{"id":27498,"date":"2025-04-23T09:26:31","date_gmt":"2025-04-23T08:26:31","guid":{"rendered":"https:\/\/nihoncyberdefence.co.jp\/?page_id=27498"},"modified":"2025-05-22T07:27:16","modified_gmt":"2025-05-22T06:27:16","slug":"gated-landing-page","status":"publish","type":"page","link":"https:\/\/nihoncyberdefence.co.jp\/en\/gated-landing-page\/","title":{"rendered":"Gated-Landing-Page"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"27498\" class=\"elementor elementor-27498\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-65a1fa2 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"65a1fa2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-42a4f42\" data-id=\"42a4f42\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-16e9c65 elementor-widget elementor-widget-heading\" data-id=\"16e9c65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Volt Typhoon and the Cyber Threat to Japan\u2019s Critical Infrastructure <\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae3bbb9 elementor-widget elementor-widget-heading\" data-id=\"ae3bbb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Uncover how a Chinese state-linked threat group is shifting from espionage to pre-positioned cyber sabotage \u2014 and what Japan must do next. <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b5d39bb elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"b5d39bb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e32fd0d\" data-id=\"e32fd0d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5bedf47 elementor-widget elementor-widget-text-editor\" data-id=\"5bedf47\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">The advanced persistent threat (APT) group known as Volt Typhoon has quietly evolved into one of the most strategically dangerous actors targeting critical infrastructure in the United States and its allies \u2014 including Japan. Linked to the Chinese state, this group uses stealthy \u201cLiving off the Land\u201d (LoTL) tactics to infiltrate systems without detection, creating pre-positioned access for future disruption.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">This whitepaper offers a deep analysis of:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Volt Typhoon\u2019s attack lifecycle and stealth capabilities<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">The growing risk to Japan\u2019s power, transport, and communications infrastructure<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Why conventional defences are failing against this threat<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">What Japan\u2019s public and private sectors must do to prevent infiltration<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Proactive, layered mitigation strategies based on U.S. and Japanese cyber defence policies<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-00180a3 elementor-widget elementor-widget-image\" data-id=\"00180a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Hero-image-V1-1.png?fit=1024%2C512&amp;ssl=1\" class=\"attachment-large size-large wp-image-27921\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Hero-image-V1-1.png?w=2000&amp;ssl=1 2000w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Hero-image-V1-1.png?resize=300%2C150&amp;ssl=1 300w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Hero-image-V1-1.png?resize=1024%2C512&amp;ssl=1 1024w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Hero-image-V1-1.png?resize=768%2C384&amp;ssl=1 768w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Hero-image-V1-1.png?resize=1536%2C768&amp;ssl=1 1536w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-707cd8c elementor-widget elementor-widget-text-editor\" data-id=\"707cd8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW75801557 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW75801557 BCX8\">Featuring insights from\u202f<\/span><\/span><span class=\"TextRun SCXW75801557 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW75801557 BCX8\">Ret. Admiral Akira Ichida<\/span><\/span><span class=\"TextRun SCXW75801557 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW75801557 BCX8\">, former head of JMSDF cyber operations and senior advisor at Nihon Cyber Defence (NCD), this report is essential reading for policy leaders, cyber security executives, and CNI operators.<\/span><\/span><span class=\"EOP SCXW75801557 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-74faca2\" data-id=\"74faca2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7148b7b elementor-widget elementor-widget-heading\" data-id=\"7148b7b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Fill out the quick form below to unlock your download link for the exclusive white paper.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b2b754 elementor-button-align-center elementor-widget__width-initial form-last elementor-widget-tablet__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-form\" data-id=\"1b2b754\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" id=\"12210\" name=\"New Contact Form\" aria-label=\"New Contact Form\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"27498\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"1b2b754\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Gated-Landing-Page - Nihon Cyber Defence\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"27498\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"First Name\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_bd28a5a elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_bd28a5a]\" id=\"form-field-field_bd28a5a\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Last