{"id":31624,"date":"2026-04-17T10:50:38","date_gmt":"2026-04-17T10:50:38","guid":{"rendered":"https:\/\/itbusinesstoday.com\/?p=31624"},"modified":"2026-04-17T10:50:38","modified_gmt":"2026-04-17T10:50:38","slug":"three-hands-launches-ai-tool-pitscan-for-web-protection","status":"publish","type":"post","link":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/three-hands-launches-ai-tool-pitscan-for-web-protection\/","title":{"rendered":"\u30b9\u30ea\u30fc\u30cf\u30f3\u30ba\u3001\u30a6\u30a7\u30d6\u4fdd\u8b77AI\u30c4\u30fc\u30eb\u300cPitScan\u300d\u3092\u767a\u8868"},"content":{"rendered":"<p><a href=\"https:\/\/3hands.jp\/\">\u682a\u5f0f\u4f1a\u793e\u30b9\u30ea\u30fc\u30cf\u30f3\u30ba<\/a>.Ltd.\u306f\u3001\u4f01\u696d\u306b\u3068\u3063\u3066\u5897\u5927\u3059\u308b\u30da\u30a4\u30f3\u30dd\u30a4\u30f3\u30c8\u306b\u53d6\u308a\u7d44\u3093\u3067\u3044\u307e\u3059\u3002\u30a6\u30a7\u30d6\u30b5\u30a4\u30c8\u306e\u6539\u3056\u3093\u3002\u540c\u793e\u306e\u65b0\u3057\u3044\u30b5\u30fc\u30d3\u30b9\u300cPitScan\u300d\u306f\u3001\u5358\u306b\u5909\u66f4\u3092\u691c\u51fa\u3059\u308b\u3060\u3051\u3067\u306a\u304f\u3001\u5b9f\u969b\u306b\u4f55\u304c\u91cd\u8981\u304b\u3092\u5224\u65ad\u3057\u3001\u305d\u308c\u306b\u5bfe\u51e6\u3059\u308b\u3088\u3046\u306b\u69cb\u7bc9\u3055\u308c\u3066\u3044\u307e\u3059\u3002.<\/p>\n<p>\u305d\u306e\u533a\u5225\u304c\u3059\u3079\u3066\u306e\u30b9\u30c8\u30fc\u30ea\u30fc\u3067\u3059\u3002.<\/p>\n<p>\u5f93\u6765\u306e\u76e3\u8996\u30c4\u30fc\u30eb\u306f\u3001\u3059\u3079\u3066\u306e\u5909\u66f4\u306b\u30d5\u30e9\u30b0\u3092\u7acb\u3066\u307e\u3059\u3002\u30a2\u30e9\u30fc\u30c8\u3067\u6ea2\u308c\u304b\u3048\u308a\u3001\u5b9f\u969b\u306b\u653b\u6483\u306e\u30b7\u30b0\u30ca\u30eb\u3068\u306a\u308b1\u3064\u306e\u66f4\u65b0\u3092\u898b\u9003\u3057\u3066\u3057\u307e\u3046\u307e\u3067\u306f\u3001\u826f\u3044\u3053\u3068\u3060\u3068\u601d\u308f\u308c\u308b\u304b\u3082\u3057\u308c\u307e\u305b\u3093\u3002PitScan\u306f\u3001AI\u3092\u4f7f\u7528\u3057\u3066\u30a6\u30a7\u30d6\u30da\u30fc\u30b8\u306e\u9055\u3044\u3092\u5206\u6790\u3057\u3001\u30ce\u30a4\u30ba\u3092\u30d5\u30a3\u30eb\u30bf\u30ea\u30f3\u30b0\u3057\u3066\u3001\u60aa\u610f\u306e\u3042\u308b\u30ea\u30c0\u30a4\u30ec\u30af\u30c8\u3084\u30b3\u30f3\u30c6\u30f3\u30c4\u64cd\u4f5c\u306e\u3088\u3046\u306a\u6f5c\u5728\u7684\u306b\u6709\u5bb3\u306a\u5909\u66f4\u306e\u307f\u306b\u7126\u70b9\u3092\u5f53\u3066\u307e\u3059\u3002.<\/p>\n<h4>\u3053\u3061\u3089\u3082\u304a\u8aad\u307f\u304f\u3060\u3055\u3044\uff1a <a class=\"p-url\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/security-tools-are-easy-running-them-is-the-real-problem\/\" rel=\"bookmark\">\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30c4\u30fc\u30eb\u306f\u7c21\u5358 \u5b9f\u884c\u3059\u308b\u3053\u3068\u304c\u771f\u306e\u554f\u984c<\/a><\/h4>\n<p>\u307e\u305f\u3001\u307b\u3068\u3093\u3069\u306e\u30c4\u30fc\u30eb\u3067\u306f\u7a7a\u3044\u305f\u307e\u307e\u306b\u306a\u3063\u3066\u3044\u308b\u30ae\u30e3\u30c3\u30d7\u3092\u57cb\u3081\u308b\u3053\u3068\u3082\u3067\u304d\u307e\u3059\u3002\u30ec\u30b9\u30dd\u30f3\u30b9\u30bf\u30a4\u30e0\u3002\u8105\u5a01\u304c\u691c\u51fa\u3055\u308c\u308b\u3068\u3001\u30b7\u30b9\u30c6\u30e0\u306f\u8b66\u544a\u3092\u767a\u3057\u3001\u30e6\u30fc\u30b6\u30fc\u3092\u5b89\u5168\u306a\u30d5\u30a9\u30fc\u30eb\u30d0\u30c3\u30af\u30da\u30fc\u30b8\u306b\u79fb\u884c\u3055\u305b\u3066\u88ab\u5bb3\u3092\u6291\u3048\u308b\u3053\u3068\u3082\u3067\u304d\u307e\u3059\u3002\u3053\u3053\u3067\u306e\u9045\u5ef6\u306f\u53ce\u76ca\u3068\u4fe1\u983c\u306e\u640d\u5931\u306b\u76f4\u7d50\u3059\u308b\u305f\u3081\u3001\u3053\u308c\u306f\u91cd\u8981\u3067\u3059\u3002.<\/p>\n<p>\u653b\u6483\u306f\u3001\u305d\u306e\u5b9f\u884c\u6642\u9593\u304c\u7279\u5225\u306b\u8a08\u753b\u3055\u308c\u3066\u3044\u305f\u305f\u3081\u306b\u767a\u751f\u3057\u307e\u3057\u305f\u3002\u30a6\u30a7\u30d6\u30b5\u30a4\u30c8\u3092\u6a19\u7684\u306b\u3057\u305f\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306f\u3001\u305d\u306e\u5b9f\u884c\u304c\u3088\u308a\u6b63\u78ba\u306b\u306a\u3063\u3066\u3044\u307e\u3059\u3002\u306a\u305c\u306a\u3089\u3001\u653b\u6483\u8005\u306f\u73fe\u5728\u3001\u4e9b\u7d30\u306a\u5909\u66f4\u3067\u3082\u5927\u304d\u306a\u7d50\u679c\u3092\u3082\u305f\u3089\u3059\u96fb\u5b50\u5546\u53d6\u5f15\u3084\u91d1\u878d\u3001\u30e1\u30c7\u30a3\u30a2\u5206\u91ce\u306b\u7126\u70b9\u3092\u5f53\u3066\u3066\u3044\u308b\u304b\u3089\u3067\u3059\u3002.