{"id":31030,"date":"2026-04-06T12:38:26","date_gmt":"2026-04-06T12:38:26","guid":{"rendered":"https:\/\/itbusinesstoday.com\/?p=31030"},"modified":"2026-04-06T12:38:26","modified_gmt":"2026-04-06T12:38:26","slug":"proactive-cyber-defense-the-shift-from-detection-to-prediction","status":"publish","type":"post","link":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/proactive-cyber-defense-the-shift-from-detection-to-prediction\/","title":{"rendered":"\u30d7\u30ed\u30a2\u30af\u30c6\u30a3\u30d6\u30fb\u30b5\u30a4\u30d0\u30fc\u30c7\u30a3\u30d5\u30a7\u30f3\u30b9\u691c\u77e5\u304b\u3089\u4e88\u6e2c\u3078\u306e\u30b7\u30d5\u30c8"},"content":{"rendered":"<p>Most security teams still celebrate detection. That\u2019s the problem.<\/p>\n<p>Detection is not defense. It is documentation. By the time an alert fire, the attacker has already moved, escalated, and in many cases, achieved the objective. You are not stopping an attack. You are analyzing a crime scene.<\/p>\n<p>Now layer AI into this. Attacks are faster, more automated, and less dependent on elite skill. Yet most organizations are still reacting instead of anticipating. That gap is widening fast.<\/p>\n<p><a href=\"https:\/\/reports.weforum.org\/docs\/WEF_Global_Cybersecurity_Outlook_2025.pdf\">66%<\/a> of organizations expect AI to have the most significant impact on cybersecurity in the next 12 months, but only 37% have a process to assess AI security before deployment.<\/p>\n<h4>\u3053\u3061\u3089\u3082\u304a\u8aad\u307f\u304f\u3060\u3055\u3044\uff1a <a class=\"p-url\" href=\"https:\/\/itbusinesstoday.com\/ja\/industrial-tech\/semiconductorandelectronics\/japans-chipmaking-revival-how-government-policy-and-global-demand-are-reshaping-the-industry\/\" rel=\"bookmark\">\u65e5\u672c\u306e\u30c1\u30c3\u30d7\u88fd\u9020\u696d\u306e\u5fa9\u6d3b\uff1a\u653f\u5e9c\u306e\u653f\u7b56\u3068\u4e16\u754c\u7684\u306a\u9700\u8981\u306f\u3044\u304b\u306b\u3057\u3066\u7523\u696d\u3092\u518d\u69cb\u7bc9\u3059\u308b\u304b<\/a><\/h4>\n<p>That disconnect is where breaches live.<\/p>\n<p>This is where proactive cyber defense enters. The shift from Indicators of Compromise to Indicators of Intent is not just semantic. It is the difference between reacting to damage and preventing it. In 2026, predictive intelligence is not an upgrade. It is the baseline for cyber resilience.<\/p>\n<h2>The Anatomy of Prediction Vs Detection<\/h2>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-31038\" src=\"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/The-Anatomy-of-Prediction-Vs-Detection.webp\" alt=\"Proactive Cyber Defense\" width=\"1200\" height=\"800\" \/><\/p>\n<p>Detection-based security was built for a different era. Static malware. Known signatures. Slower attackers. It worked when threats were predictable and patterns were obvious. That world is gone.<\/p>\n<p>Detection asks one question. What just happened.<\/p>\n<p>Prediction asks a harder one. What is about to happen.<\/p>\n<p>\u305d\u306e\u30b7\u30d5\u30c8\u304c\u3059\u3079\u3066\u3092\u5909\u3048\u308b\u306e\u3067\u3059\u3002.<\/p>\n<p>Traditional detection relies on rules, signatures, and predefined thresholds. It flags anomalies after they cross a line. However, by design, it is reactive. It waits for evidence. It needs proof.<\/p>\n<p>Predictive cyber defense does not wait. It models behavior. It studies patterns. It looks at how attackers think, not just what they deploy.<\/p>\n<p>And here is where scale breaks the old model.<\/p>\n<p>Modern security systems process 100 trillion security signals daily, block <a href=\"https:\/\/www.microsoft.com\/en-us\/corporate-responsibility\/cybersecurity\/microsoft-digital-defense-report-2025\/\">4.5 million<\/a> new malware files every day, analyze 38 million identity risk detections, and screen 5 billion emails.<\/p>\n<p>No human team can interpret this volume. Not even close.<\/p>\n<p>So the system learns.<\/p>\n<p>Machine learning processes global telemetry. DNS activity, WHOIS registrations, dark web chatter, identity signals, cloud behavior. Individually, these signals look harmless. Together, they tell a story.<\/p>\n<p>Prediction works because patterns repeat.<\/p>\n<p>Attackers reuse infrastructure. They register domains in similar ways. They follow playbooks even when they think they are being creative. Behavioral modeling picks this up early.<\/p>\n<p>So instead of waiting for a payload to execute, predictive cyber defense flags intent at the preparation stage.<\/p>\n<p>That is the difference.<\/p>\n<p>Detection sees the explosion. Prediction sees the fuse.<\/p>\n<h2>Moving from Malware to Adversary Modeling<\/h2>\n<p>Security teams still obsess over malware. That is like studying bullets instead of shooters.<\/p>\n<p>The real shift in proactive cyber defense is moving from artifacts to actors.<\/p>\n<p>Adversary modeling focuses on behavior. Not just code. Not just indicators. But patterns of operation.<\/p>\n<p>Every threat group has habits. Preferred entry points. Infrastructure choices. Timing patterns. Even mistakes. Over time, these become identifiable.<\/p>\n<p>AI learns these playbooks.