{"id":4896,"date":"2024-04-24T15:58:16","date_gmt":"2024-04-24T06:58:16","guid":{"rendered":"https:\/\/www.agtech.co.jp\/blog\/?p=4896"},"modified":"2024-04-24T15:58:16","modified_gmt":"2024-04-24T06:58:16","slug":"what_will_happen_in_mobile_apps_in_2024","status":"publish","type":"post","link":"https:\/\/www.agtech.co.jp\/blog\/2024\/04\/what_will_happen_in_mobile_apps_in_2024\/","title":{"rendered":"2024\u5e74\u30e2\u30d0\u30a4\u30eb\u30a2\u30d7\u30ea\u3067\u4f55\u304c\u8d77\u3053\u308b\uff1f\uff08\u30c8\u30c3\u30d7\uff15\uff09"},"content":{"rendered":"<img loading=\"lazy\" class=\"center\" src=\"\/blog\/wp-content\/uploads\/2024\/04\/AdobeStock_745773055-scaled.jpeg\" alt=\"\" width=\"500\" height=\"280\" class=\"alignnone size-full wp-image-7240\" \/>\r\n\r\n<p>\u6628\u4eca\u3001\u91cd\u8981\u306a\u30bf\u30b9\u30af\u3092\u30a2\u30d7\u30ea\u306b\u4f9d\u5b58\u3059\u308b\u3088\u3046\u306b\u306a\u308a\u3001<a href=\"https:\/\/www.preemptive.com\/blog\/why-should-developers-care-about-mobile-app-protection\/\" rel=\"noopener\" target=\"_blank\">\u30e2\u30d0\u30a4\u30eb\u30a2\u30d7\u30ea\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3<\/a>\u306f\u4f01\u696d\u306b\u3068\u3063\u3066\u3001\u307e\u3059\u307e\u3059\u5927\u304d\u306a\u61f8\u5ff5\u4e8b\u9805\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u30022024\u5e74\u306b\u306f\u4f55\u304c\u8d77\u3053\u308b\u3067\u3057\u3087\u3046\u304b? \u30e2\u30d0\u30a4\u30eb\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u73fe\u72b6\u3068\u4e88\u6e2c\u3001\u305d\u3057\u3066\u4f01\u696d\u304c\u91cd\u8981\u306a\u30c7\u30fc\u30bf\u3092\u4fdd\u8b77\u3059\u308b\u305f\u3081\u306b\u3001\u30a2\u30d7\u30ea\u3092\u5f37\u5316\u3059\u308b\u30d2\u30f3\u30c8\u3092\u793a\u3057\u307e\u3059\u3002<\/p>\r\n\r\n<h2>2023\u5e74\u306b\u5b66\u3093\u3060\u3053\u3068<\/h2>\r\n\t\t<p>\u4eba\u3005\u306f\u3001<a href=\"https:\/\/techcrunch.com\/2022\/08\/03\/mobile-users-now-spend-4-5-hours-per-day-in-apps-report-says\/#:~:text=According%20to%20new%20data%20released%20today%20by%20app,more%20than%20four%20hours%20per%20day%20using%20apps.\" rel=\"noopener\" target=\"_blank\">\u6bce\u65e54\uff5e5\u6642\u9593<\/a>\u3092\u30e2\u30d0\u30a4\u30eb\u30a2\u30d7\u30ea\u306e\u4f7f\u7528\u306b\u8cbb\u3084\u3057\u3066\u3044\u307e\u3059\u3002\u9280\u884c\u53d6\u5f15\u304b\u3089\u30bd\u30fc\u30b7\u30e3\u30eb\u30e1\u30c7\u30a3\u30a2\u3001\u96fb\u5b50\u5546\u53d6\u5f15\u306b\u81f3\u308b\u307e\u3067\u3001\u591a\u304f\u306e\u7a2e\u985e\u306e\u30a2\u30d7\u30ea\u306b\u500b\u4eba\u60c5\u5831\u3092\u767b\u9332\u3057\u3066\u3044\u308b\u305f\u3081\u3001\u4f01\u696d\u306f\u500b\u4eba\u60c5\u5831\u3092\u4fdd\u8b77\u3059\u308b\u65b9\u6cd5\u3092\u77e5\u3063\u3066\u304a\u304f\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\r\n\r\n\t\t<p>\u30e6\u30fc\u30b6\u30fc\u304c\u30e2\u30d0\u30a4\u30eb\u30a2\u30d7\u30ea\u306b\u8cbb\u3084\u3059\u6642\u9593\u306f\u81a8\u5927\u3067\u3042\u308b\u305f\u3081\u3001\u30