{"id":67,"date":"2015-03-10T06:50:55","date_gmt":"2015-03-09T21:50:55","guid":{"rendered":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/industry\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/"},"modified":"2018-09-27T12:18:34","modified_gmt":"2018-09-27T03:18:34","slug":"enterprise-security-lessons-from-the-public-sector","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/ja-jp\/industry\/blog\/government\/2015\/03\/10\/enterprise-security-lessons-from-the-public-sector\/","title":{"rendered":"\u516c\u7684\u6a5f\u95a2\u304b\u3089\u5b66\u3076\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u9762\u306e\u77e5\u8b58"},"content":{"rendered":"
\u516c\u7684\u6a5f\u95a2\u306b\u306f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u95a2\u3059\u308b\u554f\u984c\u89e3\u6c7a\u306e\u30ce\u30a6\u30cf\u30a6\u304c\u84c4\u7a4d\u3055\u308c\u3066\u3044\u307e\u3059\u3002\u6700\u65b0\u306e\u30db\u30ef\u30a4\u30c8\u30da\u30fc\u30d1\u30fc\u3067\u3001\u30d2\u30f3\u30c8\u3092\u3054\u7d39\u4ecb\u3057\u307e\u3059\u3002<\/strong><\/p>\n <\/p>\n \u4e16\u9593\u4e00\u822c\u306e\u901a\u5ff5\u3067\u306f\u3001\u516c\u7684\u6a5f\u95a2\u306f\u73fe\u4ee3\u7684\u306a\u4f01\u696d\u304b\u3089\u5b66\u3079\u308b\u70b9\u304c\u591a\u3044\u3068\u3044\u3046\u3053\u3068\u306b\u306a\u3063\u3066\u3044\u307e\u3059\u304c\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u30d9\u30b9\u30c8 \u30d7\u30e9\u30af\u30c6\u30a3\u30b9\u306b\u3064\u3044\u3066\u306f\u3001\u305d\u306e\u7acb\u5834\u304c\u9006\u8ee2\u3059\u308b\u5834\u5408\u304c\u3042\u308a\u307e\u3059\u3002\u3053\u306e\u5341\u6570\u5e74\u306e\u9593\u306b\u5168\u56fd\u7684\u30fb\u5730\u57df\u7684\u306a\u591a\u6570\u306e\u8105\u5a01\u306b\u53d6\u308a\u7d44\u3093\u3067\u304d\u305f\u6700\u524d\u7dda\u306e\u516c\u7684\u6a5f\u95a2\u304b\u3089\u3001\u4f01\u696d\u304c\u5b66\u3079\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u9762\u306e\u8cb4\u91cd\u306a\u77e5\u8b58\u306f\u5c11\u306a\u304f\u3042\u308a\u307e\u305b\u3093\u3002<\/p>\n<\/p>\n