{"id":9871,"date":"2025-04-21T12:32:47","date_gmt":"2025-04-21T12:32:47","guid":{"rendered":"https:\/\/itbusinesstoday.com\/?p=9871"},"modified":"2025-05-06T07:07:09","modified_gmt":"2025-05-06T07:07:09","slug":"cac-expands-cybersecurity-business-and-partners-priv-tech","status":"publish","type":"post","link":"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/cac-expands-cybersecurity-business-and-partners-priv-tech\/","title":{"rendered":"CAC\u304c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4e8b\u696d\u3092\u62e1\u5927\u3001Priv Tech\u3068\u63d0\u643a"},"content":{"rendered":"<p>\u682a\u5f0f\u4f1a\u793e\u30b7\u30fc\u30a8\u30fc\u30b7\u30fc\u306f\u3001\u682a\u5f0f\u4f1a\u793ePriv Tech\u3068\u5171\u540c\u3067\u63a8\u9032\u3057\u3066\u304d\u305f\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4e8b\u696d\u3092\u62e1\u5927\u3057\u3001\u30d0\u30b0\u30d0\u30a6\u30f3\u30c6\u30a3\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3068\u9023\u643a\u3057\u305f\u300c\u30c8\u30ea\u30a2\u30fc\u30b8\u30b5\u30fc\u30d3\u30b9\u300d\u306e\u63d0\u4f9b\u3092\u958b\u59cb\u3057\u307e\u3059\u3002<\/p>\n<p>\u4f01\u696d\u3078\u306e\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u306f\u5e74\u3005\u5de7\u5999\u5316\u30fb\u9ad8\u901f\u5316\u3057\u3066\u304a\u308a\u3001\u5f93\u6765\u306e\u9632\u5fa1\u624b\u6cd5\u3067\u306f\u5bfe\u5fdc\u304c\u56f0\u96e3\u306b\u306a\u3063\u3066\u3044\u307e\u3059\u3002\u7279\u306b\u3001\u30b8\u30a7\u30cd\u30ec\u30fc\u30c6\u30a3\u30d6AI\u3092\u7528\u3044\u305f\u653b\u6483\u624b\u6cd5\u306e\u767a\u9054\u306b\u3088\u308a\u3001\u653b\u6483\u306e\u81ea\u52d5\u5316\u304c\u9032\u307f\u3001\u305d\u306e\u901f\u5ea6\u3084\u7cbe\u5ea6\u304c\u5411\u4e0a\u3057\u3066\u3044\u307e\u3059\u3002\u4f01\u696d\u306e\u60c5\u5831\u30b7\u30b9\u30c6\u30e0\u306e\u69cb\u7bc9\u30fb\u904b\u7528\u3092\u4e3b\u306a\u4e8b\u696d\u3068\u3059\u308b\u30b7\u30fc\u30a8\u30fc\u30b7\u30fc\u3067\u306f\u3001\u3053\u3046\u3057\u305f\u8105\u5a01\u306b\u5bfe\u5fdc\u3059\u308b\u30b5\u30fc\u30d3\u30b9\u306e\u62e1\u5145\u306b\u53d6\u308a\u7d44\u3093\u3067\u3044\u307e\u3059\u3002\u3053\u306e\u30b5\u30fc\u30d3\u30b9\u306f\u3001\u4e16\u754c\u4e2d\u306e\u7d4c\u9a13\u8c4a\u5bcc\u306a\u30db\u30ef\u30a4\u30c8\u30cf\u30c3\u30c8\u30cf\u30c3\u30ab\u30fc\u3068\u9023\u643a\u3057\u3001\u30d0\u30b0\u30d0\u30a6\u30f3\u30c6\u30a3\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3092\u6d3b\u7528\u3057\u3066\u63d0\u4f9b\u3059\u308b\u3082\u306e\u3067\u3001\u30b5\u30a4\u30d0\u30fc\u653b\u6483\u3078\u306e\u8fc5\u901f\u306a\u5bfe\u5fdc\u3092\u5b9f\u73fe\u3059\u308b\u4e0a\u3067\u6709\u52b9\u3067\u3042\u308b\u3068\u8003\u3048\u3066\u3044\u307e\u3059\u3002<\/p>\n<p>\u30d0\u30b0\u30d0\u30a6\u30f3\u30c6\u30a3\u3068\u306f\u3001\u30db\u30ef\u30a4\u30c8\u30cf\u30c3\u30c8\u30fb\u30cf\u30c3\u30ab\u30fc\u304c\u4f01\u696d\u306a\u3069\u306e\u7d44\u7e54\u304b\u3089\u8106\u5f31\u6027\u8a3a\u65ad\u3092\u4f9d\u983c\u3055\u308c\u3001\u30b7\u30b9\u30c6\u30e0\u306e\u8106\u5f31\u6027\u3092\u767a\u898b\u3059\u308b\u4ed5\u7d44\u307f\u3067\u3059\u3002\u30d0\u30b0\u30d0\u30a6\u30f3\u30c6\u30a3\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306f\u3001\u591a\u304f\u306e\u30db\u30ef\u30a4\u30c8\u30cf\u30c3\u30c8\u30cf\u30c3\u30ab\u30fc\u3068\u9023\u643a\u3057\u3001\u30d0\u30b0\u30d0\u30a6\u30f3\u30c6\u30a3\u3092\u30b5\u30fc\u30d3\u30b9\u3068\u3057\u3066\u63d0\u4f9b\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\n<h4><strong>\u3053\u3061\u3089\u3082\u304a\u8aad\u307f\u304f\u3060\u3055\u3044\uff1a <a class=\"p-url\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cybersecurity\/intelligent-wave-launches-evidian-orbion-for-iam-functions\/\" rel=\"bookmark\">\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30c8 \u30a6\u30a7\u30a4\u30d6\u3001IAM\u6a5f\u80fd\u5411\u3051\u300cEvidian Orbion\u300d\u3092\u8ca9\u58f2\u958b\u59cb<\/a><\/strong><\/h4>\n<p>\u3053\u306e\u30b5\u30fc\u30d3\u30b9\u3067\u306f <a href=\"https:\/\/www.cac.co.jp\/\">\u30b3\u30cd\u30af\u30b7\u30e7\u30f3\u304d\u3087\u304b\u305b\u3044\u304e\u3087<\/a> \u682a\u5f0f\u4f1a\u793e\u30d0\u30b0\u30af\u30e9\u30a6\u30c9\u304c\u904b\u55b6\u3059\u308b\u6d77\u5916\u30d0\u30b0\u30d0\u30a6\u30f3\u30c6\u30a3\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u300cBugcrowd\u300d\u304b\u3089\u306e\u5831\u544a\u66f8\u3092\u3082\u3068\u306b\u3001\u30b7\u30b9\u30c6\u30e0\u8106\u5f31\u6027\u306e\u7a2e\u985e\u3084\u5f71\u97ff\u7bc4\u56f2\u7b49\u304b\u3089\u91cd\u8981\u5ea6\u30fb\u7dca\u6025\u5ea6\u3092\u8a55\u4fa1\u3059\u308b\u300cBugcrowd\u8106\u5f31\u6027\u8a55\u4fa1\u30b5\u30fc\u30d3\u30b9\u300d\u3092\u4f01\u696d\u3088\u308a\u53d7\u8a17\u3057\u3066\u3044\u307e\u3059\u3002 <a href=\"https:\/\/privtech.co.jp\/\">\u30d7\u30e9\u30a4\u30d9\u30fc\u30c8\u30fb\u30c6\u30c3\u30af<\/a> \u304c\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u3067\u3042\u308b\u306a\u3069\u3001\u4fe1\u983c\u6027\u306e\u9ad8\u3044\u60c5\u5831\u30bd\u30fc\u30b9\u3092\u6d3b\u7528\u3057\u3001\u5bfe\u5fdc\u306e\u512a\u5148\u9806\u4f4d\u3092\u8fc5\u901f\u306b\u6c7a\u5b9a\u3057\u307e\u3059\u3002\u307e\u305f\u3001\u8106\u5f31\u6027\u306e\u7ba1\u7406\u30fb\u662f\u6b63\u306b\u95a2\u3059\u308b\u6226\u7565\u65b9\u91dd\u306e\u7b56\u5b9a\u3092\u652f\u63f4\u3057\u3001\u5177\u4f53\u7684\u306a\u30b7\u30b9\u30c6\u30e0\u5bfe\u5fdc\u306b\u95a2\u3059\u308b\u6307\u5c0e\u3084\u5c02\u9580\u5bb6\u306b\u3088\u308b\u30b3\u30f3\u30b5\u30eb\u30c6\u30a3\u30f3\u30b0\u3092\u884c\u3044\u307e\u3059\u3002<\/p>\n<p><strong>\u30bd\u30fc\u30b9 <a href=\"https:\/\/prtimes.jp\/main\/html\/rd\/p\/000000115.000024483.html\">PR\u30bf\u30a4\u30e0\u30ba<\/a><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>CAC Corporation will expand the cybersecurity business it has been promoting in collaboration with Priv Tech Inc. and begin offering a &#8220;triage service&#8221; in collaboration with a bug bounty platform. Cyber \u200b\u200battacks on companies are becoming more sophisticated and faster every year, making it difficult to respond using traditional defense methods. In particular, with the development of attack methods using generative AI, attacks are becoming automated, and their speed and accuracy are improving. As CAC&#8217;s main business is the construction and operation of corporate information systems, it is working to expand its services to respond to such threats. This service is provided by utilizing a bug bounty platform in collaboration [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":9872,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"wprm-recipe-roundup-name":"","wprm-recipe-roundup-description":"","postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"footnotes":""},"categories":[208,184,211,237,206,85],"tags":[3455,3169,110,564,3454,3456],"ppma_author":[205],"class_list":{"0":"post-9871","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-apac","8":"category-cybersecurity","9":"category-japan","10":"category-news","11":"category-regional","12":"category-tech","13":"tag-bug-bounty-platform","14":"tag-cac-corporation","15":"tag-cybersecurity","16":"tag-generative-ai","17":"tag-priv-tech","18":"tag-triage-service"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CAC Expands Cybersecurity Business and Partners with Priv Tech<\/title>\n<meta name=\"description\" content=\"CAC Corporation expands its cybersecurity services in partnership with Priv Tech, launching a triage service integrated with a bug bounty platform.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cac-expands-cybersecurity-business-and-partners-priv-tech\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CAC Expands Cybersecurity Business and Partners with Priv Tech\" \/>\n<meta property=\"og:description\" content=\"CAC Corporation expands its cybersecurity services in partnership with Priv Tech, launching a triage service integrated with a bug bounty platform.