{"id":29813,"date":"2023-04-24T15:50:11","date_gmt":"2023-04-24T21:50:11","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=29813"},"modified":"2025-12-10T05:52:59","modified_gmt":"2025-12-10T12:52:59","slug":"chatgpt-openai%e3%81%ae%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e3%83%aa%e3%82%b9%e3%82%af%e3%81%ab%e9%96%a2%e3%81%99%e3%82%8b%e8%80%83%e6%85%ae%e4%ba%8b%e9%a0%85","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ja\/chatgpt-openai-security-risks-considerations\/","title":{"rendered":"ChatGPT \u306f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4e0a\u306e\u30ea\u30b9\u30af\u304c\u3042\u308a\u307e\u3059\u304c\u3001\u305d\u308c\u3067\u3082\u4f7f\u7528\u3057\u307e\u3059\u3002."},"content":{"rendered":"\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/CHAT_GPT.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"AI-themed graphic showing artificial intelligence interface elements and automation concepts related to ChatGPT and cybersecurity workflows.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/CHAT_GPT.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/CHAT_GPT-300x178.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/CHAT_GPT-1024x609.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/CHAT_GPT-768x457.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2023-04-24T15:50:11-06:00\">4\u6708 24, 2023<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">ChatGPT is a Security Risk, But We\u2019ll Still Use it.<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ja\/author\/Michael_Lyborg\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/lyborg.png\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tMichael Lyborg\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">5 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ja\/chatgpt-openai-security-risks-considerations\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ja\/chatgpt-openai-security-risks-considerations\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('ChatGPT%20is%20a%20Security%20Risk%2C%20But%20We%E2%80%99ll%20Still%20Use%20it.').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fja%2Fchatgpt-openai-security-risks-considerations%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=ChatGPT%20is%20a%20Security%20Risk%2C%20but%20We%E2%80%99ll%20Still%20Use%20it.&url=https%3A%2F%2Fswimlane.com%2Fja%2Fchatgpt-openai-security-risks-considerations%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fja%2Fchatgpt-openai-security-risks-considerations%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fja%2Fchatgpt-openai-security-risks-considerations%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h4 class=\"wp-block-heading\"><em>With power comes great responsibility. Here are the security considerations your organization should take during the latest wave of ChatGPT hype.<\/em><\/h4>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>It\u2019s safe to say ChatGPT is the talk of the town right now \u2013&nbsp;and for the foreseeable future. The OpenAI language model generates human-like responses to queries or statements. It relies on both public information and private data that the user discloses. While an excellent tool for communication and information sharing, ChatGPT comes with some potential security risks that need to be considered.&nbsp;<\/p>\n\n\n\n<p>As a pioneering security automation company, we understand the potential risks of emerging technologies. On the flip side, we agree that ChatGPT is a game changer across many businesses, professions and industries. Our employees are no different. To put it simply \u2013 it\u2019s cool, and we all want to use it. That\u2019s why we encourage our employees to <em>safely<\/em> engage with the platform.&nbsp;<\/p>\n\n\n\n<p>Before we all run off and leak source code, let\u2019s examine the security risks and considerations on a deeper level.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What to Look for: The Primary Security Risks of ChatGPT<\/strong><\/h2>\n\n\n\n<h4 class=\"wp-block-heading\">Impersonation and Manipulation<\/h4>\n\n\n\n<p>One of the main security risks seen in ChatGPT is malicious actors\u2019 clear use of it for impersonation and manipulation. The model can be used to create fake identities that are eerily realistic. These are then leveraged for nefarious purposes such as <a href=\"https:\/\/unit42.paloaltonetworks.com\/chatgpt-scam-attacks-increasing\/\">phishing attacks<\/a>, spreading fake news, or conducting social engineering scams.&nbsp;<\/p>\n\n\n\n<p>For instance, malicious actors can use the model to create bots that impersonate real individuals, making it difficult for others to distinguish between genuine and fake conversations. You\u2019ve likely heard of<a href=\"https:\/\/www.vice.com\/en\/article\/jg5ew4\/gpt4-hired-unwitting-taskrabbit-worker\"> ChatGPT pretending to be a visually impaired individual to bypass CAPTCHA tests<\/a>. ChatGPT\u2019s behavior is convincing and can easily be used against your employees.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Data Breaches from Unknowing Employees<\/h4>\n\n\n\n<p>Another security risk associated with ChatGPT is the possibility of data breaches. ChatGPT uses a vast amount of data to train and improve its responses, including private and sensitive information. If this data falls into the wrong hands, it can lead to identity theft, financial fraud, or other malicious activities. Hackers may even be able to exploit vulnerabilities in ChatGPT&#8217;s code to gain unauthorized access to data or manipulate the model&#8217;s responses.