{"id":30865,"date":"2026-04-02T10:56:47","date_gmt":"2026-04-02T10:56:47","guid":{"rendered":"https:\/\/itbusinesstoday.com\/?p=30865"},"modified":"2026-04-02T10:56:47","modified_gmt":"2026-04-02T10:56:47","slug":"mono-brain-shares-open-ai-security-testing-framework","status":"publish","type":"post","link":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/mono-brain-shares-open-ai-security-testing-framework\/","title":{"rendered":"MONO BRAIN\u3001\u30aa\u30fc\u30d7\u30f3\u306aAI\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c6\u30b9\u30c8\u30d5\u30ec\u30fc\u30e0\u30ef\u30fc\u30af\u3092\u516c\u958b"},"content":{"rendered":"<p><a href=\"https:\/\/monobrain.jp\/\">\u30e2\u30ce\u30fb\u30d6\u30ec\u30a4\u30f3<\/a> \u682a\u5f0f\u4f1a\u793e\u30a8\u30cc\u30fb\u30c6\u30a3\u30fb\u30c6\u30a3\u30fb\u30c9\u30b3\u30e2\u306f\u3001\u30aa\u30fc\u30d7\u30f3\u30bd\u30fc\u30b9\u30d7\u30ed\u30b8\u30a7\u30af\u30c8\u3068\u3057\u3066\u300c\u30e2\u30c7\u30eb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ec\u30f3\u30b8\u300d\u3092\u516c\u958b\u3057\u307e\u3057\u305f\u3002\u30a2\u30a4\u30c7\u30a2\u306f\u7406\u8ad6\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u5b9f\u8df5\u7684\u306a\u30c6\u30b9\u30c8\u3067\u3059\u3002AI\u30b7\u30b9\u30c6\u30e0\u3092\u610f\u56f3\u7684\u306b\u8106\u5f31\u306b\u3057\u305f\u74b0\u5883\u3092\u7528\u610f\u3057\u3001\u5236\u5fa1\u3055\u308c\u305f\u65b9\u6cd5\u3067\u305d\u308c\u3092\u7834\u3063\u3066\u307f\u308b\u306e\u3067\u3059\u3002.<\/p>\n<p>\u3053\u306e\u30bb\u30c3\u30c8\u30a2\u30c3\u30d7\u3067\u306f\u3001\u672c\u756a\u74b0\u5883\u3067\u3059\u3067\u306b\u73fe\u308c\u3066\u3044\u308b\u5b9f\u969b\u306e\u653b\u6483\u30d1\u30bf\u30fc\u30f3\u306b\u7126\u70b9\u3092\u5f53\u3066\u307e\u3059\u3002\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u8105\u5a01\u306b\u306f\u3001\u30d7\u30ed\u30f3\u30d7\u30c8\u30fb\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u3001\u30c4\u30fc\u30eb\u6a29\u9650\u306e\u60aa\u7528\u3001\u30c7\u30fc\u30bf\u6c5a\u67d3\u306a\u3069\u304c\u3042\u308a\u307e\u3059\u3002\u30b7\u30b9\u30c6\u30e0\u306e\u3069\u306e\u30b3\u30f3\u30dd\u30fc\u30cd\u30f3\u30c8\u304c\u5931\u6557\u3059\u308b\u304b\u5b9f\u9a13\u3059\u308b\u3053\u3068\u306b\u3088\u3063\u3066\u3001\u30ea\u30b9\u30af\u3092\u30c6\u30b9\u30c8\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002.<\/p>\n<p>\u5f7c\u3089\u306f\u73fe\u5728\u306e\u7814\u7a76\u306b\u304a\u3044\u3066\u3001\u65e2\u5b58\u306e\u554f\u984c\u3092\u89e3\u6c7a\u3059\u308b\u305f\u3081\u306b\u50cd\u3044\u3066\u3044\u307e\u3059\u3002\u4eca\u65e5\u306eAI\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306f\u5384\u4ecb\u3067\u3059\u3002\u5404\u30c1\u30fc\u30e0\u306f\u653b\u6483\u3092\u7c21\u5358\u306b\u518d\u73fe\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u305b\u3093\u3057\u3001\u30c6\u30b9\u30c8\u65b9\u6cd5\u3082\u4eba\u305d\u308c\u305e\u308c\u3067\u3059\u3002\u305d\u306e\u305f\u3081\u7d50\u679c\u304c\u4e00\u81f4\u305b\u305a\u3001\u4fee\u6b63\u3092\u691c\u8a3c\u3059\u308b\u306e\u304c\u96e3\u3057\u3044\u306e\u3067\u3059\u3002\u3053\u306e\u30b7\u30b9\u30c6\u30e0\u306f\u305d\u308c\u3092\u6a19\u6e96\u5316\u3057\u3088\u3046\u3068\u3059\u308b\u3082\u306e\u3067\u3059\u3002\u30bb\u30c3\u30c8\u30a2\u30c3\u30d7\u3001\u653b\u6483\u306e\u5b9f\u884c\u3001\u30ea\u30ab\u30d0\u30ea\u30fc\u304c\u3059\u3079\u3066\u660e\u78ba\u306b\u5b9a\u7fa9\u3055\u308c\u3066\u3044\u308b\u306e\u3067\u3001\u8ab0\u3067\u3082\u540c\u3058\u30c6\u30b9\u30c8\u3092\u5b9f\u884c\u3057\u3001\u7d50\u679c\u3092\u6bd4\u8f03\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002.