Name\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-field_9e5c82e elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[field_9e5c82e]\" id=\"form-field-field_9e5c82e\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Work Email Address\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_d9d99d9 elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_d9d99d9]\" id=\"form-field-field_d9d99d9\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Organisation Name\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_e759b31 elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_e759b31]\" id=\"form-field-field_e759b31\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Job Role\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text\">\n\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_e8f469a]\" id=\"form-field-field_e8f469a\" class=\"elementor-field elementor-size-sm \" style=\"display:none !important;\">\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-checkbox elementor-field-group elementor-column elementor-field-group-field_b879c28 elementor-col-100\">\n\t\t\t\t\t<div class=\"elementor-field-subgroup  \"><span class=\"elementor-field-option\"><input type=\"checkbox\" value=\"I\u2019d like to receive updates and service-related communications from NCD\" id=\"form-field-field_b879c28-0\" name=\"form_fields[field_b879c28]\"> <label for=\"form-field-field_b879c28-0\">I\u2019d like to receive updates and service-related communications from NCD<\/label><\/span><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-recaptcha elementor-field-group elementor-column elementor-field-group-field_16e4a8f elementor-col-100\">\n\t\t\t\t\t<div class=\"elementor-field\" id=\"form-field-field_16e4a8f\"><div class=\"elementor-g-recaptcha\" data-sitekey=\"6Leox6QZAAAAAL6JDU8YiSXuK5XgpCIo6zpqGZJp\" data-type=\"v2_checkbox\" data-theme=\"light\" data-size=\"normal\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-md\" type=\"submit\" id=\"send-button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Submit<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eaa422d elementor-widget elementor-widget-text-editor\" data-id=\"eaa422d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We respect your privacy. In accordance with our data protection policy, your personal information will be used only to deliver the requested material. No further contact will be made without your explicit consent.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0bb617f elementor-widget elementor-widget-html\" data-id=\"0bb617f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div style=\"background-color: white; padding: 20px;\">\r\n  <div class=\"carousel\">\r\n    <div class=\"carousel-track\">\r\n      <img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/10\/cyberEssentials_PLUS-1280x605-1-1.png?ssl=1\" alt=\"Logo 1\" \/>\r\n      <img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/10\/cyberEssentials-1-1280x605-1-1.png?ssl=1\" alt=\"Logo 2\" \/>\r\n      <img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/10\/3CT-ISO-27001-logo-without-cert-number-300x291-1-1-1.png?ssl=1\" alt=\"Logo 3\" \/>\r\n      <img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/10\/ncsc_industry100_logo-1.png?ssl=1\" alt=\"Logo 4\" \/>\r\n      <img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/03\/Cyber-Incident-Response-Standard-Level-1.png?ssl=1\" alt=\"Logo 5\" \/>\r\n    <\/div>\r\n  <\/div>\r\n<\/div>\r\n\r\n<style>\r\n.carousel {\r\n  overflow: hidden;\r\n  width: 100%;\r\n  position: relative;\r\n}\r\n\r\n.carousel-track {\r\n  display: flex;\r\n  gap: 20px;\r\n  animation: scroll 20s linear infinite;\r\n}\r\n\r\n.carousel-track img {\r\n  height: 60px;\r\n  width: auto;\r\n  object-fit: contain;\r\n}\r\n\r\n@keyframes scroll {\r\n  0% {\r\n    transform: translateX(0);\r\n  }\r\n  100% {\r\n    transform: translateX(-50%);\r\n  }\r\n}\r\n<\/style>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f968241 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"f968241\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-01e8b53\" data-id=\"01e8b53\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67ea033 elementor-widget elementor-widget-heading\" data-id=\"67ea033\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Volt Typhoon and the Cyber Threat to Japan\u2019s Critical Infrastructure <\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a0a04b elementor-widget elementor-widget-heading\" data-id=\"3a0a04b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Uncover how a Chinese state-linked threat group is shifting from espionage to pre-positioned cyber sabotage \u2014 and what Japan must do next. <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5c6d580 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"5c6d580\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b12193a\" data-id=\"b12193a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-11684bf elementor-widget elementor-widget-text-editor\" data-id=\"11684bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">The advanced persistent threat (APT) group known as Volt Typhoon has quietly evolved into one of the most strategically dangerous actors targeting critical infrastructure in the United States and its allies \u2014 including Japan. Linked to the Chinese state, this group uses stealthy \u201cLiving off the Land\u201d (LoTL) tactics to infiltrate systems without detection, creating pre-positioned access for future disruption.