e2\u30d0\u30a4\u30eb\u30b5\u30fc\u30d3\u30b9\u3092\u63d0\u4f9b\u3059\u308b\u696d\u8005\u306b\u306f\u3001\u9867\u5ba2\u3092\u6700\u512a\u5148\u306b\u8003\u3048\u308b\u3053\u3068\u304c\u5fc5\u8981\u3067\u3059\u30022023\u5e74\u306e\u51fa\u6765\u4e8b\u304b\u3089\u307f\u3048\u308b\u3001\u30e2\u30d0\u30a4\u30eb\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u91cd\u8981\u306a\u50be\u5411\u3092\u8aac\u660e\u3057\u307e\u3059\u3002<\/p>\r\n\r\n\t<h3>\uff11\uff09\u751f\u4f53\u8a8d\u8a3c\u306e\u9032\u6b69<\/h3>\r\n\t\t<p>2023\u5e74\u306b\u304a\u3051\u308b<a href=\"https:\/\/thehackernews.com\/2023\/08\/whats-state-of-credential-theft-in-2023.html#:~:text=The%202023%20Verizon%20Data%20Breach%20Investigations%20Report%20%28DBIR%29,actors%2C%2049%25%20involved%20the%20use%20of%20stolen%20credentials.\" rel=\"noopener\" target=\"_blank\">\u30c7\u30fc\u30bf\u6f0f\u6d29\u306e49%<\/a>\u306f\u3001\u8a8d\u8a3c\u60c5\u5831\u306e\u76d7\u7528\u304c\u95a2\u4fc2\u3057\u3066\u3044\u307e\u3057\u305f\u3002\u3057\u304b\u3057\u3001\u591a\u304f\u306e\u5927\u624b\u4f01\u696d\u304c\u624b\u3092\u3053\u307e\u306d\u3044\u3066\u3044\u308b\u308f\u3051\u3067\u306f\u3042\u308a\u307e\u305b\u3093\u3002<\/p>\r\n\r\n\t\t<p><a href=\"https:\/\/techcrunch.com\/2023\/01\/15\/norton-lifelock-password-manager-data\/\" rel=\"noopener\" target=\"_blank\">\u30ce\u30fc\u30c8\u30f3\u793e<\/a>\u306f\u3001\u30d1\u30b9\u30ef\u30fc\u30c9\u7ba1\u7406\u304c\u8106\u5f31\u3060\u3063\u305f\u305f\u3081\u3001\u5927\u898f\u6a21\u306a\u4fb5\u5bb3\u306b\u898b\u821e\u308f\u308c\u307e\u3057\u305f\u304c\u3001<a href=\"https:\/\/www.technobezz.com\/news\/i-phone-16-touch-id-absence-and-apple-s-future-biometric-plans-unveiled\/\" rel=\"noopener\" target=\"_blank\">Apple\u793e<\/a>\u306e\u3088\u3046\u306a\u4ed6\u306e\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u30ea\u30fc\u30c0\u30fc\u306f\u3001\u751f\u4f53\u8a8d\u8a3c\u306e\u9032\u6b69\u3092\u62c5\u3063\u3066\u304d\u307e\u3057\u305f\u3002\u305f\u3068\u3048\u3070\u3001Apple\u793e\u306f\u751f\u4f53\u8a8d\u8a3c\u306e\u898b\u76f4\u3057\u3092\u884c\u3044\u3001Touch ID\uff08\u6307\u7d0b\u8a8d\u8a3c\uff09\u3092\u5ec3\u6b62\u3057\u3001\u30a8\u30e9\u30fc\u304c\u767a\u751f\u3057\u306b\u304f\u3044Face ID\uff08\u9854\u8a8d\u8a3c\uff09\u306b\u79fb\u884c\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\r\n\r\n\t<h3>\uff12\uff09\u30a2\u30d7\u30ea\u306e\u4fdd\u8b77\u5f37\u5316\u3068\u96e3\u8aad\u5316<\/h3>\r\n\t\t<p>\u4fdd\u8b77\u3055\u308c\u3066\u3044\u306a\u3044\u30b3\u30fc\u30c9\u306f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4e0a\u306e\u5371\u967a\u3068\u3057\u3066\u6b8b\u308a\u307e\u3059\u3002\u30a2\u30d7\u30ea\u306e\u4fdd\u8b77\u3068\u30b3\u30fc\u30c9\u306e\u96e3\u8aad\u5316\u6280\u8853\u3078\u306e\u6ce8\u76ee\u304c\u9ad8\u307e\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\r\n\r\n\t\t<p>\u4f01\u696d\u306f\u3001\u6697\u53f7\u5316\u3068\u96e3\u8aad\u5316\u306e\u53d6\u308a\u7d44\u3080\u3053\u3068\