<\/p>\n<p>So instead of reacting to a specific malware strain, the system recognizes the behavior behind it. That is how you detect a campaign before it scales.<\/p>\n<p>Infrastructure correlation plays a critical role here.<\/p>\n<p>Command and Control servers do not appear out of nowhere. They are registered. Configured. Tested. Used. Each step leaves signals.<\/p>\n<p>Predictive systems track these signals at creation, not activation.<\/p>\n<p>That is the difference between chasing an attack and intercepting it.<\/p>\n<p>And attackers are evolving fast.<\/p>\n<p>They are increasingly exploiting human behavior. Vishing. Business email compromise. Social engineering at scale. Ransomware is no longer a niche threat. It is an industry, powered by zero-day exploits and ransomware-as-a-service models.<\/p>\n<p>Now add AI into the mix.<\/p>\n<p>AI is increasing attack volume, frequency, and sophistication. It is lowering the barrier to entry. Less-skilled actors can now execute campaigns that previously required expertise.<\/p>\n<p>This changes the threat landscape completely.<\/p>\n<p>You are no longer defending against a few advanced actors. You are defending against scaled intelligence.<\/p>\n<p>Which means static defenses fail faster.<\/p>\n<p>Adversary modeling is not optional anymore. It is the only way to keep up with how attacks are actually designed.<\/p>\n<h2>Efficiency, ROI and Burnout<\/h2>\n<p>Security teams are drowning. Not because of lack of tools, but because of too much noise.<\/p>\n<p>Alert fatigue is not a side issue. It is a structural failure.<\/p>\n<p>Detection-based systems generate volume. Thousands of alerts. Most of them irrelevant. Analysts spend time filtering instead of investigating.<\/p>\n<p>Predictive cyber defense flips that.<\/p>\n<p>It filters noise before it reaches the analyst. It prioritizes based on probability, not just severity. It surfaces signals that actually matter.<\/p>\n<p>This changes how teams operate.<\/p>\n<p>Instead of reacting to everything, they focus on what is likely to happen next. That shift alone reduces cognitive load and improves response quality.<\/p>\n<p>But the bigger shift is in how security is measured.<\/p>\n<p>Most organizations still talk about vulnerabilities. Number of patches. Number of alerts. That language does not translate to business value.<\/p>\n<p>Prediction introduces a different metric. Probability of exploitation.<\/p>\n<p>Now security conversations move closer to risk management. Boards understand probability. They understand impact.<\/p>\n<p>And then comes the ROI layer.<\/p>\n<p>Organizations that used AI extensively in security saw USD <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\">1.9 million<\/a> in cost savings compared to those that did not.<\/p>\n<p>That is not a marginal gain. That is structural efficiency.<\/p>\n<p>Better prioritization. Faster response. Fewer incidents. Lower recovery costs.<\/p>\n<p>Prediction does not just improve security. It fixes the economics of security.<\/p>\n<p>Which is why it is getting attention at the leadership level.<\/p>\n<h2>Overcoming the Challenges of a Predictive Stance<\/h2>\n<p>Prediction sounds powerful. It is. But it is not magic.<\/p>\n<p>The biggest risk is not failure. It is false confidence.<\/p>\n<p>Predictive systems depend on <a href=\"https:\/\/itbusinesstoday.com\/ja\/industrial-tech\/automotive\/connected-vehicle-data-monetization-new-revenue-models-for-global-automakers\/\">\u30c7\u30fc\u30bf<\/a>. And bad data leads to bad predictions.<\/p>\n<p>Garbage in. Garbage out. Still applies.<\/p>\n<p>Incomplete telemetry, noisy logs, poor integration. These break the model quietly. The system still produces output, but the quality drops.<\/p>\n<p>That is dangerous because it looks like it is working.<\/p>\n<p>Another challenge is misinterpreting intent.<\/p>\n<p>Not every anomaly is an attack. Not every deviation is malicious. Prediction increases sensitivity, which can increase false positives if not handled carefully.<\/p>\n<p>This is where human-in-the-loop becomes critical.<\/p>\n<p>AI can suggest intent. It can highlight patterns. It can connect signals. But it cannot fully understand context.<\/p>\n<p>Humans validate.<\/p>\n<p>They distinguish between unusual and dangerous. They apply judgment where models cannot.<\/p>\n<p>The strongest predictive cyber defense systems are not fully automated. They are <a href=\"https:\/\/itbusinesstoday.com\/ja\/martech\/e-commerce-becomes-immersive-with-augmented-reality\/\">augmented<\/a>.<\/p>\n<p>Machines detect. Humans decide.<\/p>\n<p>That balance is what makes prediction reliable.<\/p>\n<h2>How to Transition Your SOC?<\/h2>\n<p>Most organizations try to jump to prediction without fixing basics. That is why adoption fails.<\/p>\n<p>Start with visibility.<\/p>\n<p>Audit your telemetry across endpoints, cloud environments, and identity systems. If you cannot see it, you cannot predict it.<\/p>\n<p>Then shift mindset.<\/p>\n<p>Move from isolated alerts to attack paths. Stop looking at events in isolation. Start mapping how an attacker would move across your environment.