{"id":32056,"date":"2026-04-27T10:57:35","date_gmt":"2026-04-27T10:57:35","guid":{"rendered":"https:\/\/itbusinesstoday.com\/?p=32056"},"modified":"2026-04-27T10:57:35","modified_gmt":"2026-04-27T10:57:35","slug":"gmo-cybersecurity-launches-hacking-tests-for-ai-agents","status":"publish","type":"post","link":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/gmo-cybersecurity-launches-hacking-tests-for-ai-agents\/","title":{"rendered":"GMO\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3001AI\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306e\u30cf\u30c3\u30ad\u30f3\u30b0\u30c6\u30b9\u30c8\u3092\u958b\u59cb"},"content":{"rendered":"<p><a href=\"https:\/\/gmo-cybersecurity.com\/en\/\">GMO\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<\/a> by Ierae\u306f\u3001\u57fa\u672c\u7684\u306b\u3042\u306a\u305f\u306eAI\u3092\u751f\u304d\u305f\u6a19\u7684\u306e\u3088\u3046\u306b\u6271\u3046\u300cAI\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u4fb5\u5165\u30c6\u30b9\u30c8\u300d\u30b5\u30fc\u30d3\u30b9\u3092\u958b\u59cb\u3057\u307e\u3057\u305f\u3002\u7406\u8ad6\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002\u30c1\u30a7\u30c3\u30af\u30ea\u30b9\u30c8\u306e\u76e3\u67fb\u3067\u3082\u3042\u308a\u307e\u305b\u3093\u3002\u5b9f\u969b\u306e\u30db\u30ef\u30a4\u30c8\u30cf\u30c3\u30c8\u30cf\u30c3\u30ab\u30fc\u304c\u3001\u4f01\u696d\u74b0\u5883\u5185\u306eAI\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u3001\u30c1\u30e3\u30c3\u30c8\u30dc\u30c3\u30c8\u3001RAG\u30b7\u30b9\u30c6\u30e0\u306b\u5bfe\u3059\u308b\u5b9f\u969b\u306e\u653b\u6483\u3092\u30b7\u30df\u30e5\u30ec\u30fc\u30c8\u3057\u307e\u3059\u3002.<\/p>\n<p>\u73fe\u5728\u3001\u5f7c\u3089\u304c\u5bfe\u51e6\u3057\u3066\u3044\u308b\u554f\u984c\u306f\u3001\u4ee5\u524d\u3088\u308a\u3082\u91cd\u5927\u306b\u306a\u3063\u3066\u3044\u307e\u3059\u3002\u4f01\u696d\u306fAI\u3092\u30ef\u30fc\u30af\u30d5\u30ed\u30fc\u3001\u30c7\u30fc\u30bf\u30b7\u30b9\u30c6\u30e0\u3001\u5916\u90e8\u30c4\u30fc\u30eb\u306b\u7d44\u307f\u8fbc\u3080\u3053\u3068\u3092\u6025\u3044\u3067\u3044\u307e\u3059\u3002AI\u30e6\u30fc\u30b6\u30fc\u306b\u6709\u76ca\u306a\u6a5f\u80fd\u3092\u63d0\u4f9b\u3059\u308b\u306e\u3068\u540c\u3058\u30a2\u30af\u30bb\u30b7\u30d3\u30ea\u30c6\u30a3\u304c\u3001AI\u30e6\u30fc\u30b6\u30fc\u306b\u3068\u3063\u3066\u306f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4e0a\u306e\u8105\u5a01\u3068\u306a\u308a\u307e\u3059\u3002\u30d7\u30ed\u30f3\u30d7\u30c8\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\u306b\u3088\u308b\u30c7\u30fc\u30bf\u6f0f\u3048\u3044\u3001\u8a31\u53ef\u3055\u308c\u3059\u304e\u305f\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u304c\u3084\u3063\u3066\u306f\u3044\u3051\u306a\u3044\u3053\u3068\u3092\u3059\u308b\u3001\u3042\u308b\u3044\u306fAI\u304c\u3088\u308a\u5e83\u7bc4\u306a\u30b7\u30b9\u30c6\u30e0\u4fb5\u5bb3\u306e\u5165\u308a\u53e3\u306b\u306a\u308b\u3001\u306a\u3069\u3067\u3059\u3002.<\/p>\n<p>\u5f7c\u3089\u306e\u30a2\u30d7\u30ed\u30fc\u30c1\u306f\u3001\u8003\u3048\u65b9\u306f\u30b7\u30f3\u30d7\u30eb\u3067\u3059\u304c\u3001\u5b9f\u884c\u3059\u308b\u306e\u306f\u56f0\u96e3\u3067\u3059\u3002\u30d3\u30b8\u30cd\u30b9\u3067\u306eAI\u306e\u4f7f\u7528\u65b9\u6cd5\u3092\u7406\u89e3\u3057\u3001\u653b\u6483\u30b7\u30ca\u30ea\u30aa\u3092\u518d\u73fe\u3057\u3001\u793e\u5185\u30b7\u30b9\u30c6\u30e0\u3092\u4f7f\u7528\u3057\u3066\u5b9f\u969b\u306e\u74b0\u5883\u3067\u30c6\u30b9\u30c8\u3057\u307e\u3059\u3002\u7126\u70b9\u306f\u30e2\u30c7\u30eb\u3060\u3051\u3067\u306a\u304f\u3001\u6a29\u9650\u3001\u7d71\u5408\u3001\u30c7\u30fc\u30bf\u30fb\u30a2\u30af\u30bb\u30b9\u3067\u3059\u3002\u5b9f\u969b\u306b\u30ea\u30b9\u30af\u306e\u5927\u534a\u306f\u305d\u3053\u306b\u3042\u308a\u307e\u3059\u3002.<\/p>\n<h4>\u3053\u3061\u3089\u3082\u304a\u8aad\u307f\u304f\u3060\u3055\u3044\uff1a <a class=\"p-url\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/check-point-and-google-cloud-strengthen-ai-agent-security\/\" rel=\"bookmark\">\u30c1\u30a7\u30c3\u30af\u30fb\u30dd\u30a4\u30f3\u30c8\u3068 Google Cloud \u304c AI \u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u5f37\u5316<\/a><\/h4>\n<p>\u307e\u305f\u3001\u3088\u308a\u5e83\u7bc4\u306a\u30b7\u30d5\u30c8\u3082\u8d77\u3053\u3063\u3066\u3044\u307e\u3059\u3002\u5f93\u6765\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30c6\u30b9\u30c8\u306f\u3001\u30a2\u30d7\u30ea\u3084\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306e\u305f\u3081\u306b\u69cb\u7bc9\u3055\u308c\u3066\u3044\u307e\u3057\u305f\u3002AI\u306f\u305d\u306e\u30e2\u30c7\u30eb\u3092\u58ca\u3057\u307e\u3059\u3002\u4eca\u3084\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306f\u3001\u884c\u52d5\u3001\u30b3\u30f3\u30c6\u30ad\u30b9\u30c8\u3001\u610f\u601d\u6c7a\u5b9a\u3092\u6a19\u7684\u3068\u3059\u308b\u653b\u6483\u8005\u306e\u3088\u3046\u306b\u8003\u3048\u308b\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002.