{"width":"100%","blog_url":"https://techblog.forgevision.com/","blog_title":"ForgeVision Engineer Blog","url":"https://techblog.forgevision.com/entry/orca-security/risk_dashboard4","author_url":"https://blog.hatena.ne.jp/otanikohei/","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Ftechblog.forgevision.com%2Fentry%2Forca-security%2Frisk_dashboard4\" title=\"Orca Security \u306b\u65b0\u3057\u3044\u30ea\u30b9\u30af\u30c0\u30c3\u30b7\u30e5\u30dc\u30fc\u30c9\u306e\u30a6\u30a3\u30b8\u30a7\u30c3\u30c8\u304c\u8ffd\u52a0\u3055\u308c\u307e\u3057\u305f - Top Attack Path Entry Points - ForgeVision Engineer Blog\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","categories":["Orca Security","Dashboard","Attack Paths"],"version":"1.0","type":"rich","height":"190","title":"Orca Security \u306b\u65b0\u3057\u3044\u30ea\u30b9\u30af\u30c0\u30c3\u30b7\u30e5\u30dc\u30fc\u30c9\u306e\u30a6\u30a3\u30b8\u30a7\u30c3\u30c8\u304c\u8ffd\u52a0\u3055\u308c\u307e\u3057\u305f - Top Attack Path Entry Points","description":"Orca Security \u62c5\u5f53\u306e\u5c3e\u8c37\u3067\u3059\u3002\u65b0\u3057\u304f\u30ea\u30ea\u30fc\u30b9\u3055\u308c\u305f Top Attack Path Entry Points \u306e\u30c0\u30c3\u30b7\u30e5\u30dc\u30fc\u30c9\u3092\u3054\u7d39\u4ecb\u3057\u307e\u3059\u3002","provider_name":"Hatena Blog","provider_url":"https://hatena.blog","author_name":"otanikohei","image_url":"https://cdn-ak.f.st-hatena.com/images/fotolife/o/otanikohei/20231014/20231014160230.png","published":"2023-10-14 16:05:10"}