<\/p>\n<p>Prediction works when context is connected.<\/p>\n<p>Then integrate external threat intelligence with internal behavioral data. External signals tell you what is emerging. Internal signals tell you where you are exposed.<\/p>\n<p>The intersection is where prediction happens.<\/p>\n<p>And here is the uncomfortable truth.<\/p>\n<p>Weak or absent credentials accounted for <a href=\"https:\/\/cloud.google.com\/security\/report\/resources\/cloud-threat-horizons-report-h2-2025?hl=en\">47.1%<\/a> of incidents, followed by misconfigurations at 29.4% and API or UI compromises at 11.8%.<\/p>\n<p>Most breaches are not sophisticated. They are predictable.<\/p>\n<p>Which means predictive cyber defense does not start with exotic AI models. It starts with fixing identity and configuration risks.<\/p>\n<p>Get that right, and prediction becomes practical.<\/p>\n<p>Ignore it, and prediction becomes noise.<\/p>\n<h2>The Future of Proactive Defense<\/h2>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-31040\" src=\"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/The-Future-of-Proactive-Defense.webp\" alt=\"Proactive Cyber Defense\" width=\"1200\" height=\"800\" \/><\/p>\n<p>Proactive cyber defense is not a tool upgrade. It is a mindset shift.<\/p>\n<p>From reacting to anticipating. From alerts to intent. From firefighting to strategy.<\/p>\n<p>Detection will always exist. But it cannot be the center anymore.<\/p>\n<p>The organizations that win in 2026 will not be the ones with the fastest response times. They will be the ones that saw the attack forming before it executed.<\/p>\n<p>Prediction changes the timeline.<\/p>\n<p>And in <a href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/ai-vs-ai-why-cybersecurity-is-becoming-an-algorithmic-arms-race\/\">\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<\/a>, control over time is everything.<\/p>","protected":false},"excerpt":{"rendered":"<p>Most security teams still celebrate detection. That\u2019s the problem. Detection is not defense. It is documentation. By the time an alert fire, the attacker has already moved, escalated, and in many cases, achieved the objective. You are not stopping an attack. You are analyzing a crime scene. Now layer AI into this. Attacks are faster, more automated, and less dependent on elite skill. Yet most organizations are still reacting instead of anticipating. That gap is widening fast. 66% of organizations expect AI to have the most significant impact on cybersecurity in the next 12 months, but only 37% have a process to assess AI security before deployment. Also Read: Japan\u2019s [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":31041,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"wprm-recipe-roundup-name":"","wprm-recipe-roundup-description":"","postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[184,180,201,85],"tags":[12347,2535,1686,110,3604],"ppma_author":[325],"class_list":{"0":"post-31030","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cybersecurity","8":"category-knowledge-hub","9":"category-staff-writers","10":"category-tech","11":"tag-adversary-modeling","12":"tag-ai-security","13":"tag-cyber-defense","14":"tag-cybersecurity","15":"tag-proactive-defense"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Proactive Cyber Defense<\/title>\n<meta name=\"description\" content=\"Stop reacting &amp; start predicting. Master the shift to proactive cyber defense using AI-driven insights to stop threats before they strike.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/proactive-cyber-defense-the-shift-from-detection-to-prediction\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Proactive Cyber Defense\" \/>\n<meta property=\"og:description\" content=\"Stop reacting &amp; start predicting. Master the shift to proactive cyber defense using AI-driven insights to stop threats before they strike.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/proactive-cyber-defense-the-shift-from-detection-to-prediction\/\" \/>\n<meta property=\"og:site_name\" content=\"itbusinesstoday\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-06T12:38:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Proactive-Cyber-Defense-The-Shift-from-Detection-to-Prediction.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Ren Yamaguchi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ren Yamaguchi\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"7\u5206\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Proactive Cyber Defense","description":"Stop reacting & start predicting. Master the shift to proactive cyber defense using AI-driven insights to stop threats before they strike.