<\/p>\n<p>\u7d50\u8ad6\u3068\u3057\u3066\u3001AI\u306e\u5c0e\u5165\u306fAI\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3088\u308a\u3082\u65e9\u304f\u9032\u3093\u3067\u3044\u307e\u3059\u3002\u3053\u306e\u3088\u3046\u306a\u30b5\u30fc\u30d3\u30b9\u306f\u3001\u5927\u304d\u306a\u554f\u984c\u306b\u767a\u5c55\u3059\u308b\u524d\u306b\u305d\u306e\u30ae\u30e3\u30c3\u30d7\u3092\u57cb\u3081\u3088\u3046\u3068\u3057\u3066\u3044\u307e\u3059\u3002.<\/p>","protected":false},"excerpt":{"rendered":"<p>GMO Cybersecurity by Ierae has launched an \u2018AI Agent Penetration Testing\u2019 service that basically treats your AI like a live target. Not theory. Not checklist audits. Actual white-hat hackers simulating real attacks on AI agents, chatbots, and RAG systems inside enterprise environments. The current issue they deal with now becomes more critical than before. Companies are rushing to plug AI into workflows, data systems, and external tools. The same accessibility that provides AI users with beneficial features creates security threats for them. Think data leaks through prompt injection, over-permissioned agents doing things they shouldn\u2019t, or AI becoming an entry point for wider system compromise. Their approach is simple in idea, [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":32091,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"wprm-recipe-roundup-name":"","wprm-recipe-roundup-description":"","postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[208,184,211,237,1838,206,85],"tags":[533,110,5506,6232,12698],"ppma_author":[572],"class_list":{"0":"post-32056","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apac","8":"category-cybersecurity","9":"category-japan","10":"category-news","11":"category-quick-reads","12":"category-regional","13":"category-tech","14":"tag-ai-agent","15":"tag-cybersecurity","16":"tag-gmo-cybersecurity","17":"tag-ierae","18":"tag-vulnerability-assessment"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>GMO pushes real-world security tests for AI agents<\/title>\n<meta name=\"description\" content=\"GMO Cybersecurity by Ierae launches AI Agent Penetration Testing, using real-world attack simulations to assess enterprise AI agents.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/gmo-cybersecurity-launches-hacking-tests-for-ai-agents\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GMO pushes real-world security tests for AI agents\" \/>\n<meta property=\"og:description\" content=\"GMO Cybersecurity by Ierae launches AI Agent Penetration Testing, using real-world attack simulations to assess enterprise AI agents.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/gmo-cybersecurity-launches-hacking-tests-for-ai-agents\/\" \/>\n<meta property=\"og:site_name\" content=\"itbusinesstoday\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-27T10:57:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/GMO-Cybersecurity-launches-hacking-tests-for-AI-agents.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1201\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"ITBT StaffWriter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"ITBT StaffWriter\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"1\u5206\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GMO pushes real-world security tests for AI agents","description":"GMO Cybersecurity by Ierae launches AI Agent Penetration Testing, using real-world attack simulations to assess enterprise AI agents.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/gmo-cybersecurity-launches-hacking-tests-for-ai-agents\/","og_locale":"ja_JP","og_type":"article","og_title":"GMO pushes real-world security tests for AI agents","og_description":"GMO Cybersecurity by Ierae launches AI Agent Penetration Testing, using real-world attack simulations to assess enterprise AI agents.","og_url":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/gmo-cybersecurity-launches-hacking-tests-for-ai-agents\/","og_site_name":"itbusinesstoday","article_published_time":"2026-04-27T10:57:35+00:00","og_image":[{"width":1201,"height":800,"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/GMO-Cybersecurity-launches-hacking-tests-for-AI-agents.webp","type":"image\/webp"}],"author":"ITBT StaffWriter","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"ITBT StaffWriter","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"1\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gmo-cybersecurity-launches-hacking-tests-for-ai-agents\/#article","isPartOf":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gmo-cybersecurity-launches-hacking-tests-for-ai-agents\/"},"author":{"name":"ITBT