{"id":33859,"date":"2023-11-14T09:30:00","date_gmt":"2023-11-14T16:30:00","guid":{"rendered":"https:\/\/swimlane.com\/?post_type=sw_resource&#038;p=33859"},"modified":"2025-04-15T12:29:44","modified_gmt":"2025-04-15T18:29:44","slug":"%e6%8d%95%e9%af%a8%e6%94%bb%e6%92%83%e3%81%ae%e8%aa%ac%e6%98%8e","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ja\/blog\/whaling-attacks-explained\/","title":{"rendered":"\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u304a\u3051\u308b\u30db\u30a8\u30fc\u30ea\u30f3\u30b0\u653b\u6483\u3068\u306f\u4f55\u3067\u3059\u304b?"},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/WHALINGATTACK_MASTHEAD.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Whaling attack\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/\/WHALINGATTACK_MASTHEAD.png 1120w, https:\/\/swimlane.com\/wp-content\/uploads\/\/WHALINGATTACK_MASTHEAD-300x178.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/\/WHALINGATTACK_MASTHEAD-1024x609.png 1024w, https:\/\/swimlane.com\/wp-content\/uploads\/\/WHALINGATTACK_MASTHEAD-768x457.png 768w\" sizes=\"(max-width: 1120px) 100vw, 1120px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2023-11-14T09:30:00-07:00\">11\u6708 14, 2023<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">What is a Whaling Attack in Cybersecurity?<\/h1>\n\n\n<div class=\"bs-div bs-div-1c02a909fcd723a1ec953772586290c0df1291b1 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ja\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">4 <\/span> Minute Read\n<\/div>\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ja\/blog\/whaling-attacks-explained\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ja\/blog\/whaling-attacks-explained\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('What%20is%20a%20Whaling%20Attack%20in%20Cybersecurity%3F').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fwhaling-attacks-explained%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=What%20is%20a%20Whaling%20Attack%20in%20Cyber%20Security%3F%20%7C%20Swimlane&url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fwhaling-attacks-explained%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fwhaling-attacks-explained%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fja%2Fblog%2Fwhaling-attacks-explained%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2 class=\"wp-block-heading\">What is Whaling in CyberSecurity?<\/h2>\n\n\n\n<p>Imagine a vast ocean of cybersecurity, overflowing with different <a href=\"https:\/\/swimlane.com\/blog\/types-of-cyber-security-attacks\/\">types of cybersecurity attacks<\/a> and threats of all sizes. In these digital waters, there are a few who stand out &#8211; the &#8220;whales&#8221; of the corporate world. Whaling attacks are the harpoons of cyber espionage, aimed at the big fish in an organization&#8217;s sea.&nbsp;<\/p>\n\n\n\n<p>The &#8220;whales&#8221; are the C-suite&#8217;s top executives, senior team players, and high-profile employees. Their significance within a company makes them prime targets for hackers, who see them as gateways to a wealth of sensitive data. It&#8217;s their influence and authority that sets the stage for a successful whaling attack.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Does Whaling Work?<\/h2>\n\n\n\n<p>Hackers try to take on the disguises of whales and weaponize social engineering. They exploit the reputations of their high-ranking prey, impersonating senior executives or key employees. Their strength lies in manipulation, leveraging their fake authority and manipulating lower-ranking staff into compromising vital data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Examples of Whaling Attacks<\/h2>\n\n\n\n<p>The most common whaling attack is the spoofed email, a convincing imitation of legitimate company correspondence. One click, and the hack is underway. Let&#8217;s explore how a whaling scam unfurls in the world of cybersecurity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Whaling Attack Through an Email Link<\/h3>\n\n\n\n<p>Imagine an email, allegedly from the CEO, sent to subordinates. It&#8217;s an email with authority, demanding immediate attention. There&#8217;s a link within, a download, seemingly innocent but dangerous. When this is clicked, the system&#8217;s defenses crumble, and confidential information is exposed.