<\/p>\n\n\n\n<p>Earlier last month, a bug in the platform resulted in <a href=\"https:\/\/www.helpnetsecurity.com\/2023\/03\/27\/chatgpt-data-leak\/\">personal and billing data being accidentally leaked<\/a>. We can expect similar leaks to occur again as user demand continues to grow and strain ChatGPT\u2019s own security.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">A Disinformation and Propaganda Powerhouse<\/h4>\n\n\n\n<p>ChatGPT can clearly be used to spread disinformation and propaganda. To quote the co-chief executive of NewsGuard, \u201cThis tool is going to be the most powerful tool for spreading misinformation that has ever been on the internet,\u201d as described in recent <a href=\"https:\/\/www.nytimes.com\/2023\/02\/08\/technology\/ai-chatbots-disinformation.html\">NY Times coverage<\/a>.<\/p>\n\n\n\n<p>By generating convincing narratives that are false, yet strikingly believable, malicious actors can spread misinformation on a massive scale. This could be particularly damaging in the context of political campaigns, where fake news stories or fabricated evidence can sway public opinion and affect election outcomes.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Lack of Transparency and Accountability<\/h4>\n\n\n\n<p>Another potential security risk associated with ChatGPT is the lack of transparency and accountability. Since the model is trained using massive amounts of data, it can be difficult to understand how it arrives at its responses. This makes it difficult to identify biases or to ensure that the model is not being used to discriminate against certain individuals or groups.&nbsp;<\/p>\n\n\n\n<p>Since ChatGPT is an AI-based system, it can be challenging to establish accountability for any negative outcomes that may result from its use. It wouldn\u2019t be surprising for ChatGPT to be at the center of legal battles over leaked source code or trade secrets in the not-so-near future.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Where to Start: Areas of Consideration<\/strong><\/h3>\n\n\n\n<p>Artificial intelligence tools are becoming increasingly common in the workplace. They offer numerous benefits, such as the ability to increase efficiency, improve accuracy and reduce overall costs.&nbsp;<\/p>\n\n\n\n<p>However, as with any new technology, there are also potential risks and challenges that companies need to consider when looking at their employees&#8217; usage of these tools. Here are some things that companies should keep in mind when it comes to ChatGPT usage:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Training:<\/strong> It is essential to provide adequate training for employees to use AI tools effectively. This should include not only technical training on how to use the tools but also training on how to use the tools in conjunction with other processes and company policies.<\/li>\n\n\n\n<li><strong>Data Privacy:<\/strong> AI tools require access to large amounts of data, which can include sensitive information. Companies need to ensure that employees understand how to handle this data securely and follow best practices for data privacy.<\/li>\n\n\n\n<li><strong>Regulation and Compliance:<\/strong> Depending on the industry and the type of data being processed, there may be legal requirements around the use of AI tools. Companies need to ensure that their use of ChatGPT complies with all relevant laws and regulations.<\/li>\n\n\n\n<li><strong>Transparency:<\/strong> Employees need to understand how AI tools work and how they are being used within the organization. This includes providing clear explanations of how the tools operate, what data they are using, and how the output is being used.<\/li>\n\n\n\n<li><strong>Ethical Considerations:<\/strong> AI tools can have significant impacts on individuals and society as a whole. Companies need to consider the potential ethical implications of using these tools and ensure that they are being used in a responsible and ethical manner.<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>When You Can\u2019t Beat Them, Join Them<\/strong><\/h3>\n\n\n\n<p>It\u2019s important to develop a clear lens into ChatGPT usage within your organization. And while the security risks might be alarming, it also might not be worth banning ChatGPT outright. Employees will continue to use the platform \u2013 especially as it relates to their work. Thankfully, there are steps you can take to mitigate some of the risks of private business data being leaked:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Implement Security Protocols<\/h4>\n\n\n\n<p>One of the ways to mitigate the security risks of ChatGPT is to implement strict security protocols. This includes secure data handling practices: encrypt sensitive data and limit access to authorized personnel.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Raise Awareness with Employee Training<\/h4>\n\n\n\n<p>Another way to mitigate the risks associated with ChatGPT is to raise awareness about the potential dangers of AI-based systems in general. This includes education for employees about the risks. It\u2019s critical to provide guidelines for safe and responsible use.<\/p>\n\n\n\n<p>ChatGPT is a revolutionary technology with enormous potential for worldwide change. However, it comes with major potential security risks that must be considered. When you implement security protocols and raise awareness about the potential dangers of AI-based systems, your security team can mitigate major risks and ensure that ChatGPT is used safely and responsibly.