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">This whitepaper offers a deep analysis of:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Volt Typhoon\u2019s attack lifecycle and stealth capabilities<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">The growing risk to Japan\u2019s power, transport, and communications infrastructure<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Why conventional defences are failing against this threat<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">What Japan\u2019s public and private sectors must do to prevent infiltration<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Proactive, layered mitigation strategies based on U.S. and Japanese cyber defence policies<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98d6d67 elementor-widget elementor-widget-image\" data-id=\"98d6d67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Hero-image-V1-1.png?fit=1024%2C512&amp;ssl=1\" class=\"attachment-large size-large wp-image-27921\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Hero-image-V1-1.png?w=2000&amp;ssl=1 2000w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Hero-image-V1-1.png?resize=300%2C150&amp;ssl=1 300w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Hero-image-V1-1.png?resize=1024%2C512&amp;ssl=1 1024w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Hero-image-V1-1.png?resize=768%2C384&amp;ssl=1 768w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Hero-image-V1-1.png?resize=1536%2C768&amp;ssl=1 1536w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f27f76 elementor-widget elementor-widget-text-editor\" data-id=\"3f27f76\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW75801557 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW75801557 BCX8\">Featuring insights from\u202f<\/span><\/span><span class=\"TextRun SCXW75801557 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW75801557 BCX8\">Ret. Admiral Akira Ichida<\/span><\/span><span class=\"TextRun SCXW75801557 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW75801557 BCX8\">, former head of JMSDF cyber operations and senior advisor at Nihon Cyber Defence (NCD), this report is essential reading for policy leaders, cyber security executives, and CNI operators.<\/span><\/span><span class=\"EOP SCXW75801557 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c62d06c\" data-id=\"c62d06c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4a11f16 elementor-widget elementor-widget-heading\" data-id=\"4a11f16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Fill out the quick form below to unlock your download link for the exclusive white paper.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4efb2d8 elementor-button-align-center elementor-widget__width-initial form-last elementor-widget-tablet__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-form\" data-id=\"4efb2d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" id=\"12210\" name=\"New Contact Form\" aria-label=\"New Contact Form\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"27498\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"4efb2d8\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Gated-Landing-Page - Nihon Cyber Defence\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"27498\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Enter Your Name\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-field_9e5c82e elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[field_9e5c82e]\" id=\"form-field-field_9e5c82e\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Work Email Address\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_d9d99d9 elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_d9d99d9]\" id=\"form-field-field_d9d99d9\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Organisation Name\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_e759b31 elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_e759b31]\" id=\"form-field-field_e759b31\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Job Role\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text\">\n\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_e8f469a]\" id=\"form-field-field_e8f469a\" class=\"elementor-field elementor-size-sm \" style=\"display:none !important;\">\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-checkbox elementor-field-group elementor-column elementor-field-group-field_b879c28 elementor-col-100\">\n\t\t\t\t\t<div class=\"elementor-field-subgroup  \"><span class=\"elementor-field-option\"><input type=\"checkbox\" value=\"I\u2019d like to receive updates and service-related communications from NCD\" id=\"form-field-field_b879c28-0\" name=\"form_fields[field_b879c28]\"> <label for=\"form-field-field_b879c28-0\">I\u2019d like to receive updates and service-related communications from NCD<\/label><\/span><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-recaptcha elementor-field-group elementor-column elementor-field-group-field_16e4a8f elementor-col-100\">\n\t\t\t\t\t<div class=\"elementor-field\" id=\"form-field-field_16e4a8f\"><div class=\"elementor-g-recaptcha\" data-sitekey=\"6Leox6QZAAAAAL6JDU8YiSXuK5XgpCIo6zpqGZJp\" data-type=\"v2_checkbox\" data-theme=\"light\" data-size=\"normal\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-md\" type=\"submit\" id=\"send-button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Submit<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b593a3 elementor-widget elementor-widget-text-editor\" data-id=\"1b593a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We respect your privacy. In accordance with our data protection policy, your personal information will be used only to deliver the requested material. No further contact will be made without your explicit consent.