\u30a4\u30c9\u30e9\u30a4\u30f3\u3068\u6bd4\u8f03\u3057\u307e\u3059\u3002\u30b7\u30b9\u30c6\u30e0\u306f\u3001\u898f\u5236\u3092\u9075\u5b88\u3057\u3066\u3044\u308b\u5206\u91ce\u3001\u9075\u5b88\u3057\u3066\u3044\u306a\u3044\u5206\u91ce\u3001\u6b20\u3051\u3066\u3044\u308b\u8981\u7d20\u3092\u8868\u793a\u3057\u307e\u3059\u3002\u65e2\u5b58\u306e\u30ae\u30e3\u30c3\u30d7\u3068\u6f5c\u5728\u7684\u306a\u5371\u967a\u6027\u3092\u3001\u6574\u7406\u3055\u308c\u305f\u8868\u793a\u3067\u78ba\u8a8d\u3067\u304d\u308b\u305f\u3081\u3001\u4e00\u5b57\u4e00\u53e5\u76ee\u3092\u901a\u3059\u5fc5\u8981\u304c\u3042\u308a\u307e\u305b\u3093\u3002.<\/p>\n<p>\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u696d\u52d9\u304c\u91cd\u304f\u306a\u3063\u3066\u3044\u308b\u304b\u3089\u3067\u3059\u3002\u898f\u5236\u306e\u5897\u52a0\u3001\u66f4\u65b0\u306e\u5897\u52a0\u3001\u6574\u5408\u6027\u3092\u8a3c\u660e\u3059\u308b\u30d7\u30ec\u30c3\u30b7\u30e3\u30fc\u306e\u5897\u52a0\u3002\u5c0f\u898f\u6a21\u306a\u30c1\u30fc\u30e0\u306f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5c02\u4efb\u306e\u30ea\u30bd\u30fc\u30b9\u304c\u306a\u3044\u305f\u3081\u3001\u6700\u3082\u82e6\u52b4\u3057\u3066\u3044\u307e\u3059\u3002.<\/p>\n<h4>\u3053\u3061\u3089\u3082\u304a\u8aad\u307f\u304f\u3060\u3055\u3044\uff1a <a class=\"p-url\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/mitsui-co-debuts-ai-powered-data-security-dspm-service\/\" rel=\"bookmark\">\u4e09\u4e95\u7269\u7523\u3001AI\u3092\u6d3b\u7528\u3057\u305f\u30c7\u30fc\u30bf\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3DSPM\u30b5\u30fc\u30d3\u30b9\u3092\u767a\u8868<\/a><\/h4>\n<p>\u3053\u3053\u306b\u306f\u30b3\u30f3\u30b5\u30eb\u30c6\u30a3\u30f3\u30b0\u306e\u5074\u9762\u3082\u3042\u308a\u307e\u3059\u3002\u73fe\u5728\u306e\u6587\u66f8\u30ec\u30d3\u30e5\u30fc\u306f\u3001\u898f\u6a21\u3092\u62e1\u5927\u3059\u308b\u306e\u304c\u96e3\u3057\u304f\u3001\u30c1\u30fc\u30e0\u9593\u3067\u4e00\u8cab\u6027\u304c\u3042\u308a\u307e\u305b\u3093\u3002RiskLoom\u306e\u3088\u3046\u306a\u30c4\u30fc\u30eb\u306f\u3001\u305d\u306e\u30d7\u30ed\u30bb\u30b9\u3092\u6a19\u6e96\u5316\u3057\u3001\u30a2\u30a6\u30c8\u30d7\u30c3\u30c8\u306e\u518d\u73fe\u6027\u3092\u9ad8\u3081\u3001\u8aac\u660e\u3057\u3084\u3059\u304f\u3059\u308b\u3053\u3068\u3092\u76ee\u7684\u3068\u3057\u3066\u3044\u307e\u3059\u3002.<\/p>\n<p>\u30ba\u30fc\u30e0\u30a2\u30a6\u30c8\u3059\u308c\u3070\u3001\u3053\u308c\u304c\u5e02\u5834\u306e\u65b9\u5411\u6027\u3002AI\u304c\u96d1\u52d9\u3092\u51e6\u7406\u3002\u5224\u65ad\u306f\u4eba\u9593\u304c\u884c\u3044\u307e\u3059\u3002\u5b8c\u74a7\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u304c\u3001\u500b\u4eba\u306e\u7d4c\u9a13\u3060\u3051\u306b\u983c\u308b\u3088\u308a\u306f\u305a\u3063\u3068\u5b9f\u884c\u53ef\u80fd\u3067\u3059\u3002.<\/p>","protected":false},"excerpt":{"rendered":"<p>Segue Security Co., Ltd. has launched RiskLoom, an AI-based service that checks security policy documents against multiple guidelines. The pitch is not complicated. Companies are already trying to follow security frameworks, but verifying whether their documents actually match those standards is messy, manual, and often depends on whoever is handling it. RiskLoom tries to fix that. You upload your policies and procedures, which the AI system compares to ISMS standards and CIS Controls and specific industry guidelines. The system shows the areas which comply with regulations and the areas which fail to comply and the elements which are missing. You get to see the existing gaps together with their potential [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":30558,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"wprm-recipe-roundup-name":"","wprm-recipe-roundup-description":"","postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[208,184,211,237,1838,206,85],"tags":[110,12172,12173,12170,491],"ppma_author":[572],"class_list":{"0":"post-30528","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apac","8":"category-cybersecurity","9":"category-japan","10":"category-news","11":"category-quick-reads","12":"category-regional","13":"category-tech","14":"tag-cybersecurity","15":"tag-riskloom","16":"tag-security-support","17":"tag-segue-security","18":"tag-supply-chain"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>RiskLoom Focuses on Clearer Compliance Processes<\/title>\n<meta name=\"description\" content=\"Segue Security launches RiskLoom, that automates security policy checks against multiple frameworks, reducing manual compliance effort.