<\/p>\n\n\n\n<div class=\"bs-div bs-div-97857b2bb1d34c826f7b3e7ae456ecd46e5835d3 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-97857b2bb1d34c826f7b3e7ae456ecd46e5835d3 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/image_2024-06-11_095257533.png' class='img-fluid'   alt='roi report swimlane security automation' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\">A Buyer\u2019s Guide for Modern Security Automation<\/h2>\n\n\n\n<p>Enterprise SOC teams recognize the need for automation but often struggle with the automation solutions themselves. Security Orchestration, Automation and Response (SOAR) solutions commonly require extensive scripting. No-code automation solutions are simplistic and lack necessary case management and reporting capabilities. This guide analyzes the wide range of security automation platforms available today, so you can identify the type of solution that fits your needs the best.<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-64e28d66238e64a87dfb4a7523d99bbfa5294f03\"><style>.bs-pro-button-p-btn-64e28d66238e64a87dfb4a7523d99bbfa5294f03 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/e-books\/a-buyers-guide-for-modern-security-automation\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/ja\/tag\/ai\/'><span class='tag-content'>AI<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d277ef40df1 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/what-is-soar\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>7\u6708 2, 2025<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>What is SOAR? A Complete Guide to SOAR Platforms<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d277ef4223c bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/state-of-soar-2019\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>12\u6708 10, 2019<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>The State of SOAR 2019: How using SOAR tools makes life easier<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d277ef43146 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/key-takeaways-from-gartners-2020-market-guide-for-soar-solutions\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>9\u6708 23, 2020<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Key Takeaways for SOAR Solutions<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":21,"featured_media":29814,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"2023-03-09T00:24:51.576Z","featured":false,"featured_image":29814,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[442],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[202],"resource-type":[67],"resource-topic":[133],"resource-industry":[],"blog-category":[75,76,79],"class_list":["post-29813","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-ai","resource-type-blogs","resource-topic-research","blog-category-security-automation","blog-category-learn","blog-category-leadership"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>ChatGPT is a Security Risk, But We\u2019ll Still Use it. Here&#039;s Why.<\/title>\n<meta name=\"description\" content=\"Find out the top security considerations your organization should take during the latest wave of ChatGPT hype.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ja\/chatgpt-openai\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306b\u95a2\u3059\u308b\u8003\u616e\u4e8b\u9805\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ChatGPT is a Security Risk, but We\u2019ll Still Use it.\" \/>\n<meta property=\"og:description\" content=\"Here are the security considerations your organization should take during the latest wave of ChatGPT hype.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ja\/chatgpt-openai\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306b\u95a2\u3059\u308b\u8003\u616e\u4e8b\u9805\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-10T12:52:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/CHAT_GPT-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"ChatGPT is a Security Risk, but We\u2019ll Still Use it.\" \/>\n<meta name=\"twitter:description\" content=\"Here are the security considerations your organization should take during the latest wave of ChatGPT hype.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/CHAT_GPT-1.png\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"6\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/ja\/chatgpt-openai-security-risks-considerations\/\",\"url\":\"https:\/\/swimlane.com\/ja\/chatgpt-openai-security-risks-considerations\/\",\"name\":\"ChatGPT is a Security Risk, But We\u2019ll Still Use it. Here's Why.\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/ja\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/ja\/chatgpt-openai-security-risks-considerations\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ja\/chatgpt-openai-security-risks-considerations\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/CHAT_GPT.png\",\"datePublished\":\"2023-04-24T21:50:11+00:00\",\"dateModified\":\"2025-12-10T12:52:59+00:00\",\"description\":\"Find out the top security considerations your organization should take during the latest wave of ChatGPT hype.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/ja\/chatgpt-openai-security-risks-considerations\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/ja\/chatgpt-openai-security-risks-considerations\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/swimlane.com\/ja\/chatgpt-openai-security-risks-considerations\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/CHAT_GPT.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/CHAT_GPT.png\",\"width\":1120,\"height\":666,\"caption\":\"AI-themed graphic showing artificial intelligence interface elements and automation concepts related to ChatGPT and cybersecurity workflows.