<\/p>\n<p>\u3088\u308a\u5e83\u7bc4\u306a\u30b7\u30d5\u30c8\u306f\u3001\u3088\u304f\u898b\u308c\u3070\u660e\u3089\u304b\u3067\u3059\u3002\u3082\u306f\u3084\u691c\u77e5\u3060\u3051\u3067\u306f\u5341\u5206\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u4f01\u696d\u306f\u4eca\u3001\u30ea\u30b9\u30af\u3092\u89e3\u91c8\u3057\u3001\u624b\u52d5\u4ecb\u5165\u3092\u5f85\u305f\u305a\u306b\u5373\u5ea7\u306b\u884c\u52d5\u3059\u308b\u30b7\u30b9\u30c6\u30e0\u3092\u5fc5\u8981\u3068\u3057\u3066\u3044\u307e\u3059\u3002.<\/p>","protected":false},"excerpt":{"rendered":"<p>Three Hands Co., Ltd. is pushing into a growing pain point for businesses. Website tampering. Their new service \u2018PitScan\u2019 is built to not just detect changes, but actually decide what matters and act on it. That distinction is the whole story. Traditional monitoring tools flag every change. Which sounds good until teams are flooded with alerts and miss the one update that actually signals an attack. PitScan uses AI to analyze differences in web pages and filter out noise, focusing only on potentially harmful alterations like malicious redirects or content manipulation. Also Read: Security Tools are Easy Running Them is the Real Problem It also closes a gap most tools [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":31668,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"wprm-recipe-roundup-name":"","wprm-recipe-roundup-description":"","postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[208,184,211,237,1838,206,85],"tags":[486,110,12576,1247,12575],"ppma_author":[572],"class_list":{"0":"post-31624","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apac","8":"category-cybersecurity","9":"category-japan","10":"category-news","11":"category-quick-reads","12":"category-regional","13":"category-tech","14":"tag-ai-technology","15":"tag-cybersecurity","16":"tag-pitscan","17":"tag-saas","18":"tag-three-hands"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Three Hands Unveils PitScan for Website Security<\/title>\n<meta name=\"description\" content=\"Three Hands launches PitScan, an AI-driven service that responds to website tampering by identifying critical changes and taking action.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/three-hands-launches-ai-tool-pitscan-for-web-protection\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Three Hands Unveils PitScan for Website Security\" \/>\n<meta property=\"og:description\" content=\"Three Hands launches PitScan, an AI-driven service that responds to website tampering by identifying critical changes and taking action.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/three-hands-launches-ai-tool-pitscan-for-web-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"itbusinesstoday\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-17T10:50:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Three-Hands-Launches-AI-Tool-PitScan-for-Web-Protection.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1201\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"ITBT StaffWriter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"ITBT StaffWriter\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u5206\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Three Hands Unveils PitScan for Website Security","description":"Three Hands launches PitScan, an AI-driven service that responds to website tampering by identifying critical changes and taking action.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/three-hands-launches-ai-tool-pitscan-for-web-protection\/","og_locale":"ja_JP","og_type":"article","og_title":"Three Hands Unveils PitScan for Website Security","og_description":"Three Hands launches PitScan, an AI-driven service that responds to website tampering by identifying critical changes and taking action.","og_url":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/three-hands-launches-ai-tool-pitscan-for-web-protection\/","og_site_name":"itbusinesstoday","article_published_time":"2026-04-17T10:50:38+00:00","og_image":[{"width":1201,"height":800,"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Three-Hands-Launches-AI-Tool-PitScan-for-Web-Protection.webp","type":"image\/webp"}],"author":"ITBT StaffWriter","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"ITBT StaffWriter","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"2\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/three-hands-launches-ai-tool-pitscan-for-web-protection\/#article","isPartOf":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/three-hands-launches-ai-tool-pitscan-for-web-protection\/"},"author":{"name":"ITBT StaffWriter","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15"},"headline":"Three