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.theguardian.com\/technology\/2016\/feb\/29\/snapchat-leaks-employee-data-ceo-scam-email\">Snapchat<\/a> found itself in this exact situation when an HR staff member mistook a hacker&#8217;s email for the CEO&#8217;s. Payroll details of current and former employees were handed over, resulting in a data breach.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Whaling Attack Through a Subpoena Email<\/h3>\n\n\n\n<p>Whaling tactics are not limited to email links. Hackers can take on the disguise of the United States District Court, sending people a fake subpoena through an email. Individuals, concerned for their organization&#8217;s well-being, discover a payload of malware upon opening the email.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Whaling Attack Via Zoom Invite<\/h3>\n\n\n\n<p>Some hackers get creative, similar to the case of&nbsp; Levitas, an Aussie hedge fund. A <a href=\"https:\/\/www.news.com.au\/technology\/online\/security\/levitas-capital-closing-after-fake-zoom-invite-sinks-16m-super-fund-investment\/news-story\/110750489020507558921a95cbe2c980\">fake Zoom invite led to their downfall<\/a>, when the co-founder clicked the seemingly innocent link. This generated fake invoices within the company&#8217;s system, leading to significant financial losses.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Whaling Attack to Send Money<\/h3>\n\n\n\n<p>Even giants like Mattel, the toy company behind Barbie and Hot Wheels, aren\u2019t immune to whaling attacks. Impersonating the new CEO, scammers requested a hefty money transfer to a new vendor. Eager to meet the boss&#8217;s demands, the victim unwittingly completed the transaction, handing <a href=\"https:\/\/www.cbsnews.com\/news\/mattel-vs-chinese-cyberthieves-its-no-game\/\">$3 million to Chinese cyberthieves.<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are the Consequences of Whaling Attacks?<\/h2>\n\n\n\n<p>From <a href=\"https:\/\/swimlane.com\/blog\/top-data-breaches-2022\/\">data breaches<\/a> to financial losses, the aftermath is detrimental. Below are some of the consequences for anyone who falls prey to a whaling scam:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Divulge sensitive information<\/li>\n\n\n\n<li>Infect a computer with malware<\/li>\n\n\n\n<li>Lose a huge amount of money<\/li>\n\n\n\n<li>Attack on supply chains<\/li>\n\n\n\n<li>Execute corporate espionage<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">How are Whaling Attacks and Phishing Attacks Similar?<\/h2>\n\n\n\n<p>While whaling and phishing attacks often share the same waters, they&#8217;re distinct species. Whaling is a subset of spear phishing, focusing exclusively on high-profile targets. <a href=\"https:\/\/swimlane.com\/blog\/soar-automated-phishing-investigation-and-response\/\">Phishing<\/a>, on the other hand, casts a wider net, targeting various individuals regardless of their rank or role.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is Spear Phishing?<\/h2>\n\n\n\n<p>So, what is spear phishing? This phishing method is a subcategory of phishing that preys on low-profile individuals. This could be a particular group of people or certain individuals who are vulnerable to sharing sensitive information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Phishing vs. Whaling vs. Spear Phishing&nbsp;<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><\/td><td><strong>Phishing<\/strong><\/td><td><strong>Whaling<\/strong><\/td><td><strong>Spear Phishing<\/strong><\/td><\/tr><tr><td><strong>Target<\/strong><\/td><td>A large number of individuals<\/td><td>C-suite executives and top-ranking officials<\/td><td>Low-profile individuals in a specific organization<\/td><\/tr><tr><td><strong>Focus<\/strong><\/td><td>Personal information&nbsp;<\/td><td>Steals trade secrets or large amounts of money<\/td><td>Stealing key information and money<\/td><\/tr><tr><td><strong>Value<\/strong><\/td><td>Low yield, not many organizational assets at stake<\/td><td>Immediate high-value results<\/td><td>Varying results, usually high yield&nbsp;<\/td><\/tr><tr><td><strong>Technology<\/strong><\/td><td>Not very advanced technology&nbsp;<\/td><td>Sophisticated technology&nbsp;<\/td><td>Slightly more sophisticated technology than regular phishing activities<\/td><\/tr><tr><td><strong>Examples<\/strong><\/td><td>Mass email distribution stating passwords need resetting<\/td><td>Carefully crafted email that appears to be from a C suite executive that asks top-level executive for payroll details<\/td><td>An email regarding incomplete details from an attempted payment, and a false link to retry the payment is attached.