{"author_url":"https://blog.hatena.ne.jp/suwa-miyu-nw/","blog_title":"\u30cd\u30c3\u30c8\u30ef\u30fc\u30eb\u30c9 \u3089\u307c","published":"2026-03-03 13:26:26","image_url":"https://cdn-ak.f.st-hatena.com/images/fotolife/n/networld-blog/20260303/20260303132855.png","categories":["TrendMicro","\u30af\u30e9\u30a6\u30c9","\u521d\u5fc3\u8005\u5411\u3051"],"width":"100%","author_name":"suwa-miyu-nw","version":"1.0","provider_url":"https://hatena.blog","provider_name":"Hatena Blog","url":"https://blogs.networld.co.jp/entry/2026/03/03/132626","blog_url":"https://blogs.networld.co.jp/","height":"190","description":"CREM\u3063\u3066\u3001\u306a\u306b\uff1f\uff01 \u3053\u3093\u306b\u3061\u306f\uff01\u65e9\u901f\u3067\u3059\u304c\u6628\u5e74\u3001Trend Micro\u304b\u3089\u767a\u8868\u3055\u308c\u305fCyber Risk Exposure Management\uff08CREM\uff09\u3068\u3044\u3046\u88fd\u54c1\u3092\u7686\u69d8\u3054\u5b58\u77e5\u3067\u3057\u3087\u3046\u304b\u3002\u904e\u53bb\u306b\u306fAttack Surface Risk Management\uff08ASRM\uff09\u3068\u3044\u3046\u540d\u79f0\u3067\u5c55\u958b\u3055\u308c\u3066\u3044\u305f\u88fd\u54c1\u3067\u30012025\u5e74\u306e2\uff5e4\u6708\u9803\u306b\u73fe\u5728\u306e\u88fd\u54c1\u540d\u306b\u6574\u7406\u30fb\u5909\u66f4\u3055\u308c\u305f\u3082\u306e\u3067\u3059\u3002 \u3053\u306eCREM\u306f\u3001\u8fd1\u5e74\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5206\u91ce\u3067\u6ce8\u76ee\u3055\u308c\u3066\u3044\u308b\u300c\u30a8\u30af\u30b9\u30dd\u30fc\u30b8\u30e3\u30fc\u7ba1\u7406\u300d\u306e\u8003\u3048\u65b9\u3092\u3001\u5b9f\u969b\u306e\u73fe\u5834\u3067\u305d\u306e\u307e\u307e\u6d3b\u7528\u3067\u304d\u308b\u5f62\u306b\u843d\u3068\u3057\u8fbc\u3093\u3060 Trend Micro \u306e\u30bd\u30ea\u30e5\u30fc\u30b7\u30e7\u30f3\u3002 \uff1f\u30a8\u30af\u30b9\u30dd\u30fc\u30b8\u30e3\u30fc\u7ba1\u7406\u7d44\u7e54\u306e\u8cc7\u7523\u306e\u4e2d\u3067\u300c\u672c\u5f53\u306b\u2026","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fblogs.networld.co.jp%2Fentry%2F2026%2F03%2F03%2F132626\" title=\"Trend Micro\u306eCTEM\u88fd\u54c1\u3001Cyber Risk Exposure Management\u306e\u4f7f\u7528\u611f\u30ec\u30d3\u30e5\u30fc - \u30cd\u30c3\u30c8\u30ef\u30fc\u30eb\u30c9 \u3089\u307c\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","title":"Trend Micro\u306eCTEM\u88fd\u54c1\u3001Cyber Risk Exposure Management\u306e\u4f7f\u7528\u611f\u30ec\u30d3\u30e5\u30fc","type":"rich"}