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afac79f elementor-widget elementor-widget-html\" data-id=\"afac79f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div style=\"background-color: white; padding: 20px;\">\r\n  <div class=\"carousel\">\r\n    <div class=\"carousel-track\">\r\n      <img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/10\/cyberEssentials_PLUS-1280x605-1-1.png?ssl=1\" alt=\"Logo 1\" \/>\r\n      <img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/10\/cyberEssentials-1-1280x605-1-1.png?ssl=1\" alt=\"Logo 2\" \/>\r\n      <img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/10\/3CT-ISO-27001-logo-without-cert-number-300x291-1-1-1.png?ssl=1\" alt=\"Logo 3\" \/>\r\n      <img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/10\/ncsc_industry100_logo-1.png?ssl=1\" alt=\"Logo 4\" \/>\r\n      <img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/03\/Cyber-Incident-Response-Standard-Level-1.png?ssl=1\" alt=\"Logo 5\" \/>\r\n    <\/div>\r\n  <\/div>\r\n<\/div>\r\n\r\n<style>\r\n.carousel {\r\n  overflow: hidden;\r\n  width: 100%;\r\n  position: relative;\r\n}\r\n\r\n.carousel-track {\r\n  display: flex;\r\n  gap: 20px;\r\n  animation: scroll 20s linear infinite;\r\n}\r\n\r\n.carousel-track img {\r\n  height: 60px;\r\n  width: auto;\r\n  object-fit: contain;\r\n}\r\n\r\n@keyframes scroll {\r\n  0% {\r\n    transform: translateX(0);\r\n  }\r\n  100% {\r\n    transform: translateX(-50%);\r\n  }\r\n}\r\n<\/style>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bbe8fdb elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"bbe8fdb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-421c25a\" data-id=\"421c25a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d0fff05 elementor-widget elementor-widget-heading\" data-id=\"d0fff05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Volt Typhoon and the Cyber Threat to Japan\u2019s Critical Infrastructure <\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95e7bc0 elementor-widget elementor-widget-heading\" data-id=\"95e7bc0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Uncover how a Chinese state-linked threat group is shifting from espionage to pre-positioned cyber sabotage \u2014 and what Japan must do next. <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5bd6503 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"5bd6503\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-dedb902\" data-id=\"dedb902\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9c2e3e3 elementor-widget elementor-widget-text-editor\" data-id=\"9c2e3e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">The advanced persistent threat (APT) group known as Volt Typhoon has quietly evolved into one of the most strategically dangerous actors targeting critical infrastructure in the United States and its allies \u2014 including Japan. Linked to the Chinese state, this group uses stealthy \u201cLiving off the Land\u201d (LoTL) tactics to infiltrate systems without detection, creating pre-positioned access for future disruption.<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">This whitepaper offers a deep analysis of:<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><ul><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Volt Typhoon\u2019s attack lifecycle and stealth capabilities<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">The growing risk to Japan\u2019s power, transport, and communications infrastructure<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Why conventional defences are failing against this threat<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">What Japan\u2019s public and private sectors must do to prevent infiltration<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Proactive, layered mitigation strategies based on U.S. and Japanese cyber defence policies<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c96fc9 elementor-widget elementor-widget-image\" data-id=\"0c96fc9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Hero-image-V1-1.png?fit=1024%2C512&amp;ssl=1\" class=\"attachment-large size-large wp-image-27921\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Hero-image-V1-1.png?w=2000&amp;ssl=1 2000w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Hero-image-V1-1.png?resize=300%2C150&amp;ssl=1 300w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Hero-image-V1-1.png?resize=1024%2C512&amp;ssl=1 1024w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Hero-image-V1-1.png?resize=768%2C384&amp;ssl=1 768w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Hero-image-V1-1.png?resize=1536%2C768&amp;ssl=1 1536w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb5fe65 elementor-widget elementor-widget-text-editor\" data-id=\"bb5fe65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW75801557 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW75801557 BCX8\">Featuring insights from\u202f<\/span><\/span><span class=\"TextRun SCXW75801557 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW75801557 BCX8\">Ret. Admiral Akira Ichida<\/span><\/span><span class=\"TextRun SCXW75801557 BCX8\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW75801557 BCX8\">, former head of JMSDF cyber operations and senior advisor at Nihon Cyber Defence (NCD), this report is essential reading for policy leaders, cyber security executives, and CNI operators.