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">How to Prevent Whaling Attacks?<\/h2>\n\n\n\n<p>Whaling attacks are some of the boldest scams that are carried out successfully. It\u2019s their authoritative elements incorporated into their tactic that victims helplessly fall for. But whaling scams, just like other security attacks, can be prevented through cyber awareness.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is Whaling Cyber Awareness?<\/h3>\n\n\n\n<p>Awareness is the first line of defense, not only for high-ranking executives but for every employee in an organization. It&#8217;s vital to instill a culture of cyber consciousness.<\/p>\n\n\n\n<p>Organizations can start by educating all teams on the significance of cybersecurity. Equipping them with the knowledge necessary to recognize and prevent whaling attempts. Some steps to fortify your organization&#8217;s defenses:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Implement essential cybersecurity practices across the board.<\/li>\n\n\n\n<li>Scrutinize emails closely, paying attention to structure and punctuation.<\/li>\n\n\n\n<li>Be cautious with emails from external sources.<\/li>\n\n\n\n<li>Exercise restraint before clicking on links or attachments from unfamiliar senders.<\/li>\n\n\n\n<li>Think twice before sharing personal information online, for it might be just what a hacker needs to reel in their catch.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">What is the Role of Social Media in Whaling Attacks?<\/h2>\n\n\n\n<p>Social media is one of the main sources for hackers. It&#8217;s where hackers find the information they need to craft the perfect whaling attack. The top executives should be cautious of their online presence. It\u2019s important to refrain from sharing specific details online to prevent hackers from gaining the ammunition they need.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Protect Your Organization Against Cyber Attacks with Swimlane<\/h2>\n\n\n\n<p>With the rising tide of whaling attacks and other <a href=\"https:\/\/swimlane.com\/blog\/types-of-cyber-security-attacks\/\">types of cyber security attacks<\/a>, having a robust security platform is more vital than ever. <a href=\"https:\/\/swimlane.com\/swimlane-turbine\/\">Swimlane Turbine<\/a> is your ally in these waters, extending visibility and actionability when it comes to cyber threats. With features like phishing triage that can spot, neutralize, and report cyber threats in real-time, your organization will be&nbsp; well-equipped to navigate these seas of cybersecurity.<\/p>\n\n\n\n<p>The defense against whaling attacks is a collective effort. It\u2019s important to remain vigilant and prepared because in the vast sea of cybersecurity, the disguised whales are lurking. Stay alert and stay secure with <a href=\"https:\/\/swimlane.com\/\">Swimlane<\/a>.<\/p>\n\n\n\n<div class=\"bs-div bs-div-91103da672f431009115c2b4dd3e89284290a37b bs-div---default\"><div class=\"bs-div__inner     \">\n<div class=\"bs-div bs-div-bfd2392220a6b4a5f834810683c53eb056e75e2f bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-bfd2392220a6b4a5f834810683c53eb056e75e2f {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/2023-08-23_13-38-40.png' class='img-fluid'   alt='roi report swimlane security automation' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h3 class=\"wp-block-heading\" id=\"h-the-swimlane-armor-framework\">The Swimlane ARMOR Framework<\/h3>\n\n\n\n<p>SecOps teams who want to map their goals, tactics, and security automation use cases to industry standard frameworks like NIST, CMMC, CMMI or C2M2<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-3746e5144768949633efa7ba51da269c5516b93a\"><style>.bs-pro-button-p-btn-3746e5144768949633efa7ba51da269c5516b93a .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resource\/automation-readiness-maturity-orchestrated-resources-framework\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Download<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d282a77d8c7 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/resource\/automation-readiness-maturity-orchestrated-resources-framework\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>7\u6708 24, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>The Swimlane ARMOR Framework<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69d282a77ed08 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ja\/blog\/cyber-threat-readiness-should-we-sound-the-alarms\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>7\u6708 25, 2023<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Cyber Threat Readiness: Should We Sound The Alarms?