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/proactive-cyber-defense-the-shift-from-detection-to-prediction\/","og_locale":"ja_JP","og_type":"article","og_title":"Proactive Cyber Defense","og_description":"Stop reacting & start predicting. Master the shift to proactive cyber defense using AI-driven insights to stop threats before they strike.","og_url":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/proactive-cyber-defense-the-shift-from-detection-to-prediction\/","og_site_name":"itbusinesstoday","article_published_time":"2026-04-06T12:38:26+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Proactive-Cyber-Defense-The-Shift-from-Detection-to-Prediction.webp","type":"image\/webp"}],"author":"Ren Yamaguchi","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"Ren Yamaguchi","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"7\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/proactive-cyber-defense-the-shift-from-detection-to-prediction\/#article","isPartOf":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/proactive-cyber-defense-the-shift-from-detection-to-prediction\/"},"author":{"name":"Ren Yamaguchi","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/b8203deb010619b22b097ae20ba697f7"},"headline":"Proactive Cyber Defense: The Shift from Detection to Prediction","datePublished":"2026-04-06T12:38:26+00:00","mainEntityOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/proactive-cyber-defense-the-shift-from-detection-to-prediction\/"},"wordCount":1324,"publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/proactive-cyber-defense-the-shift-from-detection-to-prediction\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Proactive-Cyber-Defense-The-Shift-from-Detection-to-Prediction.webp","keywords":["Adversary modeling","AI Security","Cyber defense","cybersecurity","Proactive Defense"],"articleSection":["Cybersecurity","Knowledge Hub","Staff Writers","Tech"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/proactive-cyber-defense-the-shift-from-detection-to-prediction\/","url":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/proactive-cyber-defense-the-shift-from-detection-to-prediction\/","name":"Proactive Cyber Defense","isPartOf":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/proactive-cyber-defense-the-shift-from-detection-to-prediction\/#primaryimage"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/proactive-cyber-defense-the-shift-from-detection-to-prediction\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Proactive-Cyber-Defense-The-Shift-from-Detection-to-Prediction.webp","datePublished":"2026-04-06T12:38:26+00:00","description":"Stop reacting & start predicting. Master the shift to proactive cyber defense using AI-driven insights to stop threats before they strike.","breadcrumb":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/proactive-cyber-defense-the-shift-from-detection-to-prediction\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/proactive-cyber-defense-the-shift-from-detection-to-prediction\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/proactive-cyber-defense-the-shift-from-detection-to-prediction\/#primaryimage","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Proactive-Cyber-Defense-The-Shift-from-Detection-to-Prediction.webp","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Proactive-Cyber-Defense-The-Shift-from-Detection-to-Prediction.webp","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/proactive-cyber-defense-the-shift-from-detection-to-prediction\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itbusinesstoday.com\/"},{"@type":"ListItem","position":2,"name":"Proactive Cyber Defense: The Shift from Detection to Prediction"}]},{"@type":"WebSite","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","description":"","publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","width":663,"height":275,"caption":"itbusinesstoday"},"image":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/b8203deb010619b22b097ae20ba697f7","name":"\u5c71\u53e3 \u84ee","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Ren-Yamaguchi.jpeg59a0a274e488bac32db91c861f174c97","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Ren-Yamaguchi.jpeg","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Ren-Yamaguchi.jpeg","caption":"Ren Yamaguchi"},"sameAs":["https:\/\/itbusinesstoday.com"],"url":"https:\/\/itbusinesstoday.com\/ja\/author\/ren-yamaguchi\/"}]}},"authors":[{"term_id":325,"user_id":6,"is_guest":0,"slug":"ren-yamaguchi","display_name":"Ren Yamaguchi","avatar_url":{"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Ren-Yamaguchi.jpeg","url2x":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Ren-Yamaguchi.jpeg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/31030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/comments?post=31030"}],"version-history":[{"count":3,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/31030\/revisions"}],"predecessor-version":[{"id":31042,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/31030\/revisions\/31042"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media\/31041"}],"wp:attachment":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media?parent=31030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/categories?post=31030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/tags?post=31030"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/ppma_author?post=31030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}