{"id":118274,"date":"2026-02-05T10:00:47","date_gmt":"2026-02-05T03:00:47","guid":{"rendered":"https:\/\/wp.eastgate-software.com\/?p=118274"},"modified":"2026-04-01T15:20:21","modified_gmt":"2026-04-01T08:20:21","slug":"ai-is-breaking-enterprise-cyber-defenses","status":"publish","type":"post","link":"https:\/\/wp.eastgate-software.com\/jp\/ai-is-breaking-enterprise-cyber-defenses\/","title":{"rendered":"AI Is Breaking Enterprise Cyber Defenses"},"content":{"rendered":"<p><span data-contrast=\"auto\">Artificial intelligence is advancing faster than enterprise cyber defenses can adapt, according to\u00a0<\/span><span data-contrast=\"auto\">the\u00a0Zscaler\u00a0ThreatLabz\u00a02026 AI Security Report, which<\/span><span data-contrast=\"auto\">\u00a0warns that AI has become a primary vector for autonomous, machine-speed cyberattacks.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The report analyzed\u00a0nearly one\u00a0trillion AI and machine-learning transactions processed through the Zscaler Zero Trust Exchange between January and December 2025. It found that enterprises are approaching a tipping point where AI has shifted from a productivity enhancer to a mechanism for rapid, automated intrusion. Zscaler researchers report that enterprise AI systems can be compromised in as little as 16 minutes, with critical vulnerabilities\u00a0identified\u00a0in every system tested.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\u30de\u30c3\u30ad\u30f3\u30bc\u30fc\u306e\u00a0<\/span><span data-contrast=\"auto\">Deepen Desai, Zscaler\u2019s executive vice president for cybersecurity, AI-driven intrusions now progress from discovery to data exfiltration in minutes,\u00a0rendering\u00a0traditional defenses ineffective. The findings highlight that AI adoption is accelerating far beyond enterprise oversight, with usage growing mor<\/span><span data-contrast=\"auto\">e than 200% in key industries while many organizations still lack basic inventories of deployed AI models.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Security leaders interviewed for the report emphasized that AI is increasingly embedded by default into enterprise software.\u00a0<\/span><b><span data-contrast=\"auto\">SAS<\/span><\/b><span data-contrast=\"auto\">\u00a0senior vice pre<\/span><span data-contrast=\"auto\">sident\u00a0Stu Bradley\u00a0n<\/span><span data-contrast=\"auto\">oted that organizations are \u201cembracing AI faster than they\u2019re building governance guardrails,\u201d leaving sensitive data exposed. Similarly,\u00a0<\/span>Liquibase<span data-contrast=\"auto\">\u00a0warned that AI usage often spreads without formal security reviews.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The report also\u00a0identified\u00a0identity\u00a0sprawl as a major risk.\u00a0<\/span><b><span data-contrast=\"auto\">Cloud Security Alliance<\/span><\/b><span data-contrast=\"auto\">\u00a0reported an 82-to-1 ratio of non-human to human identities, many with excessive permissions. AI agents and APIs compound this exposure by creating unintended attack chains that bypass legacy controls.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Zscaler concluded that AI governance is no longer a policy exercise but an operational necessity. Organizations that treat AI systems as managed identities\u2014with visibility, ownership, and continuous oversight\u2014are more likely to sustain AI adoption without compromising security.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">\u30bd\u30fc\u30b9\uff1a<\/span><\/b><span data-ccp-props=\"{&quot;335551550&quot;:6,&quot;335551620&quot;:6}\">\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.technewsworld.com\/story\/ai-rapidly-rendering-cyber-defenses-obsolete-report-180148.html?__hstc=147279080.cbe7a3a03489c49131d9a40f0909459b.1745229294955.1770118345508.1770178857032.81&amp;__hssc=147279080.1.1770178857032&amp;__hsfp=24d5c09b7d6dd0d2ce2a03d49f4b641c\"><span data-contrast=\"none\">https:\/\/www.technewsworld.com\/story\/ai-rapidly-rendering-cyber-defenses-obsolete-report-180148.html?__hstc=147279080.cbe7a3a03489c49131d9a40f0909459b.1745229294955.1770118345508.1770178857032.81&amp;__hssc=147279080.1.1770178857032&amp;__hsfp=24d5c09b7d6dd0d2ce2a03d49f4b641c<\/span><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Artificial intelligence is advancing faster than enterprise cyber defenses can adapt, according to\u00a0the\u00a0Zscaler\u00a0ThreatLabz\u00a02026 AI Security Report, which\u00a0warns that AI has become a primary vector for autonomous, machine-speed cyberattacks.\u00a0 The report analyzed\u00a0nearly one\u00a0trillion AI and machine-learning transactions processed through the Zscaler Zero Trust Exchange between January and December 2025. It found that enterprises are approaching a tipping point where AI has shifted from a productivity enhancer to a mechanism for rapid, automated intrusion. Zscaler researchers report that enterprise AI systems can be compromised in as little as 16 minutes, with critical vulnerabilities\u00a0identified\u00a0in every system tested.\u00a0 According to\u00a0Deepen Desai, Zscaler\u2019s executive vice president for cybersecurity, AI-driven intrusions now progress from discovery to [&hellip;]<\/p>","protected":false},"author":238283293,"featured_media":118276,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1584],"tags":[1488,1715,1659,1538],"class_list":["post-118274","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-enthusiast","tag-ai","tag-ai-cyber-defenses","tag-cybercrime","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>AI Is Breaking Enterprise Cyber Defenses - Eastgate Software<\/title>\n<meta name=\"description\" content=\"A report warns that AI-driven attacks now move faster than traditional cyber defenses, exposing major gaps in enterprise security.