<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":33860,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":33860,"learn_more_label":"","image_alt_text":"What is a whaling attack in cybersecurity?","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[75,70,71],"class_list":["post-33859","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","resource-type-blogs","blog-category-security-automation","blog-category-secops","blog-category-soar"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is a Whaling Attack in Cyber Security? | Swimlane<\/title>\n<meta name=\"description\" content=\"Explore the definition of a &quot;whaling attack&quot; in cyber security. Learn how whaling attacks work and how high-profile executives are targeted with Swimlane.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u6355\u9be8\u653b\u6483\u306e\u8aac\u660e\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is a Whaling Attack in Cyber Security? | Swimlane\" \/>\n<meta property=\"og:description\" content=\"Explore the definition of a &quot;whaling attack&quot; in cyber security. Learn how whaling attacks work and how high-profile executives are targeted with Swimlane.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u6355\u9be8\u653b\u6483\u306e\u8aac\u660e\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-15T18:29:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/WHALINGATTACK_ST.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What is a Whaling Attack in Cyber Security? | Swimlane\" \/>\n<meta name=\"twitter:description\" content=\"Explore the definition of a &quot;whaling attack&quot; in cyber security. Learn how whaling attacks work and how high-profile executives are targeted with Swimlane.\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"5\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/whaling-attacks-explained\/\",\"url\":\"https:\/\/swimlane.com\/ja\/blog\/whaling-attacks-explained\/\",\"name\":\"What is a Whaling Attack in Cyber Security? | Swimlane\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/ja\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/whaling-attacks-explained\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/whaling-attacks-explained\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/WHALINGATTACK_MASTHEAD.png\",\"datePublished\":\"2023-11-14T16:30:00+00:00\",\"dateModified\":\"2025-04-15T18:29:44+00:00\",\"description\":\"Explore the definition of a \\\"whaling attack\\\" in cyber security. Learn how whaling attacks work and how high-profile executives are targeted with Swimlane.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/whaling-attacks-explained\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/ja\/blog\/whaling-attacks-explained\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/whaling-attacks-explained\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/WHALINGATTACK_MASTHEAD.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/WHALINGATTACK_MASTHEAD.png\",\"width\":1120,\"height\":666,\"caption\":\"Whaling attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/ja\/blog\/whaling-attacks-explained\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is a Whaling Attack in Cybersecurity?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/ja\/#website\",\"url\":\"https:\/\/swimlane.com\/ja\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/ja\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/ja\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/ja\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/ja\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u304a\u3051\u308b\u30db\u30a8\u30fc\u30ea\u30f3\u30b0\u653b\u6483\u3068\u306f\uff1f | Swimlane","description":"\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u304a\u3051\u308b\u300c\u30db\u30a8\u30fc\u30ea\u30f3\u30b0\u653b\u6483\u300d\u306e\u5b9a\u7fa9\u3092\u63a2\u308a\u307e\u3059\u3002Swimlane\u3067\u30db\u30a8\u30fc\u30ea\u30f3\u30b0\u653b\u6483\u306e\u4ed5\u7d44\u307f\u3068\u3001\u8457\u540d\u306a\u7d4c\u55b6\u5e79\u90e8\u304c\u3069\u306e\u3088\u3046\u306b\u6a19\u7684\u306b\u3055\u308c\u308b\u306e\u304b\u3092\u5b66\u3073\u307e\u3057\u3087\u3046\u3002.