<\/span><\/span><span class=\"EOP SCXW75801557 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c7b9e2e\" data-id=\"c7b9e2e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-304d349 elementor-widget elementor-widget-heading\" data-id=\"304d349\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Fill out the quick form below to unlock your download link for the exclusive white paper.<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4148c56 elementor-button-align-center elementor-widget__width-initial form-last elementor-widget-tablet__width-initial elementor-widget-mobile__width-initial elementor-widget elementor-widget-form\" data-id=\"4148c56\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;button_width&quot;:&quot;100&quot;,&quot;step_type&quot;:&quot;number_text&quot;,&quot;step_icon_shape&quot;:&quot;circle&quot;}\" data-widget_type=\"form.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<form class=\"elementor-form\" method=\"post\" id=\"12210\" name=\"New Contact Form\" aria-label=\"New Contact Form\">\n\t\t\t<input type=\"hidden\" name=\"post_id\" value=\"27498\"\/>\n\t\t\t<input type=\"hidden\" name=\"form_id\" value=\"4148c56\"\/>\n\t\t\t<input type=\"hidden\" name=\"referer_title\" value=\"Gated-Landing-Page - Nihon Cyber Defence\" \/>\n\n\t\t\t\t\t\t\t<input type=\"hidden\" name=\"queried_id\" value=\"27498\"\/>\n\t\t\t\n\t\t\t<div class=\"elementor-form-fields-wrapper elementor-labels-above\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-name elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[name]\" id=\"form-field-name\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Enter Your Name\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-email elementor-field-group elementor-column elementor-field-group-field_9e5c82e elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"email\" name=\"form_fields[field_9e5c82e]\" id=\"form-field-field_9e5c82e\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Work Email Address\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_d9d99d9 elementor-col-100 elementor-field-required elementor-mark-required\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_d9d99d9]\" id=\"form-field-field_d9d99d9\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Organisation Name\" required=\"required\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text elementor-field-group elementor-column elementor-field-group-field_e759b31 elementor-col-100\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_e759b31]\" id=\"form-field-field_e759b31\" class=\"elementor-field elementor-size-sm  elementor-field-textual\" placeholder=\"Job Role\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-text\">\n\t\t\t\t\t<input size=\"1\" type=\"text\" name=\"form_fields[field_e8f469a]\" id=\"form-field-field_e8f469a\" class=\"elementor-field elementor-size-sm \" style=\"display:none !important;\">\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-checkbox elementor-field-group elementor-column elementor-field-group-field_b879c28 elementor-col-100\">\n\t\t\t\t\t<div class=\"elementor-field-subgroup  \"><span class=\"elementor-field-option\"><input type=\"checkbox\" value=\"I\u2019d like to receive updates and service-related communications from NCD\" id=\"form-field-field_b879c28-0\" name=\"form_fields[field_b879c28]\"> <label for=\"form-field-field_b879c28-0\">I\u2019d like to receive updates and service-related communications from NCD<\/label><\/span><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-type-recaptcha elementor-field-group elementor-column elementor-field-group-field_16e4a8f elementor-col-100\">\n\t\t\t\t\t<div class=\"elementor-field\" id=\"form-field-field_16e4a8f\"><div class=\"elementor-g-recaptcha\" data-sitekey=\"6Leox6QZAAAAAL6JDU8YiSXuK5XgpCIo6zpqGZJp\" data-type=\"v2_checkbox\" data-theme=\"light\" data-size=\"normal\"><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<div class=\"elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons\">\n\t\t\t\t\t<button class=\"elementor-button elementor-size-md\" type=\"submit\" id=\"send-button\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Submit<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/button>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/form>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0097eee elementor-widget elementor-widget-text-editor\" data-id=\"0097eee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We respect your privacy. In accordance with our data protection policy, your personal information will be used only to deliver the requested material. No further contact will be made without your explicit consent.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9312a1a elementor-widget elementor-widget-html\" data-id=\"9312a1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div style=\"background-color: white; padding: 20px;\">\r\n  <div class=\"carousel\">\r\n    <div class=\"carousel-track\">\r\n      <img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/10\/cyberEssentials_PLUS-1280x605-1-1.png?ssl=1\" alt=\"Logo 1\" \/>\r\n      <img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/10\/cyberEssentials-1-1280x605-1-1.png?ssl=1\" alt=\"Logo 2\" \/>\r\n      <img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/10\/3CT-ISO-27001-logo-without-cert-number-300x291-1-1-1.png?ssl=1\" alt=\"Logo 3\" \/>\r\n      <img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/10\/ncsc_industry100_logo-1.png?ssl=1\" alt=\"Logo 4\" \/>\r\n      <img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/03\/Cyber-Incident-Response-Standard-Level-1.png?ssl=1\" alt=\"Logo 