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itbusinesstoday.com\/ja\/tech\/cac-expands-cybersecurity-business-and-partners-priv-tech\/\" \/>\n<meta property=\"og:site_name\" content=\"itbusinesstoday\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-21T12:32:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-06T07:07:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/04\/CAC-Expands-Cybersecurity-Business.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"NewsDesk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"NewsDesk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u5206\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CAC\u304c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4e8b\u696d\u3092\u62e1\u5927\u3001Priv Tech\u3068\u63d0\u643a","description":"\u682a\u5f0f\u4f1a\u793e\u30b7\u30fc\u30a8\u30fc\u30b7\u30fc\u306f\u3001Priv Tech\u793e\u3068\u306e\u63d0\u643a\u306b\u3088\u308a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30fc\u30d3\u30b9\u3092\u62e1\u5927\u3057\u3001\u30d0\u30b0\u30d0\u30a6\u30f3\u30c6\u30a3\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3068\u7d71\u5408\u3057\u305f\u30c8\u30ea\u30a2\u30fc\u30b8\u30b5\u30fc\u30d3\u30b9\u3092\u958b\u59cb\u3057\u307e\u3057\u305f\u3002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itbusinesstoday.com\/ja\/tech\/cac-expands-cybersecurity-business-and-partners-priv-tech\/","og_locale":"ja_JP","og_type":"article","og_title":"CAC Expands Cybersecurity Business and Partners with Priv Tech","og_description":"CAC Corporation expands its cybersecurity services in partnership with Priv Tech, launching a triage service integrated with a bug bounty platform.","og_url":"https:\/\/itbusinesstoday.com\/ja\/tech\/cac-expands-cybersecurity-business-and-partners-priv-tech\/","og_site_name":"itbusinesstoday","article_published_time":"2025-04-21T12:32:47+00:00","article_modified_time":"2025-05-06T07:07:09+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/04\/CAC-Expands-Cybersecurity-Business.webp","type":"image\/webp"}],"author":"NewsDesk","twitter_card":"summary_large_image","twitter_misc":{"\u57f7\u7b46\u8005":"NewsDesk","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"2\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itbusinesstoday.com\/tech\/cac-expands-cybersecurity-business-and-partners-priv-tech\/#article","isPartOf":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cac-expands-cybersecurity-business-and-partners-priv-tech\/"},"author":{"name":"NewsDesk","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/d58d81f55e8acd257ab63d49fb4ea812"},"headline":"CAC Expands Cybersecurity Business and Partners Priv Tech","datePublished":"2025-04-21T12:32:47+00:00","dateModified":"2025-05-06T07:07:09+00:00","mainEntityOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cac-expands-cybersecurity-business-and-partners-priv-tech\/"},"wordCount":276,"publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cac-expands-cybersecurity-business-and-partners-priv-tech\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/04\/CAC-Expands-Cybersecurity-Business.webp","keywords":["bug bounty platform","CAC Corporation","cybersecurity","generative AI","Priv Tech","triage service"],"articleSection":["APAC","Cybersecurity","Japan","News","Regional","Tech"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/itbusinesstoday.com\/tech\/cac-expands-cybersecurity-business-and-partners-priv-tech\/","url":"https:\/\/itbusinesstoday.com\/tech\/cac-expands-cybersecurity-business-and-partners-priv-tech\/","name":"CAC\u304c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4e8b\u696d\u3092\u62e1\u5927\u3001Priv