{"id":26629,"date":"2024-02-21T15:02:21","date_gmt":"2024-02-21T13:02:21","guid":{"rendered":"https:\/\/www.kelacyber.com\/lessons-from-okta-and-beyond-protecting-your-company-from-compromised-machine-threats\/"},"modified":"2024-03-10T12:14:53","modified_gmt":"2024-03-10T10:14:53","slug":"lessons-from-okta-and-beyond-protecting-your-company-from-compromised-machine-threats","status":"publish","type":"post","link":"https:\/\/www.kelacyber.com\/ja\/blog\/lessons-from-okta-and-beyond-protecting-your-company-from-compromised-machine-threats\/","title":{"rendered":"Okta\u793e\u306e\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u3067\u5b66\u3076\u3079\u304d\u6559\u8a13\uff1a\u4fb5\u5bb3\u3055\u308c\u305f\u7aef\u672b\u304c\u3082\u305f\u3089\u3059\u8105\u5a01\u304b\u3089\u7d44\u7e54\u3092\u4fdd\u8b77\u3059\u308b\u306b\u306f"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":34,"featured_media":26613,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"_uag_custom_page_level_css":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[7],"tags":[],"class_list":["post-26629","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-7"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/02\/Lessons-from-Okta-and-beyond-Blog.png",1920,1080,false],"thumbnail":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/02\/Lessons-from-Okta-and-beyond-Blog-150x150.png",150,150,true],"medium":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/02\/Lessons-from-Okta-and-beyond-Blog-300x169.png",300,169,true],"medium_large":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/02\/Lessons-from-Okta-and-beyond-Blog-768x432.png",768,432,true],"large":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/02\/Lessons-from-Okta-and-beyond-Blog-1024x576.png",1024,576,true],"1536x1536":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/02\/Lessons-from-Okta-and-beyond-Blog-1536x864.png",1536,864,true],"2048x2048":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/02\/Lessons-from-Okta-and-beyond-Blog.png",1920,1080,false],"blogimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/02\/Lessons-from-Okta-and-beyond-Blog-400x180.png",400,180,true],"teamimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/02\/Lessons-from-Okta-and-beyond-Blog-301x279.png",301,279,true],"pressimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/02\/Lessons-from-Okta-and-beyond-Blog-450x316.png",450,316,true],"blogthumb":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/02\/Lessons-from-Okta-and-beyond-Blog-642x200.png",642,200,true],"bloghimg":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/02\/Lessons-from-Okta-and-beyond-Blog-400x180.png",400,180,true],"bloghvid":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/02\/Lessons-from-Okta-and-beyond-Blog-694x384.png",694,384,true],"bloginner":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/02\/Lessons-from-Okta-and-beyond-Blog-932x420.png",932,420,true],"blogrelated":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/02\/Lessons-from-Okta-and-beyond-Blog-225x275.png",225,275,true],"product-icon":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/02\/Lessons-from-Okta-and-beyond-Blog-50x50.png",50,50,true],"alm-thumbnail":["https:\/\/www.kelacyber.com\/wp-content\/uploads\/2024\/02\/Lessons-from-Okta-and-beyond-Blog-150x150.png",150,150,true]},"uagb_author_info":{"display_name":"Ben Kapon","author_link":"https:\/\/www.kelacyber.com\/ja\/blog\/author\/ben-kapon\/"},"uagb_comment_info":0,"uagb_excerpt":null,"_links":{"self":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/posts\/26629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/comments?post=26629"}],"version-history":[{"count":5,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/posts\/26629\/revisions"}],"predecessor-version":[{"id":26714,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/posts\/26629\/revisions\/26714"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/media\/26613"}],"wp:attachment":[{"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/media?parent=26629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/categories?post=26629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kelacyber.com\/ja\/wp-json\/wp\/v2\/tags?post=26629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}