{"id":31570,"date":"2026-04-16T10:53:27","date_gmt":"2026-04-16T10:53:27","guid":{"rendered":"https:\/\/itbusinesstoday.com\/?p=31570"},"modified":"2026-04-16T10:53:27","modified_gmt":"2026-04-16T10:53:27","slug":"security-tools-are-easy-running-them-is-the-real-problem","status":"publish","type":"post","link":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/security-tools-are-easy-running-them-is-the-real-problem\/","title":{"rendered":"\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30c4\u30fc\u30eb\u306f\u7c21\u5358 \u5b9f\u884c\u3059\u308b\u3053\u3068\u304c\u771f\u306e\u554f\u984c"},"content":{"rendered":"<p>\u30a2\u30af\u30bb\u30ea\u30a2\u306fSolution GateCore\u3092\u767a\u58f2\u3057\u305f\u3070\u304b\u308a\u3067\u3059\u304c\u3001\u305d\u306e\u4f4d\u7f6e\u3065\u3051\u306f\u660e\u5feb\u3067\u3059\u3002\u4f01\u696d\u306f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30c4\u30fc\u30eb\u3092\u8cb7\u3046\u306e\u306b\u82e6\u52b4\u3057\u3066\u3044\u308b\u306e\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u4f01\u696d\u306f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30c4\u30fc\u30eb\u3092\u8cb7\u3046\u306e\u306b\u82e6\u52b4\u3057\u3066\u3044\u308b\u306e\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002.<\/p>\n<p>\u3053\u308c\u306fCloudflare\u4e0a\u306b\u69cb\u7bc9\u3055\u308c\u305f\u30de\u30cd\u30fc\u30b8\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30b5\u30fc\u30d3\u30b9\u3067\u3001\u8a2d\u5b9a\u304b\u3089\u65e5\u3005\u306e\u904b\u7528\u3001\u76e3\u8996\u3001\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u5bfe\u5fdc\u307e\u3067\u3001\u3059\u3079\u3066\u3092\u30a2\u30af\u30bb\u30ea\u30a2\u304c\u5f15\u304d\u53d7\u3051\u307e\u3059\u3002Accelia\u306f\u30c4\u30fc\u30eb\u30ad\u30c3\u30c8\u3092\u6e21\u3059\u4ee3\u308f\u308a\u306b\u3001\u5b9f\u884c\u306e\u30aa\u30fc\u30ca\u30fc\u30b7\u30c3\u30d7\u3092\u6301\u3063\u3066\u3044\u307e\u3059\u3002.<\/p>\n<p>\u304d\u3063\u304b\u3051\u306f\u3088\u304f\u77e5\u3089\u308c\u3066\u3044\u307e\u3059\u3002\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u306e\u5897\u52a0\u3001\u5b8c\u5168\u306a\u30a6\u30a7\u30d6\u30fb\u30a8\u30b3\u30b7\u30b9\u30c6\u30e0\u3001\u305d\u3057\u3066\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u6709\u8cc7\u683c\u8005\u306e\u4e0d\u8db3\u3067\u3059\u3002\u307b\u3068\u3093\u3069\u306e\u4f01\u696d\u306fCDN\u3001WAF\u3001\u307e\u305f\u306fDDoS\u4fdd\u8b77\u3092\u5b9f\u88c5\u3067\u304d\u307e\u3059\u304c\u3001\u305d\u308c\u3089\u3092\u6700\u9069\u5316\u3057\u3001\u52b9\u679c\u7684\u306b\u7dad\u6301\u3059\u308b\u3053\u3068\u306f\u3001\u7269\u4e8b\u304c\u58ca\u308c\u308b\u3068\u3053\u308d\u3067\u3059\u3002.<\/p>\n<h4>\u3053\u3061\u3089\u3082\u304a\u8aad\u307f\u304f\u3060\u3055\u3044\uff1a <a class=\"p-url\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cloud\/serverworks-expands-crowdstrike-partnership-for-security\/\" rel=\"bookmark\">\u30b5\u30fc\u30d0\u30fc\u30ef\u30fc\u30af\u30b9\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5206\u91ce\u3067\u30af\u30e9\u30a6\u30c9\u30b9\u30c8\u30e9\u30a4\u30af\u3068\u306e\u63d0\u643a\u3092\u62e1\u5927<\/a><\/h4>\n<p>Solution GateCore\u306f\u3053\u306e\u30e2\u30c7\u30eb\u3092\u8986\u3057\u307e\u3059\u3002GateCore\u306f\u3001\u30a4\u30f3\u30d5\u30e9\u3068\u904b\u7528\u3092\u5358\u4e00\u306e\u30b5\u30fc\u30d3\u30b9\u306b\u30d0\u30f3\u30c9\u30eb\u3057\u3001\u56fa\u5b9a\u6599\u91d1\u4f53\u7cfb\u3092\u63a1\u7528\u3059\u308b\u3053\u3068\u3067\u3001\u793e\u5185\u306b\u30c1\u30fc\u30e0\u3092\u69cb\u7bc9\u3059\u308b\u3053\u3068\u306a\u304f\u3001\u9ad8\u5ea6\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u8a2d\u5b9a\u3092\u53ef\u80fd\u306b\u3057\u307e\u3059\u3002CDN\u7d4c\u7531\u306e\u30c8\u30e9\u30d5\u30a3\u30c3\u30af\u914d\u4fe1\u3001\u653b\u6483\u9632\u5fa1\u3001\u904b\u7528\u30b5\u30dd\u30fc\u30c8\u306a\u3069\u306e\u6a5f\u80fd\u3092\u5099\u3048\u3001SOC\u306a\u3069\u306e\u30aa\u30d7\u30b7\u30e7\u30f3\u3067\u3088\u308a\u6df1\u3044\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ec\u30a4\u30e4\u30fc\u3092\u5b9f\u73fe\u3057\u307e\u3059\u3002.<\/p>\n<p>\u3088\u308a\u5927\u304d\u306a\u5909\u5316\u306f\u7121\u8996\u3067\u304d\u307e\u305b\u3093\u3002\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306f\u3001\u88fd\u54c1\u306e\u6240\u6709\u304b\u3089\u904b\u7528\u306e\u30a2\u30a6\u30c8\u30bd\u30fc\u30b7\u30f3\u30b0\u3078\u3068\u79fb\u884c\u3057\u3064\u3064\u3042\u308a\u307e\u3059\u3002.