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/riskloom-focuses-on-clearer-compliance-processes\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RiskLoom Focuses on Clearer Compliance Processes\" \/>\n<meta property=\"og:description\" content=\"Segue Security launches RiskLoom, that automates security policy checks against multiple frameworks, reducing manual compliance effort.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/riskloom-focuses-on-clearer-compliance-processes\/\" \/>\n<meta property=\"og:site_name\" content=\"itbusinesstoday\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-27T10:47:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/03\/We-have-launched-RiskLoom-an-AI-powered-security-policy-document-diagnostic-service.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1201\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"ITBT StaffWriter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"ITBT StaffWriter\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u5206\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"RiskLoom\u3001\u3088\u308a\u660e\u78ba\u306a\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u30fb\u30d7\u30ed\u30bb\u30b9\u306b\u6ce8\u529b","description":"Segue Security launches RiskLoom, that automates security policy checks against multiple frameworks, reducing manual compliance effort.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/riskloom-focuses-on-clearer-compliance-processes\/","og_locale":"ja_JP","og_type":"article","og_title":"RiskLoom Focuses on Clearer Compliance Processes","og_description":"Segue Security launches RiskLoom, that automates security policy checks against multiple frameworks, reducing manual compliance effort.","og_url":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/riskloom-focuses-on-clearer-compliance-processes\/","og_site_name":"itbusinesstoday","article_published_time":"2026-03-27T10:47:30+00:00","og_image":[{"width":1201,"height":800,"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/03\/We-have-launched-RiskLoom-an-AI-powered-security-policy-document-diagnostic-service.webp","type":"image\/webp"}],"author":"ITBT StaffWriter","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"ITBT StaffWriter","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"2\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/riskloom-focuses-on-clearer-compliance-processes\/#article","isPartOf":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/riskloom-focuses-on-clearer-compliance-processes\/"},"author":{"name":"ITBT StaffWriter","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15"},"headline":"RiskLoom Focuses on Clearer Compliance Processes","datePublished":"2026-03-27T10:47:30+00:00","mainEntityOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/riskloom-focuses-on-clearer-compliance-processes\/"},"wordCount":240,"publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/riskloom-focuses-on-clearer-compliance-processes\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/03\/We-have-launched-RiskLoom-an-AI-powered-security-policy-document-diagnostic-service.webp","keywords":["cybersecurity","RiskLoom","Security support","Segue Security","supply chain"],"articleSection":["APAC","Cybersecurity","Japan","News","Quick