Tech\u3068\u63d0\u643a","isPartOf":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cac-expands-cybersecurity-business-and-partners-priv-tech\/#primaryimage"},"image":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cac-expands-cybersecurity-business-and-partners-priv-tech\/#primaryimage"},"thumbnailUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/04\/CAC-Expands-Cybersecurity-Business.webp","datePublished":"2025-04-21T12:32:47+00:00","dateModified":"2025-05-06T07:07:09+00:00","description":"\u682a\u5f0f\u4f1a\u793e\u30b7\u30fc\u30a8\u30fc\u30b7\u30fc\u306f\u3001Priv Tech\u793e\u3068\u306e\u63d0\u643a\u306b\u3088\u308a\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30b5\u30fc\u30d3\u30b9\u3092\u62e1\u5927\u3057\u3001\u30d0\u30b0\u30d0\u30a6\u30f3\u30c6\u30a3\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u3068\u7d71\u5408\u3057\u305f\u30c8\u30ea\u30a2\u30fc\u30b8\u30b5\u30fc\u30d3\u30b9\u3092\u958b\u59cb\u3057\u307e\u3057\u305f\u3002.","breadcrumb":{"@id":"https:\/\/itbusinesstoday.com\/tech\/cac-expands-cybersecurity-business-and-partners-priv-tech\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itbusinesstoday.com\/tech\/cac-expands-cybersecurity-business-and-partners-priv-tech\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/tech\/cac-expands-cybersecurity-business-and-partners-priv-tech\/#primaryimage","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/04\/CAC-Expands-Cybersecurity-Business.webp","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/04\/CAC-Expands-Cybersecurity-Business.webp","width":1200,"height":800,"caption":"CAC Corporation"},{"@type":"BreadcrumbList","@id":"https:\/\/itbusinesstoday.com\/tech\/cac-expands-cybersecurity-business-and-partners-priv-tech\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itbusinesstoday.com\/"},{"@type":"ListItem","position":2,"name":"CAC Expands Cybersecurity Business and Partners Priv Tech"}]},{"@type":"WebSite","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#website","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","description":"","publisher":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#organization","name":"\u30a4\u30c3\u30c8\u30d3\u30b8\u30cd\u30b9\u30c8\u30a5\u30c7\u30a4","url":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/Asset-1.png","width":663,"height":275,"caption":"itbusinesstoday"},"image":{"@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/itbusinesstoday-68b209.ingress-baronn.ewp.live\/#\/schema\/person\/d58d81f55e8acd257ab63d49fb4ea812","name":"\u30cb\u30e5\u30fc\u30b9\u30c7\u30b9\u30af","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png74f313ad3d6fa27a1eee85c30be63d03","url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png","contentUrl":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png","caption":"NewsDesk"},"sameAs":["https:\/\/itbusinesstoday.com"],"url":"https:\/\/itbusinesstoday.com\/ja\/author\/newsdesk\/"}]}},"authors":[{"term_id":205,"user_id":4,"is_guest":0,"slug":"newsdesk","display_name":"NewsDesk","avatar_url":{"url":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png","url2x":"https:\/\/itbusinesstoday.com\/wp-content\/uploads\/2025\/01\/it.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/9871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/comments?post=9871"}],"version-history":[{"count":2,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/9871\/revisions"}],"predecessor-version":[{"id":10639,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/posts\/9871\/revisions\/10639"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media\/9872"}],"wp:attachment":[{"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/media?parent=9871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/categories?post=9871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/tags?post=9871"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/itbusinesstoday.com\/ja\/wp-json\/wp\/v2\/ppma_author?post=9871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}