u306b\u3088\u308a\u3001\u30ea\u30d0\u30fc\u30b9\u30a8\u30f3\u30b8\u30cb\u30a2\u30ea\u30f3\u30b0\u3084\u6539\u3056\u3093\u304b\u3089\u4fdd\u8b77\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u307e\u3059\u3002<\/p>\r\n\r\n\t<h3>\uff13\uff09\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306e\u5b9f\u88c5<\/h3>\r\n\t\t<p>\u6628\u5e74\u306f\u3001\u7d99\u7d9a\u7684\u306b\u72b6\u6cc1\u3092\u628a\u63e1\u3057\u3001\u53b3\u683c\u306a\u30a2\u30af\u30bb\u30b9\u5236\u5fa1\u3092\u53b3\u683c\u306b\u3057\u305f\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u306e\u63a1\u7528\u304c\u5e83\u304c\u308a\u307e\u3057\u305f\u3002\u305f\u3068\u3048\u3070\u3001<a href=\"https:\/\/cloud.google.com\/beyondcorp\/\" rel=\"noopener\" target=\"_blank\">Google\u793e\u306eBeyondCorp\u30e2\u30c7\u30eb<\/a>\u306f\u3001\u30bc\u30ed\u30c8\u30e9\u30b9\u30c8\u306e\u6226\u7565\u7684\u30d3\u30b8\u30e7\u30f3\u3092\u8a2d\u5b9a\u3057\u3001\u672c\u8cea\u7684\u306b\u4fe1\u983c\u3067\u304d\u308b\u30c7\u30d0\u30a4\u30b9\u304c\u306a\u3044\u7406\u7531\u3092\u660e\u78ba\u306b\u793a\u3057\u3066\u3044\u307e\u3059\u3002\u5168\u4f53\u3068\u3057\u3066\u3001\u3053\u308c\u306b\u3088\u308a\u6a5f\u5bc6\u30c7\u30fc\u30bf\u3078\u306e\u4e0d\u6b63\u30a2\u30af\u30bb\u30b9\u306e\u30ea\u30b9\u30af\u304c\u8efd\u6e1b\u3055\u308c\u307e\u3059\u3002<\/p>\r\n\r\n<h2>2024\u5e74\u306b\u4e88\u60f3\u3055\u308c\u308b\u30c8\u30c3\u30d7\uff15<\/h2>\r\n\t<h3>\uff11\uff09AI\u3092\u6d3b\u7528\u3057\u305f\u30e2\u30d0\u30a4\u30eb\u30a2\u30d7\u30ea\u306e\u653b\u6483\u3068\u4fdd\u8b77\u306e\u53f0\u982d<\/h3>\r\n\t\t<p>2023\u5e74\u306f\u3001\u4e3b\u8981\u30c6\u30fc\u30de\u306fAI\u3067\u3057\u305f\u30022024\u5e74\u3082\u4f55\u3082\u5909\u308f\u3089\u306a\u3044\u3068\u4e88\u60f3\u3057\u307e\u3059\u3002<\/p>\r\n\r\n\t\t<p>AI\u306e\u5f71\u97ff\u7bc4\u56f2\u304c\u62e1\u5927\u3059\u308b\u306b\u3064\u308c\u3066\u3001\u4f01\u696d\u306f\u60aa\u610f\u306e\u3042\u308b\u653b\u6483\u3084\u4fdd\u8b77\u6226\u7565\u306bAI\u304c\u3069\u306e\u3088\u3046\u306b\u4f7f\u7528\u3055\u308c\u308b\u306e\u304b\u3001\u7406\u89e3\u3059\u308b\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\r\n\r\n\t\t<p>\u3053\u306e1\u5e74\u3092\u901a\u3058\u3001<a href=\"https:\/\/www.msn.com\/en-us\/money\/other\/unveiling-the-emerging-threat-ai-powered-malware-raises-concerns\/ar-AA1l6MJW\" rel=\"noopener\" target=\"_blank\">AI\u3092\u6d3b\u7528\u3057\u305f\u30de\u30eb\u30a6\u30a7\u30a2<\/a>\u304c\u6a5f\u68b0\u5b66\u7fd2\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u3092\u5229\u7528\u3057\u3066\u3001\u30e2\u30d0\u30a4\u30eb\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u306e\u8106\u5f31\u6027\u3092\u60aa\u7528\u3057\u3001\u30e6\u30fc\u30b6\u30fc\u306e\u884c\u52d5\u3092\u8ffd\u8de1\u3057\u3001\u30b3\u30fc\u30c9\u30a4\u30f3\u30b8\u30a7\u30af\u30b7\u30e7\u30f3\uff08\u4e0d\u6b63\u306a\u30b3\u30fc\u30c9\u633f\u5165\uff09\u3084\u30d1\u30fc\u30bd\u30ca\u30e9\u30a4\u30ba\u3055\u308c\u305f\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u30ad\u30e3\u30f3\u30da\u30fc\u30f3\u306a\u3069\u306e\u653b\u6483\u3092\u5de7\u5999\u306b\u4f5c\u6210\u3057\u3066\u304d\u307e\u3057\u305f\u3002<\/p>\r\n\r\n\t\t<p>\u3057\u304b\u3057\u3001\u65b0\u3057\u3044<a