{"version":"1.0","title":"CISA (\u307e\u3068\u3081)","provider_name":"Hatena Blog","description":"malware-log.hatenablog.com \u3010\u30b5\u30a4\u30c8\u3011 \u25c6CISA (\u7c73\u56fd) Cybersecurity and Infrastructure Security Agency (\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fc\u30fb\u30a4\u30f3\u30d5\u30e9\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fc\u5e81) https://www.cisa.gov/ \u3010\u8f9e\u66f8\u3011 \u25c6CISA(\u7d44\u7e54\uff09\u3068\u306f\u3010\u7528\u8a9e\u96c6\u8a73\u7d30\u3011 (SOMPO CYBER SECURITY) https://www.sompocybersecurity.com/column/glossary/cisa \u25c6\u30a2\u30e1\u30ea\u30ab\u5408\u8846\u56fd\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u30fb\u793e\u4f1a\u57fa\u76e4\u5b89\u5168\u4fdd\u969c\u5e81 (Wikipedia) https://ja.wik\u2026","url":"https://security-log.hatenablog.com/entry/CISA","width":"100%","author_name":"security-lab","blog_title":"TT Security Log","height":"190","blog_url":"https://security-log.hatenablog.com/","provider_url":"https://hatena.blog","published":"2025-07-28 03:00:00","type":"rich","image_url":null,"html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fsecurity-log.hatenablog.com%2Fentry%2FCISA\" title=\"CISA (\u307e\u3068\u3081) - TT Security Log\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","categories":["\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u6a5f\u95a2: CISA (\u7c73\u56fd)","**\u307e\u3068\u3081"],"author_url":"https://blog.hatena.ne.jp/security-lab/"}