{"id":13911,"date":"2021-08-18T14:17:38","date_gmt":"2021-08-18T14:17:38","guid":{"rendered":"https:\/\/kela.dev.8scope.net\/partner-portal\/"},"modified":"2024-04-04T02:31:12","modified_gmt":"2024-04-03T23:31:12","slug":"partner-program","status":"publish","type":"page","link":"https:\/\/www.kelacyber.com\/ja\/partner-program\/","title":{"rendered":"\u30d1\u30fc\u30c8\u30ca\u30fc\u30d7\u30ed\u30b0\u30e9\u30e0"},"content":{"rendered":"<div  class=\"content-section-wrap callout-two alignfull \" >\r\n            <div class=\"container\">\r\n        <section class=\"callout-two-section-container\">\r\n            <div class=\"row\">\r\n                <div class=\"content-block col-sm-12\">\r\n                    <section>\r\n                        <div class=\"article-wrap\">\r\n                                                            <h3>Please log in to access the partner portal.<\/h3>\r\n                                <form name=\"partner-login-form\" id=\"partner-login-form\" action=\"https:\/\/www.kelacyber.com\/ja\/kela-login\/\" method=\"post\"><p class=\"login-username\">\n\t\t\t\t<label for=\"user_login\">Username or Email Address<\/label>\n\t\t\t\t<input type=\"text\" name=\"log\" id=\"user_login\" autocomplete=\"username\" class=\"input\" value=\"\" size=\"20\" \/>\n\t\t\t<\/p><p class=\"login-password\">\n\t\t\t\t<label for=\"user_pass\">Password<\/label>\n\t\t\t\t<input type=\"password\" name=\"pwd\" id=\"user_pass\" autocomplete=\"current-password\" spellcheck=\"false\" class=\"input\" value=\"\" size=\"20\" \/>\n\t\t\t<\/p><p class=\"login-remember\"><label><input name=\"rememberme\" type=\"checkbox\" id=\"rememberme\" value=\"forever\" \/> Remember Me<\/label><\/p><p class=\"login-submit\">\n\t\t\t\t<input type=\"submit\" name=\"wp-submit\" id=\"wp-submit\" class=\"button button-primary\" value=\"Log In\" \/>\n\t\t\t\t<input type=\"hidden\" name=\"redirect_to\" value=\"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages\/13911\" \/>\n\t\t\t<\/p><\/form>                                                    <\/div>\r\n                    <\/section>\r\n                <\/div>\r\n            <\/div>\r\n        <\/section>\r\n    <\/div>\r\n        <\/div>\r\n\r\n\r\n<h2 class=\"wp-block-heading\">Latest from our Cyber Intelligence Center<\/h2>\r\n\r\n\r\n<ul class=\"wp-block-latest-posts__list k-latest-posts wp-block-latest-posts\"><li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.kelacyber.com\/ja\/blog\/could-the-belsen-group-be-associated-with-zerosevengroup\/\">Belsen Group\u3068ZeroSevenGroup\u306e\u3064\u306a\u304c\u308a\u3068\u306f?<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.kelacyber.com\/ja\/blog\/black-basta-leak-victim-details\/\">Black Basta\u306e\u5185\u90e8\u30c1\u30e3\u30c3\u30c8\u6d41\u51fa\uff1a\u88ab\u5bb3\u7d44\u7e54\u306b\u3064\u3044\u3066\u306e\u65b0\u305f\u306a\u60c5\u5831<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.kelacyber.com\/ja\/blog\/anubis-a-new-ransomware-threat\/\">\u65b0\u305f\u306a\u30e9\u30f3\u30b5\u30e0\u30a6\u30a7\u30a2\u30b0\u30eb\u30fc\u30d7\u300cAnubis\u300d<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.kelacyber.com\/ja\/blog\/follow-up-alibabas-qwen2-5-vl-model-is-also-vulnerable-to-prompt-attacks\/\">Alibaba\u306eQwen 2.5-VL\u3082\u3001\u30d7\u30ed\u30f3\u30d7\u30c8\u653b\u6483\u306b\u5bfe\u3057\u3066\u8106\u5f31\u306a\u3053\u3068\u304c\u660e\u3089\u304b\u306b<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.kelacyber.com\/ja\/blog\/deepseek-r1%e3%82%92%e6%9a%b4%e3%81%8f%ef%bc%9a-%e4%b8%ad%e5%9b%bd%e8%a3%bdai%e3%83%a2%e3%83%87%e3%83%ab%e3%81%ab%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e3%83%9b%e3%83%bc%e3%83%ab\/\">DeepSeek R1\u3092\u66b4\u304f\uff1a \u4e2d\u56fd\u88fdAI\u30e2\u30c7\u30eb\u306b\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30db\u30fc\u30eb<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Latest from our Cyber Intelligence Center<\/p>\n","protected":false},"author":34,"featured_media":0,"parent":0,"menu_order":6,"comment_status":"closed","ping_status":"closed","template":"page-partner-portal-2.php","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"_uag_custom_page_level_css":"","footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-13911","page","type-page","status-publish","hentry"],"acf":[],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"blogimg":false,"teamimg":false,"pressimg":false,"blogthumb":false,"bloghimg":false,"bloghvid":false,"bloginner":false,"blogrelated":false,"product-icon":false,"alm-thumbnail":false},"uagb_author_info":{"display_name":"Ben Kapon","author_link":"https:\/\/www.kelacyber.com\/ja\/blog\/author\/ben-kapon\/"},"uagb_comment_info":0,"uagb_excerpt":"Latest from our Cyber Intelligence Center","_links":{"self":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages\/13911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/comments?post=13911"}],"version-history":[{"count":19,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages\/13911\/revisions"}],"predecessor-version":[{"id":27020,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/pages\/13911\/revisions\/27020"}],"wp:attachment":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/media?parent=13911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}