href=\"https:\/\/www.kiuwan.com\/blog\/ai-how-it-is-changing-application-security-testing\/\" rel=\"noopener\" target=\"_blank\">AI\u4fdd\u8b77\u30c4\u30fc\u30eb<\/a>\u306f\u3001\u30cf\u30c3\u30ab\u30fc\u304c\u8106\u5f31\u306a\u30a8\u30f3\u30c8\u30ea\u30fc\u30dd\u30a4\u30f3\u30c8\u3092\u8a8d\u8b58\u3059\u308b\u524d\u306b\u3001\u6700\u65b0\u306e\u30c6\u30af\u30ce\u30ed\u30b8\u30fc\u3092\u5229\u7528\u3057\u3066\u3001\u4e0d\u5be9\u306a\u30a2\u30af\u30c6\u30a3\u30d3\u30c6\u30a3\u3092\u5206\u6790\u3057\u3001\u8106\u5f31\u306a\u30b3\u30fc\u30c9\u306b\u5bfe\u3057\u3066\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30d1\u30c3\u30c1\u306e\u767a\u884c\u3092\u81ea\u52d5\u7684\u306b\u884c\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\r\n\r\n\t<h3>\uff12\uff09\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u3078\u306e\u8105\u5a01\u306e\u5897\u5927<\/h3>\r\n\t\t<p>\u7d04<a href=\"https:\/\/mitsloan.mit.edu\/ideas-made-to-matter\/third-party-ai-tools-pose-increasing-risks-organizations\" rel=\"noopener\" target=\"_blank\">78%\u306e\u4f01\u696d<\/a>\u304c\u3001\u30e2\u30d0\u30a4\u30eb\u30a2\u30d7\u30ea\u3092\u542b\u3080\u91cd\u8981\u306a\u30b5\u30fc\u30d3\u30b9\u3092\u30b5\u30fc\u30c9\u30d1\u30fc\u30c6\u30a3\u30fc\u306e\u30c4\u30fc\u30eb\u306b\u4f9d\u5b58\u3057\u3066\u3044\u307e\u3059\u3002<\/p>\r\n\r\n\t\t<p>2023\u5e74\u3001\u958b\u767a\u3001\u30d3\u30eb\u30c9\u3001\u914d\u5e03\u30d7\u30ed\u30bb\u30b9\u306e\u8106\u5f31\u6027\u3092\u60aa\u7528\u3057\u305f\u653b\u6483\u304c\u3042\u308a\u307e\u3057\u305f\u3002\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u306f\u3001\u30b5\u30a4\u30d0\u30fc\u72af\u7f6a\u8005\u306e\u4e3b\u8981\u306a\u6a19\u7684\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u3002\u305f\u3068\u3048\u3070\u3001<a href=\"https:\/\/www.wired.com\/story\/the-untold-story-of-solarwinds-the-boldest-supply-chain-hack-ever\/\" rel=\"noopener\" target=\"_blank\">SolarWinds\u793e\u3078\u306e\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u653b\u6483<\/a>\u306f\u3001\u653b\u6483\u8005\u304c\u3044\u304b\u306b\u3057\u3066\u4fe1\u983c\u3067\u304d\u308b\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u30d9\u30f3\u30c0\u30fc\u306b\u4fb5\u5165\u3057\u3001\u9867\u5ba2\u3092\u4fb5\u5bb3\u3059\u308b\u306e\u304b\u3092\u5b9f\u8a3c\u3057\u307e\u3057\u305f\u3002<\/p>\r\n\r\n\t\t<p>2024\u5e74\u306f\u3001\u540c\u69d8\u306e\u8105\u5a01\u304c\u30e2\u30d0\u30a4\u30eb\u30a2\u30d7\u30ea\u306e\u30a8\u30b3\u30b7\u30b9\u30c6\u30e0\u306b\u51fa\u73fe\u3059\u308b\u3067\u3057\u3087\u3046\u3002\u305f\u3068\u3048\u3070\u3001npm\uff08Node Package