{"id":4034,"date":"2024-09-08T23:13:33","date_gmt":"2024-09-08T16:13:33","guid":{"rendered":"https:\/\/technica.ai\/?p=4034"},"modified":"2025-03-23T15:34:03","modified_gmt":"2025-03-23T08:34:03","slug":"threat-intelligence","status":"publish","type":"post","link":"https:\/\/technica.ai\/ja\/case-studies\/threat-intelligence\/","title":{"rendered":"\u8106\u5f31\u6027\u8a3a\u65ad"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"4034\" class=\"elementor elementor-4034\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5905ebd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5905ebd\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f938a69\" data-id=\"f938a69\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-664ea53 elementor-widget elementor-widget-text-editor\" data-id=\"664ea53\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>\u8ab2\u984c<\/strong><\/h4><p>\u5e38\u306b\u5909\u5316\u3057\u7d9a\u3051\u308b\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u306b\u76f4\u9762\u3059\u308b\u4e2d\u3067\u3001\u7d44\u7e54\u306b\u306f\u8105\u5a01\u306b\u5bfe\u6297\u3059\u308b\u305f\u3081\u306e\u7a4d\u6975\u7684\u304b\u3064\u52b9\u7387\u7684\u306a\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u304c\u6c42\u3081\u3089\u308c\u3066\u3044\u307e\u3059\u3002\u73fe\u5728\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u74b0\u5883\u306f\u3001\u30c7\u30fc\u30bf\u306e\u6c3e\u6feb\u3001\u96a0\u308c\u305f\u30d1\u30bf\u30fc\u30f3\u3001\u4eba\u624b\u306b\u3088\u308b\u5bfe\u5fdc\u306e\u9650\u754c\u3001\u305d\u3057\u3066\u8907\u96d1\u5316\u3057\u305f\u65e2\u5b58\u30b7\u30b9\u30c6\u30e0\u3068\u3044\u3046\u8ab2\u984c\u3092\u62b1\u3048\u3066\u3044\u307e\u3059\u3002<\/p><h4><strong>\u89e3\u6c7a\u7b56<\/strong><\/h4><p>AIKNOW Security \u306f\u3001\u751f\u6210AI\u3068\u30d7\u30e9\u30a4\u30d9\u30fc\u30c8LLM\u3092\u6d3b\u7528\u3057\u3066\u3053\u308c\u3089\u306e\u8ab2\u984c\u306b\u5bfe\u5fdc\u3057\u307e\u3059\u3002\u81ea\u7136\u8a00\u8a9e\u7406\u89e3\u3001\u30d1\u30bf\u30fc\u30f3\u8a8d\u8b58\u3001\u30b9\u30b1\u30fc\u30e9\u30d6\u30eb\u306a\u5206\u6790\u306b\u3088\u308a\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c1\u30fc\u30e0\u304c\u8105\u5a01\u3092\u7a4d\u6975\u7684\u306b\u7279\u5b9a\u3057\u3001\u5206\u6790\u3057\u3001\u5bfe\u5fdc\u3067\u304d\u308b\u3088\u3046\u306b\u3057\u307e\u3059\u3002<\/p><h4><strong>\u4e3b\u306a\u6a5f\u80fd<\/strong><\/h4><ul><li>\u8105\u5a01\u60c5\u5831\u306e\u53ce\u96c6\u3068\u5206\u6790\u306e\u81ea\u52d5\u5316<\/li><li>\u76f4\u611f\u7684\u306a\u8105\u5a01\u63a2\u7d22\u306e\u305f\u3081\u306e\u4f1a\u8a71\u578b AI \u30a4\u30f3\u30bf\u30fc\u30d5\u30a7\u30fc\u30b9<\/li><li>\u81ea\u52d5\u5316\u3055\u308c\u305f\u8981\u7d04\u3068\u901a\u77e5\u306b\u3088\u308b\u30b3\u30df\u30e5\u30cb\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u52b9\u7387\u5316<\/li><li>Slack\u3084Teams\u306a\u3069\u306e\u4eba\u6c17\u30c4\u30fc\u30eb\u3068\u306e\u30b7\u30fc\u30e0\u30ec\u30b9\u306a\u7d71\u5408<\/li><\/ul><h4><strong>\u7d50\u679c<\/strong><\/h4><ul><li>\u7a4d\u6975\u7684\u306a\u8105\u5a01\u691c\u51fa\u3068\u5f37\u5316\u3055\u308c\u305f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4f53\u5236<\/li><li>\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u5bfe\u5fdc\u306e\u6539\u5584\u3068\u30ea\u30bd\u30fc\u30b9\u5272\u308a\u5f53\u3066\u306e\u6700\u9069\u5316<\/li><li>\u5927\u5e45\u306a\u30b3\u30b9\u30c8\u524a\u6e1b<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>AIKnow Security \u306f\u3001\u751f\u6210AI\u3068\u30d7\u30e9\u30a4\u30d9\u30fc\u30c8LLM\u3092\u6d3b\u7528\u3057\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c1\u30fc\u30e0\u304c\u8105\u5a01\u3092\u7a4d\u6975\u7684\u306b\u7279\u5b9a\u3001\u5206\u6790\u3001\u305d\u3057\u3066\u8fc5\u901f\u306b\u5bfe\u5fdc\u3067\u304d\u308b\u3088\u3046\u652f\u63f4\u3057\u307e\u3059\u3002<\/p>","protected":false},"author":2,"featured_media":4191,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[9],"tags":[33,36,21,35,34,55,44],"class_list":["post-4034","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-case-studies","tag-aiknow-security","tag-cybersecurity","tag-genai","tag-intelligence","tag-threat","tag-55","tag-ai"],"acf":[],"_links":{"self":[{"href":"https:\/\/technica.ai\/ja\/wp-json\/wp\/v2\/posts\/4034","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technica.ai\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technica.ai\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technica.ai\/ja\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/technica.ai\/ja\/wp-json\/wp\/v2\/comments?post=4034"}],"version-history":[{"count":7,"href":"https:\/\/technica.ai\/ja\/wp-json\/wp\/v2\/posts\/4034\/revisions"}],"predecessor-version":[{"id":5632,"href":"https:\/\/technica.ai\/ja\/wp-json\/wp\/v2\/posts\/4034\/revisions\/5632"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/technica.ai\/ja\/wp-json\/wp\/v2\/media\/4191"}],"wp:attachment":[{"href":"https:\/\/technica.ai\/ja\/wp-json\/wp\/v2\/media?parent=4034"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technica.ai\/ja\/wp-json\/wp\/v2\/categories?post=4034"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technica.ai\/ja\/wp-json\/wp\/v2\/tags?post=4034"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}