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI Is Breaking Enterprise Cyber Defenses\" \/>\n<meta property=\"og:description\" content=\"A report warns that AI-driven attacks now move faster than traditional cyber defenses, exposing major gaps in enterprise security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wp.eastgate-software.com\/jp\/ai-is-breaking-enterprise-cyber-defenses\/\" \/>\n<meta property=\"og:site_name\" content=\"Eastgate Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EastgateSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-05T03:00:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T08:20:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-2.webp?fit=1366%2C768&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"huongnguyen253\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:site\" content=\"@EastgateSoft\" \/>\n<meta name=\"twitter:label1\" content=\"\u57f7\u7b46\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"huongnguyen253\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-is-breaking-enterprise-cyber-defenses\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-is-breaking-enterprise-cyber-defenses\\\/\"},\"author\":{\"name\":\"huongnguyen253\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\"},\"headline\":\"AI Is Breaking Enterprise Cyber Defenses\",\"datePublished\":\"2026-02-05T03:00:47+00:00\",\"dateModified\":\"2026-04-01T08:20:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-is-breaking-enterprise-cyber-defenses\\\/\"},\"wordCount\":332,\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-is-breaking-enterprise-cyber-defenses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/EGS-news-website-1366-x-768px-2.webp?fit=1366%2C768&ssl=1\",\"keywords\":[\"Ai\",\"AI Cyber Defenses\",\"Cybercrime\",\"cybersecurity\"],\"articleSection\":[\"Tech Enthusiast\"],\"inLanguage\":\"ja\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-is-breaking-enterprise-cyber-defenses\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-is-breaking-enterprise-cyber-defenses\\\/\",\"name\":\"AI Is Breaking Enterprise Cyber Defenses - Eastgate Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-is-breaking-enterprise-cyber-defenses\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-is-breaking-enterprise-cyber-defenses\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/EGS-news-website-1366-x-768px-2.webp?fit=1366%2C768&ssl=1\",\"datePublished\":\"2026-02-05T03:00:47+00:00\",\"dateModified\":\"2026-04-01T08:20:21+00:00\",\"description\":\"A report warns that AI-driven attacks now move faster than traditional cyber defenses, exposing major gaps in enterprise security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-is-breaking-enterprise-cyber-defenses\\\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-is-breaking-enterprise-cyber-defenses\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-is-breaking-enterprise-cyber-defenses\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/EGS-news-website-1366-x-768px-2.webp?fit=1366%2C768&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/EGS-news-website-1366-x-768px-2.webp?fit=1366%2C768&ssl=1\",\"width\":1366,\"height\":768,\"caption\":\"AI Is Breaking Enterprise Cyber Defenses\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/ai-is-breaking-enterprise-cyber-defenses\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI Is Breaking Enterprise Cyber Defenses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#website\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"name\":\"Eastgate Software\",\"description\":\"A Global Fortune 500 Company&#039;s Strategic Partner\",\"publisher\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wp.eastgate-software.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#organization\",\"name\":\"Eastgate Software\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"contentUrl\":\"https:\\\/\\\/wp.eastgate-software.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/logo.svg\",\"width\":124,\"height\":36,\"caption\":\"Eastgate Software\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EastgateSoftware\\\/\",\"https:\\\/\\\/x.com\\\/EastgateSoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wp.eastgate-software.com\\\/#\\\/schema\\\/person\\\/01b8220b50bd555756a737527646a79a\",\"name\":\"huongnguyen253\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g\",\"caption\":\"huongnguyen253\"},\"url\":\"https:\\\/\\\/wp.eastgate-software.com\\\/jp\\\/author\\\/huongnguyen253\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"AI Is Breaking Enterprise Cyber Defenses - Eastgate Software","description":"A report warns that AI-driven attacks now move faster than traditional cyber defenses, exposing major gaps in enterprise security.