Manager\uff09\u3067\u60aa\u610f\u306e\u3042\u308b\u30d1\u30c3\u30b1\u30fc\u30b8\u304c\u767a\u898b\u3055\u308c\u305fevent-stream\u4e8b\u4ef6\u306f\u3001\u653b\u6483\u8005\u304c\u5e83\u304f\u4f7f\u7528\u3057\u3066\u3044\u308b\u30d1\u30c3\u30b1\u30fc\u30b8\u306b\u60aa\u610f\u306e\u3042\u308b\u30b3\u30fc\u30c9\u3092\u633f\u5165\u3059\u308b\u3053\u3068\u3067\u3001\u30bd\u30d5\u30c8\u30a6\u30a7\u30a2\u306e\u30b5\u30d7\u30e9\u30a4\u30c1\u30a7\u30fc\u30f3\u3092\u4fb5\u5bb3\u3059\u308b\u65b9\u6cd5\u3092\u793a\u3057\u307e\u3057\u305f\u3002<\/p>\r\n\r\n\t<h3>\uff13\uff09\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u653b\u6483\u306e\u6025\u5897<\/h3>\r\n\t\t<p>2023\u5e74\u306f\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u8a50\u6b3a\u306e<a href=\"https:\/\/www.techradar.com\/pro\/security\/phishing-threats-have-hit-a-new-high-in-2023\" rel=\"noopener\" target=\"_blank\">\u4ef6\u6570\u304c\u5857\u308a\u66ff\u3048\u3089\u308c\u307e\u3057\u305f<\/a>\u30022024\u5e74\u3001\u4f01\u696d\u306f\u9032\u5316\u3059\u308b\u653b\u6483\u304b\u3089\u8eab\u3092\u5b88\u308b\u65b9\u6cd5\u3092\u5b66\u3070\u306a\u3051\u308c\u3070\u306a\u308a\u307e\u305b\u3093\u3002<\/p>\r\n\r\n\t\t<p>\u30e2\u30d0\u30a4\u30eb\u30a2\u30d7\u30ea\u306f\u3001\u30d5\u30a3\u30c3\u30b7\u30f3\u30b0\u8a50\u6b3a\u306b\u3068\u3063\u3066\u72ec\u7279\u306e\u9b45\u529b\u7684\u306a\u74b0\u5883\u3092\u63d0\u4f9b\u3057\u307e\u3059\u3002\u653b\u6483\u8005\u306f\u591a\u304f\u306e\u5834\u5408\u3001\u507d\u306e\u30a2\u30d7\u30ea\u901a\u77e5\u3001SMS\u3001\u307e\u305f\u306f\u96fb\u5b50\u30e1\u30fc\u30eb\u3092\u4f7f\u7528\u3057\u3066\u3001\u30e6\u30fc\u30b6\u30fc\u3092\u3060\u307e\u3057\u3066\u30ed\u30b0\u30a4\u30f3\u8cc7\u683c\u60c5\u5831\u3084\u500b\u4eba\u60c5\u5831\u3092\u660e\u3089\u304b\u306b\u3055\u305b\u307e\u3059\u3002\u73fe\u5728\u3001AI\u3068\u30de\u30b7\u30f3\u304c\u3088\u308a\u8907\u96d1\u306b\u306a\u3063\u3066\u3044\u308b\u305f\u3081\u3001\u30cf\u30c3\u30ab\u30fc\u306f<a href=\"https:\/\/venturebeat.com\/security\/deepfake-phishing\/#:~:text=To%20execute%20a%20deepfake%20phishing%20attack%2C%20hackers%20use,they%20create%20a%20digital%20imitation%20of%20an%20individual.\" rel=\"noopener\" target=\"_blank\">\u30c7\u30a3\u30fc\u30d7\u30d5\u30a7\u30a4\u30af\u3092\u4f5c\u6210<\/a>\u3057\u3066\u3001\u9867\u5ba2\u306e\u8a8d\u8a3c\u60c5\u5831\u3092\u3060\u307e\u3057\u53d6\u308b\u3053\u3068\u306b\u6210\u529f\u3059\u308b\u3053\u3068\u304c\u591a\u304f\u306a\u3063\u3066\u3044\u307e\u3059\u3002<\/p>\r\n\r\n\t<h3>\uff14\uff09\u30a2\u30d7\u30ea\u5185\u8cfc\u5165\u3068\u51e6\u7406\u306b\u5bfe\u3059\u308b\u8105\u5a01\u306e\u9032\u5316<\/h3>\r\n\t\t<p>\u73fe\u5728\u3001<a