StaffWriter","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15"},"headline":"GMO Cybersecurity launches hacking tests for AI agents","datePublished":"2026-04-27T10:57:35+00:00","mainEntityOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gmo-cybersecurity-launches-hacking-tests-for-ai-agents\/"},"wordCount":237,"publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gmo-cybersecurity-launches-hacking-tests-for-ai-agents\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/GMO-Cybersecurity-launches-hacking-tests-for-AI-agents.webp","keywords":["AI Agent","cybersecurity","GMO CyberSecurity","Ierae","Vulnerability assessment"],"articleSection":["APAC","Cybersecurity","Japan","News","Quick Reads","Regional","Tech"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gmo-cybersecurity-launches-hacking-tests-for-ai-agents\/","url":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gmo-cybersecurity-launches-hacking-tests-for-ai-agents\/","name":"GMO pushes real-world security tests for AI agents","isPartOf":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gmo-cybersecurity-launches-hacking-tests-for-ai-agents\/#primaryimage"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gmo-cybersecurity-launches-hacking-tests-for-ai-agents\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/GMO-Cybersecurity-launches-hacking-tests-for-AI-agents.webp","datePublished":"2026-04-27T10:57:35+00:00","description":"GMO Cybersecurity by Ierae launches AI Agent Penetration Testing, using real-world attack simulations to assess enterprise AI agents.","breadcrumb":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gmo-cybersecurity-launches-hacking-tests-for-ai-agents\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gmo-cybersecurity-launches-hacking-tests-for-ai-agents\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gmo-cybersecurity-launches-hacking-tests-for-ai-agents\/#primaryimage","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/GMO-Cybersecurity-launches-hacking-tests-for-AI-agents.webp","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2026\/04\/GMO-Cybersecurity-launches-hacking-tests-for-AI-agents.webp","width":1201,"height":800,"caption":"GMO Cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/itbusinesstoday.com\/tech\/cybersecurity\/gmo-cybersecurity-launches-hacking-tests-for-ai-agents\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itbusinesstoday.com\/"},{"@type":"ListItem","position":2,"name":"GMO Cybersecurity launches hacking tests for AI agents"}]},{"@type":"WebSite","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","description":"","publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","width":663,"height":275,"caption":"itbusinesstoday"},"image":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/94fb575e469aff25a4b938814d050f15","name":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png90b3cb23d1d9c08733d969d29ea2d30d","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","caption":"ITBT StaffWriter"},"description":"ITBT\u30b9\u30bf\u30c3\u30d5\u30e9\u30a4\u30bf\u30fc\u306f\u3001IT Business Today\u306e\u793e\u5185\u5bc4\u7a3f\u8005\u3067\u3001\u30bf\u30a4\u30e0\u30ea\u30fc\u306a\u30cb\u30e5\u30fc\u30b9\u3068QuickBytes\u306e\u914d\u4fe1\u3092\u62c5\u5f53\u3057\u3066\u3044\u307e\u3059\u3002IT\u3001\u30cf\u30a4\u30c6\u30af\u3001\u4f01\u696d\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u6700\u65b0\u52d5\u5411\u3092\u30ab\u30d0\u30fc\u3057\u3001\u7c21\u6f54\u3067\u30a4\u30f3\u30d1\u30af\u30c8\u306e\u3042\u308b\u6700\u65b0\u60c5\u5831\u3092\u8aad\u8005\u306b\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002","sameAs":["https:\/\/itbusinesstoday.com\/"],"url":"https:\/\/itbusinesstoday.com\/ja\/author\/itbt-staffwriter\/"}]}},"authors":[{"term_id":572,"user_id":7,"is_guest":0,"slug":"itbt-staffwriter","display_name":"ITBT StaffWriter","avatar_url":{"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png","url2x":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Favicon-1.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/32056","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/comments?post=32056"}],"version-history":[{"count":1,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/32056\/revisions"}],"predecessor-version":[{"id":32057,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/32056\/revisions\/32057"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media\/32091"}],"wp:attachment":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media?parent=32056"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/categories?post=32056"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/tags?post=32056"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/ppma_author?post=32056"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}