{"id":62720,"date":"2025-04-03T08:52:00","date_gmt":"2025-04-03T16:52:00","guid":{"rendered":"https:\/\/www.sumologic.com\/resources\/sumo-logic-threat-intelligence"},"modified":"2026-01-15T13:49:26","modified_gmt":"2026-01-15T21:49:26","slug":"threat-intelligence","status":"publish","type":"resource","link":"https:\/\/www.sumologic.com\/ja\/briefs\/threat-intelligence","title":{"rendered":"Sumo Logic Threat Intelligence"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"<p>\u65e2\u5b58\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6295\u8cc7\u3092\u6d3b\u7528\u3059\u308b\u3068\u540c\u6642\u306b\u3001\u6975\u3081\u3066\u5de7\u5999\u306a\u30b5\u30a4\u30d0\u30fc\u8105\u5a01\u307e\u3067\u30d7\u30ed\u30a2\u30af\u30c6\u30a3\u30d6\u306b\u7279\u5b9a\u3057\u3001\u9632\u5fa1\u3057\u307e\u3059\u3002Sumo Logic Threat Intelligence\u3067\u3069\u306e\u3088\u3046\u306b\u8aa4\u691c\u77e5\u304c\u6700\u5c0f\u9650\u306b\u6291\u3048\u3089\u308c\u3001\u30ce\u30a4\u30ba\u304c\u6e1b\u308b\u304b\u3054\u8aac\u660e\u3044\u305f\u3057\u307e\u3059\u3002<\/p>\n","protected":false},"author":4,"featured_media":40949,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","show_popup":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","place_holder_image_url":"","post_reading_time":"< 1","notification_enabled":false,"notification_text":"","notification_logo":"","notification_expiration_time":0,"is_enable_transparent_header":false,"selected_taxonomy_terms":{"resource-type":[28],"resource-solution":[56]},"selected_primary_terms":[],"learn_more_link":[],"featured_page_list":[],"notification_enabled_post_list":[],"_gspb_post_css":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false},"resource-type":[374],"resource-solution":[370],"class_list":["post-62720","resource","type-resource","status-publish","has-post-thumbnail","hentry","resource-type-briefs","resource-solution-secops-and-security-ja"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.sumologic.com\/ja\/wp-json\/wp\/v2\/resource\/62720","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sumologic.com\/ja\/wp-json\/wp\/v2\/resource"}],"about":[{"href":"https:\/\/www.sumologic.com\/ja\/wp-json\/wp\/v2\/types\/resource"}],"author":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/ja\/wp-json\/wp\/v2\/users\/4"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sumologic.com\/ja\/wp-json\/wp\/v2\/media\/40949"}],"wp:attachment":[{"href":"https:\/\/www.sumologic.com\/ja\/wp-json\/wp\/v2\/media?parent=62720"}],"wp:term":[{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/www.sumologic.com\/ja\/wp-json\/wp\/v2\/resource-type?post=62720"},{"taxonomy":"resource-solution","embeddable":true,"href":"https:\/\/www.sumologic.com\/ja\/wp-json\/wp\/v2\/resource-solution?post=62720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}