<\/p>\n<h4>\u3053\u3061\u3089\u3082\u304a\u8aad\u307f\u304f\u3060\u3055\u3044\uff1a <a class=\"p-url\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/tcs-japan-partners-illumio-to-focus-on-cyber-containment\/\" rel=\"bookmark\">TCS\u30b8\u30e3\u30d1\u30f3\u3001\u30b5\u30a4\u30d0\u30fc\u5c01\u3058\u8fbc\u3081\u5206\u91ce\u3067\u30a4\u30eb\u30df\u30aa\u3068\u63d0\u643a<\/a><\/h4>\n<p>\u307e\u305f\u3001\u8907\u6570\u306eAI\u306e\u30bb\u30c3\u30c8\u30a2\u30c3\u30d7\u306b\u3082\u5bfe\u5fdc\u3057\u3066\u3044\u307e\u3059\u30021\u3064\u306e\u30e2\u30c7\u30eb\u30bf\u30a4\u30d7\u3060\u3051\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002RAG\u30b7\u30b9\u30c6\u30e0\u3001\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u3001OCR\u30d1\u30a4\u30d7\u30e9\u30a4\u30f3\u3001\u6a5f\u68b0\u5b66\u7fd2\u30e2\u30c7\u30eb\u3092\u6a2a\u65ad\u3057\u3066\u30c6\u30b9\u30c8\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002\u30b7\u30ca\u30ea\u30aa\u306b\u306f\u3001\u30d7\u30ed\u30f3\u30d7\u30c8\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u306b\u3088\u308b\u6a5f\u5bc6\u30c7\u30fc\u30bf\u306e\u6f0f\u3048\u3044\u3084\u8a31\u53ef\u3055\u308c\u3059\u304e\u305f\u30c4\u30fc\u30eb\u306e\u60aa\u7528\u3001\u30d5\u30a1\u30a4\u30eb\u30a2\u30c3\u30d7\u30ed\u30fc\u30c9\u3084\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0\u30c7\u30fc\u30bf\u30dd\u30a4\u30ba\u30cb\u30f3\u30b0\u306b\u3088\u308b\u9593\u63a5\u7684\u306a\u653b\u6483\u306a\u3069\u304c\u542b\u307e\u308c\u307e\u3059\u3002.<\/p>\n<p>\u672c\u66f8\u306f\u3001AI \u30b7\u30b9\u30c6\u30e0\u306e\u69cb\u7bc9\u3084\u76e3\u67fb\u306b\u643a\u308f\u308b\u958b\u767a\u8005\u3084\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30c1\u30fc\u30e0\u3001\u7814\u7a76\u8005\u306e\u305f\u3081\u306e\u3082\u306e\u3067\u3059\u3002\u672c\u30b7\u30b9\u30c6\u30e0\u306f\u3001\u30d7\u30ec\u30ea\u30ea\u30fc\u30b9\u30c6\u30b9\u30c8\u3001\u5185\u90e8\u30ec\u30c3\u30c9\u30c1\u30fc\u30e0\u6f14\u7fd2\u3001\u30c8\u30ec\u30fc\u30cb\u30f3\u30b0\u6d3b\u52d5\u306a\u3069\u3001\u69d8\u3005\u306a\u30e6\u30fc\u30b9\u30b1\u30fc\u30b9\u3092\u30b5\u30dd\u30fc\u30c8\u3057\u307e\u3059\u3002.<\/p>\n<p>\u5168\u4f53\u50cf\u306f\u5358\u7d14\u3067\u3059\u3002AI\u306e\u8105\u5a01\u306f\u3001\u5f93\u6765\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u624b\u6cd5\u3088\u308a\u3082\u901f\u304f\u9032\u5316\u3057\u3066\u3044\u307e\u3059\u3002\u3053\u306e\u3088\u3046\u306a\u30c4\u30fc\u30eb\u306f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30c6\u30b9\u30c8\u3092\u3088\u308a\u5b9f\u7528\u7684\u3067\u518d\u73fe\u53ef\u80fd\u306a\u3082\u306e\u306b\u3059\u308b\u3053\u3068\u3067\u3001\u305d\u306e\u30ae\u30e3\u30c3\u30d7\u3092\u57cb\u3081\u3088\u3046\u3068\u3057\u3066\u3044\u307e\u3059\u3002.<\/p>","protected":false},"excerpt":{"rendered":"<p>MONO BRAIN Co., Ltd. has released \u2018Model Security Range\u2019 as an open source project. The idea is not theory. It is hands-on testing. You get an environment where AI systems are intentionally made vulnerable, and you try to break them in controlled ways. This setup focuses on real attack patterns that are already showing up in production. The security threats include prompt injection and misuse of tool permissions and data contamination. You can test the risks by running experiments to see which components of the system fail. They work to solve an existing problem in their current research. AI security today is messy. Teams cannot easily reproduce attacks, and everyone [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":30903,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"wprm-recipe-roundup-name":"","wprm-recipe-roundup-description":"","postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[208,184,211,237,1838,206,85],"tags":[2535,110,4099,12267,3843],"ppma_author":[572],"class_list":{"0":"post-30865","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apac","8":"category-cybersecurity","9":"category-japan","10":"category-news","11":"category-quick-reads","12":"category-regional","13":"category-tech","14":"tag-ai-security","15":"tag-cybersecurity","16":"tag-generation-ai","17":"tag-model-security-range","18":"tag-mono-brain"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>MONO