href=\"https:\/\/www.mckinsey.com\/industries\/financial-services\/our-insights\/banking-matters\/new-trends-in-us-consumer-digital-payments\" rel=\"noopener\" target=\"_blank\">\u30a2\u30e1\u30ea\u30ab\u4eba\u306e82%<\/a>\u304c\u4eee\u60f3\uff08\u30d0\u30fc\u30c1\u30e3\u30eb\uff09\u306e\u652f\u6255\u3044\u65b9\u6cd5\u3067\u3001\u30a2\u30d7\u30ea\u5185\u8cfc\u5165\u3092\u884c\u3063\u3066\u3044\u307e\u3059\u3002\u30b5\u30a4\u30d0\u30fc\u72af\u7f6a\u8005\u306f\u3001\u652f\u6255\u3044\u51e6\u7406\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u5f31\u70b9\u3092\u5229\u7528\u3057\u3066\u3001\u30e2\u30d0\u30a4\u30eb\u30a2\u30d7\u30ea\u5185\u306e\u30a2\u30d7\u30ea\u5185\u8cfc\u5165\u3084\u91d1\u878d\u53d6\u5f15\u3092\u30bf\u30fc\u30b2\u30c3\u30c8\u306b\u3059\u308b\u3053\u3068\u304c\u5897\u3048\u3066\u3044\u307e\u3059\u3002<\/p>\r\n\r\n\t<h3>\uff15\uff09\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c4\u30fc\u30eb\u306e\u7d71\u5408<\/h3>\r\n\t\t<p>\u8907\u96d1\u306b\u69cb\u6210\u3055\u308c\u305f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30af\u30e9\u30b9\u30bf\u3067\u3001\u7d44\u7e54\u3092\u500b\u5225\u306b\u9632\u5fa1\u3059\u308b\u3053\u3068\u306f\u3001\u3082\u306f\u3084\u6a5f\u80fd\u3057\u307e\u305b\u3093\u3002\u30d3\u30b8\u30cd\u30b9\u306f\u6a5f\u654f\u3067\u306a\u3051\u308c\u3070\u306a\u308a\u307e\u305b\u3093\u3002\u3053\u308c\u306f\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c4\u30fc\u30eb\u306e\u7d71\u5408\u3092\u610f\u5473\u3057\u307e\u3059\u3002<\/p>\r\n\r\n\t\t<p>\u73fe\u5728\u3001\u4f01\u696d\u306f\u5e73\u5747<a href=\"https:\/\/www.infosecurity-magazine.com\/news\/organizations-76-security-tools\/#:~:text=The%20security%20vendor%20polled%201%2C200%20US%20and%20UK,organizations%20must%20manage%20%E2%80%93%20from%2064%20to%2076.\" rel=\"noopener\" target=\"_blank\">76\u306e\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c4\u30fc\u30eb<\/a>\u3092\u4f7f\u7528\u3057\u3066\u3044\u307e\u3059\u3002\u305d\u308c\u305e\u308c\u306b\u30d7\u30e9\u30c3\u30c8\u30d5\u30a9\u30fc\u30e0\u306e\u7ba1\u7406\u3001\u30ec\u30dd\u30fc\u30c8\u3001\u76e3\u67fb\u304c\u5fc5\u8981\u3067\u3059\u3002<\/p>\r\n\r\n\t\t<p>\u4f01\u696d\u306f\u3001\u30e1\u30c3\u30b7\u30e5\u30a2\u30fc\u30ad\u30c6\u30af\u30c1\u30e3\u3092\u4f5c\u6210\u3059\u308b\u3053\u3068\u304c\u3067\u304d\u308b\u3001\u3088\u308a\u5305\u62ec\u7684\u306a\u30c4\u30fc\u30eb\u306b\u6ce8\u76ee\u3057\u59cb\u3081\u3066\u3044\u307e\u3059\u3002\u8abf\u67fb\u306b\u3088\u308b\u3068\u3001\u4f01\u696d\u306f\u3088\u308a\u7dcf\u5408\u7684\u306a\u30a2\u30d7\u30ed\u30fc\u30c1\u3092\u63a1\u7528\u3059\u308b\u3053\u3068\u3067\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u3092\u6700\u5927<a href=\"https:\/\/www.gartner.com\/en\/doc\/756665-cybersecurity-mesh\" rel=\"noopener\" target=\"_blank\">90%<\/a>\u524a\u6e1b\u3067\u304d\u308b\u3053\u3068\u304c\u308f\u304b\u3063\u3066\u304d\u307e\u3057\u305f\u3002\u3057\u305f\u304c\u3063\u3066\u30012024\u5e74\u306f\u3001\u5c06\u6765\u3092\u898b\u636e\u3048\u305f\u7d44\u7e54\u304c\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c4\u30fc\u30eb\u306e\u6570\u3092\u524a\u6e1b\u3059\u308b\u3053\u3068\u304c\u4e88\u60f3\u3055\u308c\u307e\u3059\u3002<\/p>\r\n\r\n<h2>\u958b\u767a\u8005\u306f\u3069\u306e\u3088\u3046\u306b\u5bfe\u5fdc\u3059\u3079\u304d\u304b?