Reads","Regional","Tech"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/riskloom-focuses-on-clearer-compliance-processes\/","url":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/riskloom-focuses-on-clearer-compliance-processes\/","name":"RiskLoom\u3001\u3088\u308a\u660e\u78ba\u306a\u30b3\u30f3\u30d7\u30e9\u30a4\u30a2\u30f3\u30b9\u30fb\u30d7\u30ed\u30bb\u30b9\u306b\u6ce8\u529b","isPartOf":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/riskloom-focuses-on-clearer-compliance-processes\/#primaryimage"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/riskloom-focuses-on-clearer-compliance-processes\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/03\/We-have-launched-RiskLoom-an-AI-powered-security-policy-document-diagnostic-service.webp","datePublished":"2026-03-27T10:47:30+00:00","description":"Segue Security launches RiskLoom, that automates security policy checks against multiple frameworks, reducing manual compliance effort.","breadcrumb":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/riskloom-focuses-on-clearer-compliance-processes\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/riskloom-focuses-on-clearer-compliance-processes\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/riskloom-focuses-on-clearer-compliance-processes\/#primaryimage","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/03\/We-have-launched-RiskLoom-an-AI-powered-security-policy-document-diagnostic-service.webp","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/03\/We-have-launched-RiskLoom-an-AI-powered-security-policy-document-diagnostic-service.webp","width":1201,"height":800,"caption":"Segue Security"},{"@type":"BreadcrumbList","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/riskloom-focuses-on-clearer-compliance-processes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itbusinesstoday.com\/"},{"@type":"ListItem","position":2,"name":"RiskLoom Focuses on Clearer Compliance Processes"}]},{"@type":"WebSite","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","description":"","publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","width":663,"height":275,"caption":"itbusinesstoday"},"image":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15","name":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png90b3cb23d1d9c08733d969d29ea2d30d","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","caption":"ITBT StaffWriter"},"description":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc\u306f\u3001IT Business Today\u306e\u793e\u5185\u5bc4\u7a3f\u8005\u3067\u3001\u30bf\u30a4\u30e0\u30ea\u30fc\u306a\u30cb\u30e5\u30fc\u30b9\u3068QuickBytes\u306e\u914d\u4fe1\u3092\u62c5\u5f53\u3057\u3066\u3044\u307e\u3059\u3002IT\u3001\u30cf\u30a4\u30c6\u30af\u3001\u4f01\u696d\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u6700\u65b0\u52d5\u5411\u3092\u30ab\u30d0\u30fc\u3057\u3001\u7c21\u6f54\u3067\u30a4\u30f3\u30d1\u30af\u30c8\u306e\u3042\u308b\u6700\u65b0\u60c5\u5831\u3092\u8aad\u8005\u306b\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002","sameAs":["https:\/\/itbusinesstoday.com\/"],"url":"https:\/\/itbusinesstoday.com\/ja\/author\/itbt-staffwriter\/"}]}},"authors":[{"term_id":572,"user_id":7,"is_guest":0,"slug":"itbt-staffwriter","display_name":"ITBT StaffWriter","avatar_url":{"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","url2x":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/30528","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/comments?post=30528"}],"version-history":[{"count":2,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/30528\/revisions"}],"predecessor-version":[{"id":30555,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/30528\/revisions\/30555"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media\/30558"}],"wp:attachment":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media?parent=30528"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/categories?post=30528"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/tags?post=30528"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/ppma_author?post=30528"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}