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/ja\/chatgpt-openai-security-risks-considerations\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ChatGPT is a Security Risk, But We\u2019ll Still Use it.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/ja\/#website\",\"url\":\"https:\/\/swimlane.com\/ja\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/ja\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/ja\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/ja\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/ja\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"ChatGPT\u306f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u304c\u3042\u308a\u307e\u3059\u304c\u3001\u305d\u308c\u3067\u3082\u79c1\u305f\u3061\u306f\u4f7f\u3044\u7d9a\u3051\u307e\u3059\u3002\u305d\u306e\u7406\u7531\u306f\u6b21\u306e\u3068\u304a\u308a\u3067\u3059\u3002.","description":"ChatGPT \u306e\u6700\u8fd1\u306e\u6d41\u884c\u306e\u6ce2\u306e\u4e2d\u3067\u3001\u7d44\u7e54\u304c\u8003\u616e\u3059\u3079\u304d\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4e0a\u306e\u4e3b\u306a\u8003\u616e\u4e8b\u9805\u3092\u78ba\u8a8d\u3057\u3066\u304f\u3060\u3055\u3044\u3002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ja\/chatgpt-openai\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306b\u95a2\u3059\u308b\u8003\u616e\u4e8b\u9805\/","og_locale":"ja_JP","og_type":"article","og_title":"ChatGPT is a Security Risk, but We\u2019ll Still Use it.","og_description":"Here are the security considerations your organization should take during the latest wave of ChatGPT hype.","og_url":"https:\/\/swimlane.com\/ja\/chatgpt-openai\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u306b\u95a2\u3059\u308b\u8003\u616e\u4e8b\u9805\/","og_site_name":"AI Security Automation","article_modified_time":"2025-12-10T12:52:59+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/CHAT_GPT-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"ChatGPT is a Security Risk, but We\u2019ll Still Use it.","twitter_description":"Here are the security considerations your organization should take during the latest wave of ChatGPT hype.","twitter_image":"https:\/\/swimlane.com\/wp-content\/uploads\/CHAT_GPT-1.png","twitter_site":"@swimlane","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"6\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ja\/chatgpt-openai-security-risks-considerations\/","url":"https:\/\/swimlane.com\/ja\/chatgpt-openai-security-risks-considerations\/","name":"ChatGPT\u306f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30ea\u30b9\u30af\u304c\u3042\u308a\u307e\u3059\u304c\u3001\u305d\u308c\u3067\u3082\u79c1\u305f\u3061\u306f\u4f7f\u3044\u7d9a\u3051\u307e\u3059\u3002\u305d\u306e\u7406\u7531\u306f\u6b21\u306e\u3068\u304a\u308a\u3067\u3059\u3002.","isPartOf":{"@id":"https:\/\/swimlane.com\/ja\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ja\/chatgpt-openai-security-risks-considerations\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ja\/chatgpt-openai-security-risks-considerations\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/CHAT_GPT.png","datePublished":"2023-04-24T21:50:11+00:00","dateModified":"2025-12-10T12:52:59+00:00","description":"ChatGPT \u306e\u6700\u8fd1\u306e\u6d41\u884c\u306e\u6ce2\u306e\u4e2d\u3067\u3001\u7d44\u7e54\u304c\u8003\u616e\u3059\u3079\u304d\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4e0a\u306e\u4e3b\u306a\u8003\u616e\u4e8b\u9805\u3092\u78ba\u8a8d\u3057\u3066\u304f\u3060\u3055\u3044\u3002.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ja\/chatgpt-openai-security-risks-considerations\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ja\/chatgpt-openai-security-risks-considerations\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/chatgpt-openai-security-risks-considerations\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/CHAT_GPT.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/CHAT_GPT.png","width":1120,"height":666,"caption":"AI-themed graphic showing artificial intelligence interface elements and automation concepts related to ChatGPT and cybersecurity workflows."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ja\/chatgpt-openai-security-risks-considerations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"ChatGPT is a Security Risk, But We\u2019ll Still Use it."}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ja\/#website","url":"https:\/\/swimlane.com\/ja\/","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","description":"\u3042\u3089\u3086\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u80fd\u3092\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u578bAI\u3067\u81ea\u52d5\u5316","publisher":{"@id":"https:\/\/swimlane.com\/ja\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ja\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ja\/#organization","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","url":"https:\/\/swimlane.com\/ja\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/29813","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/users\/21"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/29813\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media\/29814"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media?parent=29813"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/tags?post=29813"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-type?post=29813"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-topic?post=29813"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-industry?post=29813"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/blog-category?post=29813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}