<\/h2>\r\n\t\t<p>\u4f01\u696d\u306f\u30012024\u5e74\u306b\u5411\u3051\u3066\u3069\u306e\u3088\u3046\u306b\u8003\u3048\u308b\u3079\u304d\u3067\u3057\u3087\u3046\u304b?<\/p>\r\n\r\n\t\t<p>\u30e2\u30d0\u30a4\u30eb\u30a2\u30d7\u30ea\u306e\u653b\u6483\u3092\u9632\u5fa1\u3059\u308b\u305f\u3081\u306b\u79c1\u305f\u3061\u304c\u3067\u304d\u308b\u6700\u5584\u306f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u5206\u6790\u3001\u76e3\u8996\u3001\u81ea\u52d5\u5316\u3059\u308b\u7a4d\u6975\u7684\u306a\u30a2\u30d7\u30ed\u30fc\u30c1\u3092\u78ba\u7acb\u3059\u308b\u3053\u3068\u3067\u3059\u3002<\/p>\r\n\r\n\t\t<p>\u30c8\u30ec\u30f3\u30c9\u3068\u30c4\u30fc\u30eb\u3092\u610f\u8b58\u3059\u308b\u3053\u3068\u306f\u30012024\u5e74\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30c1\u30fc\u30e0\u3092\u652f\u63f4\u3059\u308b\u3053\u3068\u306b\u306a\u308b\u3067\u3057\u3087\u3046\u3002<\/p>\r\n\r\n<h2>\u4fe1\u983c\u3067\u304d\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u306e\u69cb\u7bc9<\/h2>\r\n\t\t<p>\u4f01\u696d\u306f\u3001\u660e\u78ba\u3067\u78ba\u56fa\u305f\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u3092\u78ba\u7acb\u3059\u308b\u5fc5\u8981\u304c\u3042\u308a\u307e\u3059\u3002<\/p>\r\n\r\n\t\t<p>\u3059\u3079\u3066\u306e\u5065\u5168\u306a\u30d3\u30b8\u30cd\u30b9\u306b\u306f\u3001\u5065\u5168\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u304c\u5fc5\u8981\u3067\u3059\u3002\u3053\u308c\u3089\u306e\u30dd\u30ea\u30b7\u30fc\u306f\u3001\u5168\u793e\u7684\u306a\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u610f\u8b58\u3092\u78ba\u7acb\u3059\u308b\u305f\u3081\u306b\u975e\u5e38\u306b\u4e0d\u53ef\u6b20\u3067\u3001\u3059\u3079\u3066\u306e\u5229\u5bb3\u95a2\u4fc2\u8005\u304c\u8106\u5f31\u6027\u306e\u767a\u751f\u3092\u9632\u304e\u3001\u65e5\u3005\u5b58\u5728\u3059\u308b\u30c7\u30b8\u30bf\u30eb\u653b\u6483\u3092\u8efd\u6e1b\u3059\u308b\u3053\u3068\u306b\u5f79\u7acb\u3061\u307e\u3059\u3002<\/p>\r\n\r\n\t\t<p>\u3057\u304b\u3057\u306a\u304c\u3089\u3001\u30c4\u30fc\u30eb\u306e\u9078\u629e\u306f\u3001\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30dd\u30ea\u30b7\u30fc\u3092\u7b56\u5b9a\u3057\u3001\u9042\u884c\u3057\u3066\u3044\u304f\u305f\u3081\u306e\u65b9\u6cd5\u306e\u4e00\u3064\u3067\u3059\u3002\u4e0d\u53ef\u6b20\u306a\u30c4\u30fc\u30eb\u306e\u4e00\u3064\u306f\u96e3\u8aad\u5316\u30c4\u30fc\u30eb\u3067\u3059\u304c\u3001\u9762\u5012\u3067\u3042\u3063\u3066\u306f\u306a\u3089\u305a\u3001\u65e2\u5b58\u30a4\u30f3\u30d5\u30e9\u306b\u30b7\u30fc\u30e0\u30ec\u30b9\u306b\u63a5\u7d9a\u3067\u304d\u306a\u3051\u308c\u3070\u306a\u308a\u307e\u305b\u3093\u3002<\/p>\r\n\r\n\t\t<p>\u5f53\u793e\u306e<a href=\"\/preemptive\/dotfuscator\/product\/\" rel=\"noopener\" target=\"_blank\">Dotfuscator<\/a>\u3084<a