BRAIN Unveils Open AI Security Testing System<\/title>\n<meta name=\"description\" content=\"MONO BRAIN has open-sourced Model Security Range, offering a hands-on environment to test and exploit AI system vulnerabilities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/mono-brain-shares-open-ai-security-testing-framework\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MONO BRAIN Unveils Open AI Security Testing System\" \/>\n<meta property=\"og:description\" content=\"MONO BRAIN has open-sourced Model Security Range, offering a hands-on environment to test and exploit AI system vulnerabilities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/mono-brain-shares-open-ai-security-testing-framework\/\" \/>\n<meta property=\"og:site_name\" content=\"itbusinesstoday\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-02T10:56:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/We-have-released-Model-Security-Range-a-practical-AI-security-verification-environment_-as-open-source.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1201\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"ITBT StaffWriter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"ITBT StaffWriter\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u5206\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MONO BRAIN Unveils Open AI Security Testing System","description":"MONO BRAIN has open-sourced Model Security Range, offering a hands-on environment to test and exploit AI system vulnerabilities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/mono-brain-shares-open-ai-security-testing-framework\/","og_locale":"ja_JP","og_type":"article","og_title":"MONO BRAIN Unveils Open AI Security Testing System","og_description":"MONO BRAIN has open-sourced Model Security Range, offering a hands-on environment to test and exploit AI system vulnerabilities.","og_url":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/mono-brain-shares-open-ai-security-testing-framework\/","og_site_name":"itbusinesstoday","article_published_time":"2026-04-02T10:56:47+00:00","og_image":[{"width":1201,"height":800,"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/We-have-released-Model-Security-Range-a-practical-AI-security-verification-environment_-as-open-source.webp","type":"image\/webp"}],"author":"ITBT StaffWriter","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"ITBT StaffWriter","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"2\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/mono-brain-shares-open-ai-security-testing-framework\/#article","isPartOf":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/mono-brain-shares-open-ai-security-testing-framework\/"},"author":{"name":"ITBT StaffWriter","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15"},"headline":"MONO BRAIN Shares Open AI Security Testing Framework","datePublished":"2026-04-02T10:56:47+00:00","mainEntityOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/mono-brain-shares-open-ai-security-testing-framework\/"},"wordCount":283,"publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/mono-brain-shares-open-ai-security-testing-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/We-have-released-Model-Security-Range-a-practical-AI-security-verification-environment_-as-open-source.webp","keywords":["AI Security","cybersecurity","Generation AI","Model Security Range","MONO BRAIN"],"articleSection":["APAC","Cybersecurity","Japan","News","Quick Reads","Regional","Tech"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/mono-brain-shares-open-ai-security-testing-framework\/","url":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/mono-brain-shares-open-ai-security-testing-framework\/","name":"MONO