<\/p>\n<p><a href=\"https:\/\/www.accelia.net\/\">\u30a2\u30af\u30bb\u30ea\u30a2<\/a> \u6a5f\u80fd\u3067\u7af6\u3063\u3066\u3044\u308b\u306e\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u3046\u307e\u304f\u3044\u304b\u306a\u304f\u306a\u3063\u305f\u3068\u304d\u306b\u3001\u8ab0\u304c\u5b9f\u969b\u306b\u30b7\u30b9\u30c6\u30e0\u3092\u7a3c\u52d5\u3055\u305b\u7d9a\u3051\u3089\u308c\u308b\u304b\u3092\u7af6\u3063\u3066\u3044\u308b\u306e\u3067\u3059\u3002.<\/p>","protected":false},"excerpt":{"rendered":"<p>Accelia just launched Solution GateCore and the positioning is blunt. Companies do not struggle to buy security tools. They struggle to run them. This is a managed security service built on Cloudflare where Accelia takes over everything from setup to daily operations, monitoring, and incident response. Instead of handing over a toolkit, they are taking ownership of execution. The trigger is familiar. The growing incidence of cyber threats, full web ecosystems, and the acute paucity of qualified cybersecurity personnel. Most companies can implement CDN, WAF, or DDoS protection, but keeping them optimized and effective is where things break. Also Read: Serverworks expands CrowdStrike partnership for security Solution GateCore flips the [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":31599,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"wprm-recipe-roundup-name":"","wprm-recipe-roundup-description":"","postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[208,184,211,237,1838,206,85],"tags":[12558,2478,110,12557,7410],"ppma_author":[572],"class_list":{"0":"post-31570","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apac","8":"category-cybersecurity","9":"category-japan","10":"category-news","11":"category-quick-reads","12":"category-regional","13":"category-tech","14":"tag-accelia","15":"tag-cloudflare","16":"tag-cybersecurity","17":"tag-solution-gatecore","18":"tag-web-operation"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Tools Are Simple, Operations Are Hard<\/title>\n<meta name=\"description\" content=\"Accelia launches Solution GateCore to help enterprises manage and operate security tools more effectively, addressing execution gaps.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/security-tools-are-easy-running-them-is-the-real-problem\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Tools Are Simple, Operations Are Hard\" \/>\n<meta property=\"og:description\" content=\"Accelia launches Solution GateCore to help enterprises manage and operate security tools more effectively, addressing execution gaps.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/security-tools-are-easy-running-them-is-the-real-problem\/\" \/>\n<meta property=\"og:site_name\" content=\"itbusinesstoday\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-16T10:53:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Security-Tools-are-Easy-Running-Them-is-the-Real-Problem.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1201\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"ITBT StaffWriter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"ITBT StaffWriter\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u5206\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Tools Are Simple, Operations Are Hard","description":"Accelia launches Solution GateCore to help enterprises manage and operate security tools more effectively, addressing execution gaps.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/security-tools-are-easy-running-them-is-the-real-problem\/","og_locale":"ja_JP","og_type":"article","og_title":"Security Tools Are Simple, Operations Are Hard","og_description":"Accelia launches Solution GateCore to help enterprises manage and operate security tools more effectively, addressing execution gaps.","og_url":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/security-tools-are-easy-running-them-is-the-real-problem\/","og_site_name":"itbusinesstoday","article_published_time":"2026-04-16T10:53:27+00:00","og_image":[{"width":1201,"height":800,"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Security-Tools-are-Easy-Running-Them-is-the-Real-Problem.webp","type":"image\/webp"}],"author":"ITBT StaffWriter","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"ITBT StaffWriter","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"2\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/security-tools-are-easy-running-them-is-the-real-problem\/#article","isPartOf":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/security-tools-are-easy-running-them-is-the-real-problem\/"},"author":{"name":"ITBT StaffWriter","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15"},"headline":"Security Tools are Easy Running Them is the