href=\"\/preemptive\/dash_o\/product\/\" rel=\"noopener\" target=\"_blank\">DashO<\/a>\u306a\u3069\u306e\u96e3\u8aad\u5316\u30c4\u30fc\u30eb\u306f\u3001\u30bd\u30fc\u30b9\u30b3\u30fc\u30c9\u304c\u60aa\u7528\u3055\u308c\u306a\u3044\u3088\u3046\u306b\u3059\u308b\u305f\u3081\u306e\u3001\u6700\u3082\u5fb9\u5e95\u7684\u3067\u8a55\u5224\u306e\u9ad8\u3044\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u306e\u4e00\u3064\u3067\u3059\u3002\u5f53\u793e\u306e\u88fd\u54c1\u304c\u30b3\u30fc\u30c9\u3092\u3069\u306e\u3088\u3046\u306b\u5b89\u5168\u306b\u4fdd\u8b77\u3059\u308b\u304b\u3092\u77e5\u308a\u305f\u3044\u5834\u5408\u306f\u3001<a href=\"\/download\/#a03-dtc\" rel=\"noopener\" target=\"_blank\">14\u65e5\u9593\u306e\u7121\u6599\u30c8\u30e9\u30a4\u30a2\u30eb<\/a>\u3092\u305c\u3072\u304a\u8a66\u3057\u304f\u3060\u3055\u3044\u3002<\/p>\r\n\r\n<p>\u539f\u6587\uff1a<br>\r\nTop 5 Mobile App Security Predictions for 2024<br>\r\n<a href=\"https:\/\/www.preemptive.com\/blog\/top-5-mobile-app-security-predictions-for-2024\/\" rel=\"noopener\" target=\"_blank\">https:\/\/www.preemptive.com\/blog\/top-5-mobile-app-security-predictions-for-2024\/<\/a><\/p>","protected":false},"excerpt":{"rendered":"\u6628\u4eca\u3001\u91cd\u8981\u306a\u30bf\u30b9\u30af\u3092\u30a2\u30d7\u30ea\u306b\u4f9d\u5b58\u3059\u308b\u3088\u3046\u306b\u306a\u308a\u3001\u30e2\u30d0\u30a4\u30eb\u30a2\u30d7\u30ea\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306f\u4f01\u696d\u306b\u3068\u3063\u3066\u3001\u307e\u3059\u307e\u3059\u5927\u304d\u306a\u61f8\u5ff5\u4e8b\u9805\u3068\u306a\u3063\u3066\u3044\u307e\u3059\u30022024\u5e74\u306b\u306f\u4f55\u304c\u8d77\u3053\u308b\u3067\u3057\u3087\u3046\u304b? \u30e2\u30d0\u30a4\u30eb\u306b\u304a\u3051\u308b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306e\u73fe\u72b6\u3068\u4e88\u6e2c\u3001\u305d\u3057\u3066\u4f01\u696d [&hellip;]","protected":false},"author":1,"featured_media":4895,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"product":[84,96],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.agtech.co.jp\/blog\/wp-json\/wp\/v2\/posts\/4896"}],"collection":[{"href":"https:\/\/www.agtech.co.jp\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.agtech.co.jp\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.agtech.co.jp\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.agtech.co.jp\/blog\/wp-json\/wp\/v2\/comments?post=4896"}],"version-history":[{"count":1,"href":"https:\/\/www.agtech.co.jp\/blog\/wp-json\/wp\/v2\/posts\/4896\/revisions"}],"predecessor-version":[{"id":4897,"href":"https:\/\/www.agtech.co.jp\/blog\/wp-json\/wp\/v2\/posts\/4896\/revisions\/4897"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.agtech.co.jp\/blog\/wp-json\/wp\/v2\/media\/4895"}],"wp:attachment":[{"href":"https:\/\/www.agtech.co.jp\/blog\/wp-json\/wp\/v2\/media?parent=4896"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.agtech.co.jp\/blog\/wp-json\/wp\/v2\/categories?post=4896"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.agtech.co.jp\/blog\/wp-json\/wp\/v2\/tags?post=4896"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.agtech.co.jp\/blog\/wp-json\/wp\/v2\/product?post=4896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}