BRAIN Unveils Open AI Security Testing System","isPartOf":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/mono-brain-shares-open-ai-security-testing-framework\/#primaryimage"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/mono-brain-shares-open-ai-security-testing-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/We-have-released-Model-Security-Range-a-practical-AI-security-verification-environment_-as-open-source.webp","datePublished":"2026-04-02T10:56:47+00:00","description":"MONO BRAIN has open-sourced Model Security Range, offering a hands-on environment to test and exploit AI system vulnerabilities.","breadcrumb":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/mono-brain-shares-open-ai-security-testing-framework\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/mono-brain-shares-open-ai-security-testing-framework\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/mono-brain-shares-open-ai-security-testing-framework\/#primaryimage","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/We-have-released-Model-Security-Range-a-practical-AI-security-verification-environment_-as-open-source.webp","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/We-have-released-Model-Security-Range-a-practical-AI-security-verification-environment_-as-open-source.webp","width":1201,"height":800,"caption":"MONO BRAIN"},{"@type":"BreadcrumbList","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/mono-brain-shares-open-ai-security-testing-framework\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itbusinesstoday.com\/"},{"@type":"ListItem","position":2,"name":"MONO BRAIN Shares Open AI Security Testing Framework"}]},{"@type":"WebSite","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","description":"","publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","width":663,"height":275,"caption":"itbusinesstoday"},"image":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15","name":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png90b3cb23d1d9c08733d969d29ea2d30d","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","caption":"ITBT StaffWriter"},"description":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc\u306f\u3001IT Business Today\u306e\u793e\u5185\u5bc4\u7a3f\u8005\u3067\u3001\u30bf\u30a4\u30e0\u30ea\u30fc\u306a\u30cb\u30e5\u30fc\u30b9\u3068QuickBytes\u306e\u914d\u4fe1\u3092\u62c5\u5f53\u3057\u3066\u3044\u307e\u3059\u3002IT\u3001\u30cf\u30a4\u30c6\u30af\u3001\u4f01\u696d\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u6700\u65b0\u52d5\u5411\u3092\u30ab\u30d0\u30fc\u3057\u3001\u7c21\u6f54\u3067\u30a4\u30f3\u30d1\u30af\u30c8\u306e\u3042\u308b\u6700\u65b0\u60c5\u5831\u3092\u8aad\u8005\u306b\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002","sameAs":["https:\/\/itbusinesstoday.com\/"],"url":"https:\/\/itbusinesstoday.com\/ja\/author\/itbt-staffwriter\/"}]}},"authors":[{"term_id":572,"user_id":7,"is_guest":0,"slug":"itbt-staffwriter","display_name":"ITBT StaffWriter","avatar_url":{"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","url2x":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/30865","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/comments?post=30865"}],"version-history":[{"count":1,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/30865\/revisions"}],"predecessor-version":[{"id":30866,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/30865\/revisions\/30866"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media\/30903"}],"wp:attachment":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media?parent=30865"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/categories?post=30865"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/tags?post=30865"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/ppma_author?post=30865"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}