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"ja_JP","og_type":"article","og_title":"AI Is Breaking Enterprise Cyber Defenses","og_description":"A report warns that AI-driven attacks now move faster than traditional cyber defenses, exposing major gaps in enterprise security.","og_url":"https:\/\/wp.eastgate-software.com\/jp\/ai-is-breaking-enterprise-cyber-defenses\/","og_site_name":"Eastgate Software","article_publisher":"https:\/\/www.facebook.com\/EastgateSoftware\/","article_published_time":"2026-02-05T03:00:47+00:00","article_modified_time":"2026-04-01T08:20:21+00:00","og_image":[{"width":1366,"height":768,"url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-2.webp?fit=1366%2C768&ssl=1","type":"image\/webp"}],"author":"huongnguyen253","twitter_card":"summary_large_image","twitter_creator":"@EastgateSoft","twitter_site":"@EastgateSoft","twitter_misc":{"\u57f7\u7b46\u8005":"huongnguyen253","\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"2\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wp.eastgate-software.com\/ai-is-breaking-enterprise-cyber-defenses\/#article","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/ai-is-breaking-enterprise-cyber-defenses\/"},"author":{"name":"huongnguyen253","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a"},"headline":"AI Is Breaking Enterprise Cyber Defenses","datePublished":"2026-02-05T03:00:47+00:00","dateModified":"2026-04-01T08:20:21+00:00","mainEntityOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/ai-is-breaking-enterprise-cyber-defenses\/"},"wordCount":332,"publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/ai-is-breaking-enterprise-cyber-defenses\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-2.webp?fit=1366%2C768&ssl=1","keywords":["Ai","AI Cyber Defenses","Cybercrime","cybersecurity"],"articleSection":["Tech Enthusiast"],"inLanguage":"ja"},{"@type":"WebPage","@id":"https:\/\/wp.eastgate-software.com\/ai-is-breaking-enterprise-cyber-defenses\/","url":"https:\/\/wp.eastgate-software.com\/ai-is-breaking-enterprise-cyber-defenses\/","name":"AI Is Breaking Enterprise Cyber Defenses - Eastgate Software","isPartOf":{"@id":"https:\/\/wp.eastgate-software.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wp.eastgate-software.com\/ai-is-breaking-enterprise-cyber-defenses\/#primaryimage"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/ai-is-breaking-enterprise-cyber-defenses\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-2.webp?fit=1366%2C768&ssl=1","datePublished":"2026-02-05T03:00:47+00:00","dateModified":"2026-04-01T08:20:21+00:00","description":"A report warns that AI-driven attacks now move faster than traditional cyber defenses, exposing major gaps in enterprise security.","breadcrumb":{"@id":"https:\/\/wp.eastgate-software.com\/ai-is-breaking-enterprise-cyber-defenses\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wp.eastgate-software.com\/ai-is-breaking-enterprise-cyber-defenses\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/wp.eastgate-software.com\/ai-is-breaking-enterprise-cyber-defenses\/#primaryimage","url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-2.webp?fit=1366%2C768&ssl=1","contentUrl":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-2.webp?fit=1366%2C768&ssl=1","width":1366,"height":768,"caption":"AI Is Breaking Enterprise Cyber Defenses"},{"@type":"BreadcrumbList","@id":"https:\/\/wp.eastgate-software.com\/ai-is-breaking-enterprise-cyber-defenses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wp.eastgate-software.com\/"},{"@type":"ListItem","position":2,"name":"AI Is Breaking Enterprise Cyber Defenses"}]},{"@type":"WebSite","@id":"https:\/\/wp.eastgate-software.com\/#website","url":"https:\/\/wp.eastgate-software.com\/","name":"Eastgate Software","description":"\u30b0\u30ed\u30fc\u30d0\u30eb\u30d5\u30a9\u30fc\u30c1\u30e5\u30f3500\u4f01\u696d\u306e\u6226\u7565\u7684\u30d1\u30fc\u30c8\u30ca\u30fc","publisher":{"@id":"https:\/\/wp.eastgate-software.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wp.eastgate-software.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/wp.eastgate-software.com\/#organization","name":"Eastgate Software","url":"https:\/\/wp.eastgate-software.com\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/","url":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","contentUrl":"https:\/\/wp.eastgate-software.com\/wp-content\/uploads\/2023\/09\/logo.svg","width":124,"height":36,"caption":"Eastgate Software"},"image":{"@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EastgateSoftware\/","https:\/\/x.com\/EastgateSoft"]},{"@type":"Person","@id":"https:\/\/wp.eastgate-software.com\/#\/schema\/person\/01b8220b50bd555756a737527646a79a","name":"\u30d5\u30aa\u30f3\u30b0\u30a8\u30f3253","image":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/21ed2e1167cb8fc59108a43023c298cbe9c81ec2b240fc3b6f8bbf05134975b1?s=96&d=identicon&r=g","caption":"huongnguyen253"},"url":"https:\/\/wp.eastgate-software.com\/jp\/author\/huongnguyen253\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/wp.eastgate-software.com\/wp-content\/uploads\/2026\/02\/EGS-news-website-1366-x-768px-2.webp?fit=1366%2C768&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pf8Ne8-uLE","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/posts\/118274","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/users\/238283293"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/comments?post=118274"}],"version-history":[{"count":4,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/posts\/118274\/revisions"}],"predecessor-version":[{"id":119528,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/posts\/118274\/revisions\/119528"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/media\/118276"}],"wp:attachment":[{"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/media?parent=118274"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/categories?post=118274"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.eastgate-software.com\/jp\/wp-json\/wp\/v2\/tags?post=118274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}