Real Problem","datePublished":"2026-04-16T10:53:27+00:00","mainEntityOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/security-tools-are-easy-running-them-is-the-real-problem\/"},"wordCount":200,"publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/security-tools-are-easy-running-them-is-the-real-problem\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Security-Tools-are-Easy-Running-Them-is-the-Real-Problem.webp","keywords":["Accelia","Cloudflare","cybersecurity","Solution GateCore","web operation"],"articleSection":["APAC","Cybersecurity","Japan","News","Quick Reads","Regional","Tech"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/security-tools-are-easy-running-them-is-the-real-problem\/","url":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/security-tools-are-easy-running-them-is-the-real-problem\/","name":"Security Tools Are Simple, Operations Are Hard","isPartOf":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/security-tools-are-easy-running-them-is-the-real-problem\/#primaryimage"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/security-tools-are-easy-running-them-is-the-real-problem\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Security-Tools-are-Easy-Running-Them-is-the-Real-Problem.webp","datePublished":"2026-04-16T10:53:27+00:00","description":"Accelia launches Solution GateCore to help enterprises manage and operate security tools more effectively, addressing execution gaps.","breadcrumb":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/security-tools-are-easy-running-them-is-the-real-problem\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/security-tools-are-easy-running-them-is-the-real-problem\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/security-tools-are-easy-running-them-is-the-real-problem\/#primaryimage","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Security-Tools-are-Easy-Running-Them-is-the-Real-Problem.webp","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Security-Tools-are-Easy-Running-Them-is-the-Real-Problem.webp","width":1201,"height":800,"caption":"Accelia"},{"@type":"BreadcrumbList","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/security-tools-are-easy-running-them-is-the-real-problem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itbusinesstoday.com\/"},{"@type":"ListItem","position":2,"name":"Security Tools are Easy Running Them is the Real Problem"}]},{"@type":"WebSite","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","description":"","publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","width":663,"height":275,"caption":"itbusinesstoday"},"image":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15","name":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png90b3cb23d1d9c08733d969d29ea2d30d","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","caption":"ITBT StaffWriter"},"description":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc\u306f\u3001IT Business Today\u306e\u793e\u5185\u5bc4\u7a3f\u8005\u3067\u3001\u30bf\u30a4\u30e0\u30ea\u30fc\u306a\u30cb\u30e5\u30fc\u30b9\u3068QuickBytes\u306e\u914d\u4fe1\u3092\u62c5\u5f53\u3057\u3066\u3044\u307e\u3059\u3002IT\u3001\u30cf\u30a4\u30c6\u30af\u3001\u4f01\u696d\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u6700\u65b0\u52d5\u5411\u3092\u30ab\u30d0\u30fc\u3057\u3001\u7c21\u6f54\u3067\u30a4\u30f3\u30d1\u30af\u30c8\u306e\u3042\u308b\u6700\u65b0\u60c5\u5831\u3092\u8aad\u8005\u306b\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002","sameAs":["https:\/\/itbusinesstoday.com\/"],"url":"https:\/\/itbusinesstoday.com\/ja\/author\/itbt-staffwriter\/"}]}},"authors":[{"term_id":572,"user_id":7,"is_guest":0,"slug":"itbt-staffwriter","display_name":"ITBT StaffWriter","avatar_url":{"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","url2x":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/31570","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/comments?post=31570"}],"version-history":[{"count":1,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/31570\/revisions"}],"predecessor-version":[{"id":31571,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/31570\/revisions\/31571"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media\/31599"}],"wp:attachment":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media?parent=31570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/categories?post=31570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/tags?post=31570"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/ppma_author?post=31570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}