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u6355\u9be8\u653b\u6483\u306e\u8aac\u660e\/","og_locale":"ja_JP","og_type":"article","og_title":"What is a Whaling Attack in Cyber Security? | Swimlane","og_description":"Explore the definition of a \"whaling attack\" in cyber security. Learn how whaling attacks work and how high-profile executives are targeted with Swimlane.","og_url":"https:\/\/swimlane.com\/ja\/\u30d6\u30ed\u30b0\/\u6355\u9be8\u653b\u6483\u306e\u8aac\u660e\/","og_site_name":"AI Security Automation","article_modified_time":"2025-04-15T18:29:44+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/WHALINGATTACK_ST.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"What is a Whaling Attack in Cyber Security? | Swimlane","twitter_description":"Explore the definition of a \"whaling attack\" in cyber security. Learn how whaling attacks work and how high-profile executives are targeted with Swimlane.","twitter_site":"@swimlane","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"5\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ja\/blog\/whaling-attacks-explained\/","url":"https:\/\/swimlane.com\/ja\/blog\/whaling-attacks-explained\/","name":"\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u304a\u3051\u308b\u30db\u30a8\u30fc\u30ea\u30f3\u30b0\u653b\u6483\u3068\u306f\uff1f | Swimlane","isPartOf":{"@id":"https:\/\/swimlane.com\/ja\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ja\/blog\/whaling-attacks-explained\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ja\/blog\/whaling-attacks-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/WHALINGATTACK_MASTHEAD.png","datePublished":"2023-11-14T16:30:00+00:00","dateModified":"2025-04-15T18:29:44+00:00","description":"\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u304a\u3051\u308b\u300c\u30db\u30a8\u30fc\u30ea\u30f3\u30b0\u653b\u6483\u300d\u306e\u5b9a\u7fa9\u3092\u63a2\u308a\u307e\u3059\u3002Swimlane\u3067\u30db\u30a8\u30fc\u30ea\u30f3\u30b0\u653b\u6483\u306e\u4ed5\u7d44\u307f\u3068\u3001\u8457\u540d\u306a\u7d4c\u55b6\u5e79\u90e8\u304c\u3069\u306e\u3088\u3046\u306b\u6a19\u7684\u306b\u3055\u308c\u308b\u306e\u304b\u3092\u5b66\u3073\u307e\u3057\u3087\u3046\u3002.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ja\/blog\/whaling-attacks-explained\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ja\/blog\/whaling-attacks-explained\/"]}]},{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/blog\/whaling-attacks-explained\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/WHALINGATTACK_MASTHEAD.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/WHALINGATTACK_MASTHEAD.png","width":1120,"height":666,"caption":"Whaling attack"},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ja\/blog\/whaling-attacks-explained\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"What is a Whaling Attack in Cybersecurity?"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ja\/#website","url":"https:\/\/swimlane.com\/ja\/","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","description":"\u3042\u3089\u3086\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u80fd\u3092\u30a8\u30fc\u30b8\u30a7\u30f3\u30c8\u578bAI\u3067\u81ea\u52d5\u5316","publisher":{"@id":"https:\/\/swimlane.com\/ja\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ja\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ja\/#organization","name":"\u30ed\u30fc\u30b3\u30fc\u30c9\u30fb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u30aa\u30fc\u30c8\u30e1\u30fc\u30b7\u30e7\u30f3\uff06SOAR\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\uff5c\u30b9\u30a4\u30e0\u30ec\u30fc\u30f3","url":"https:\/\/swimlane.com\/ja\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ja\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/33859","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/sw_resource\/33859\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media\/33860"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/media?parent=33859"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/tags?post=33859"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-type?post=33859"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-topic?post=33859"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/resource-industry?post=33859"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ja\/wp-json\/wp\/v2\/blog-category?post=33859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}