Hands Launches AI Tool PitScan for Web Protection","datePublished":"2026-04-17T10:50:38+00:00","mainEntityOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/three-hands-launches-ai-tool-pitscan-for-web-protection\/"},"wordCount":226,"publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/three-hands-launches-ai-tool-pitscan-for-web-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Three-Hands-Launches-AI-Tool-PitScan-for-Web-Protection.webp","keywords":["AI technology","cybersecurity","PitScan","SaaS","Three Hands"],"articleSection":["APAC","Cybersecurity","Japan","News","Quick Reads","Regional","Tech"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/three-hands-launches-ai-tool-pitscan-for-web-protection\/","url":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/three-hands-launches-ai-tool-pitscan-for-web-protection\/","name":"Three Hands Unveils PitScan for Website Security","isPartOf":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/three-hands-launches-ai-tool-pitscan-for-web-protection\/#primaryimage"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/three-hands-launches-ai-tool-pitscan-for-web-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Three-Hands-Launches-AI-Tool-PitScan-for-Web-Protection.webp","datePublished":"2026-04-17T10:50:38+00:00","description":"Three Hands launches PitScan, an AI-driven service that responds to website tampering by identifying critical changes and taking action.","breadcrumb":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/three-hands-launches-ai-tool-pitscan-for-web-protection\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/three-hands-launches-ai-tool-pitscan-for-web-protection\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/three-hands-launches-ai-tool-pitscan-for-web-protection\/#primaryimage","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Three-Hands-Launches-AI-Tool-PitScan-for-Web-Protection.webp","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/Three-Hands-Launches-AI-Tool-PitScan-for-Web-Protection.webp","width":1201,"height":800,"caption":"Three Hands"},{"@type":"BreadcrumbList","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/three-hands-launches-ai-tool-pitscan-for-web-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itbusinesstoday.com\/"},{"@type":"ListItem","position":2,"name":"Three Hands Launches AI Tool PitScan for Web Protection"}]},{"@type":"WebSite","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","description":"","publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","width":663,"height":275,"caption":"itbusinesstoday"},"image":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15","name":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png90b3cb23d1d9c08733d969d29ea2d30d","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","caption":"ITBT StaffWriter"},"description":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc\u306f\u3001IT Business Today\u306e\u793e\u5185\u5bc4\u7a3f\u8005\u3067\u3001\u30bf\u30a4\u30e0\u30ea\u30fc\u306a\u30cb\u30e5\u30fc\u30b9\u3068QuickBytes\u306e\u914d\u4fe1\u3092\u62c5\u5f53\u3057\u3066\u3044\u307e\u3059\u3002IT\u3001\u30cf\u30a4\u30c6\u30af\u3001\u4f01\u696d\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u6700\u65b0\u52d5\u5411\u3092\u30ab\u30d0\u30fc\u3057\u3001\u7c21\u6f54\u3067\u30a4\u30f3\u30d1\u30af\u30c8\u306e\u3042\u308b\u6700\u65b0\u60c5\u5831\u3092\u8aad\u8005\u306b\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002","sameAs":["https:\/\/itbusinesstoday.com\/"],"url":"https:\/\/itbusinesstoday.com\/ja\/author\/itbt-staffwriter\/"}]}},"authors":[{"term_id":572,"user_id":7,"is_guest":0,"slug":"itbt-staffwriter","display_name":"ITBT StaffWriter","avatar_url":{"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","url2x":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/31624","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/comments?post=31624"}],"version-history":[{"count":1,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/31624\/revisions"}],"predecessor-version":[{"id":31625,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/31624\/revisions\/31625"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media\/31668"}],"wp:attachment":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media?parent=31624"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/categories?post=31624"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/tags?post=31624"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/ppma_author?post=31624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}