5\" \/>\r\n    <\/div>\r\n  <\/div>\r\n<\/div>\r\n\r\n<style>\r\n.carousel {\r\n  overflow: hidden;\r\n  width: 100%;\r\n  position: relative;\r\n}\r\n\r\n.carousel-track {\r\n  display: flex;\r\n  gap: 20px;\r\n  animation: scroll 20s linear infinite;\r\n}\r\n\r\n.carousel-track img {\r\n  height: 60px;\r\n  width: auto;\r\n  object-fit: contain;\r\n}\r\n\r\n@keyframes scroll {\r\n  0% {\r\n    transform: translateX(0);\r\n  }\r\n  100% {\r\n    transform: translateX(-50%);\r\n  }\r\n}\r\n<\/style>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1a2b0c8 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"1a2b0c8\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-top-column elementor-element elementor-element-8c0601c\" data-id=\"8c0601c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-top-column elementor-element elementor-element-d64c0de\" data-id=\"d64c0de\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-top-column elementor-element elementor-element-2b837a0\" data-id=\"2b837a0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-top-column elementor-element elementor-element-0553e28\" data-id=\"0553e28\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-top-column elementor-element elementor-element-2e9d187\" data-id=\"2e9d187\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-top-column elementor-element elementor-element-7d6e72f\" data-id=\"7d6e72f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-top-column elementor-element elementor-element-8ff69b8\" data-id=\"8ff69b8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Volt Typhoon and the Cyber Threat to Japan\u2019s Critical Infrastructure Uncover how a Chinese state-linked threat group is shifting from espionage to pre-positioned cyber sabotage \u2014 and what Japan must do next. The advanced persistent threat (APT) group known as Volt Typhoon has quietly evolved into one of the most strategically dangerous actors targeting critical infrastructure in the United States and its allies \u2014 including Japan. Linked to the Chinese state, this group uses stealthy \u201cLiving off the Land\u201d (LoTL) tactics to infiltrate systems without detection, creating pre-positioned access for future disruption.\u00a0 This whitepaper offers a deep analysis of:\u00a0 Volt Typhoon\u2019s attack lifecycle and stealth capabilities\u00a0 The growing risk to Japan\u2019s power, transport, and communications infrastructure\u00a0 Why conventional defences are failing against this threat\u00a0 What Japan\u2019s public and private sectors must do to prevent infiltration\u00a0 Proactive, layered mitigation strategies based on U.S. and Japanese cyber defence policies\u00a0 Featuring insights from\u202fRet. Admiral Akira Ichida, former head of JMSDF cyber operations and senior advisor at Nihon Cyber Defence (NCD), this report is essential reading for policy leaders, cyber security executives, and CNI operators.\u00a0 Fill out the quick form below to unlock your download link for the exclusive white paper. We respect your privacy. In accordance with our data protection policy, your personal information will be used only to deliver the requested material. No further contact will be made without your explicit consent. Volt Typhoon and the Cyber Threat to Japan\u2019s Critical Infrastructure Uncover how a Chinese state-linked threat group is shifting from espionage to pre-positioned cyber sabotage \u2014 and what Japan must do next. The advanced persistent threat (APT) group known as Volt Typhoon has quietly evolved into one of the most strategically dangerous actors targeting critical infrastructure in the United States and its allies \u2014 including Japan. Linked to the Chinese state, this group uses stealthy \u201cLiving off the Land\u201d (LoTL) tactics to infiltrate systems without detection, creating pre-positioned access for future disruption.\u00a0 This whitepaper offers a deep analysis of:\u00a0 Volt Typhoon\u2019s attack lifecycle and stealth capabilities\u00a0 The growing risk to Japan\u2019s power, transport, and communications infrastructure\u00a0 Why conventional defences are failing against this threat\u00a0 What Japan\u2019s public and private sectors must do to prevent infiltration\u00a0 Proactive, layered mitigation strategies based on U.S. and Japanese cyber defence policies\u00a0 Featuring insights from\u202fRet. Admiral Akira Ichida, former head of JMSDF cyber operations and senior advisor at Nihon Cyber Defence (NCD), this report is essential reading for policy leaders, cyber security executives, and CNI operators.\u00a0 Fill out the quick form below to unlock your download link for the exclusive white paper. We respect your privacy. In accordance with our data protection policy, your personal information will be used only to deliver the requested material. No further contact will be made without your explicit consent. Volt Typhoon and the Cyber Threat to Japan\u2019s Critical Infrastructure Uncover how a Chinese state-linked threat group is shifting from espionage to pre-positioned cyber sabotage \u2014 and what Japan must do next. The advanced persistent threat (APT) group known as Volt Typhoon has quietly evolved into one of the most strategically dangerous actors targeting critical infrastructure in the United States and its allies \u2014 including Japan. Linked to the Chinese state, this group uses stealthy \u201cLiving off the Land\u201d (LoTL) tactics to infiltrate systems without detection, creating pre-positioned access for future disruption.\u00a0 This whitepaper offers a deep analysis of:\u00a0 Volt Typhoon\u2019s attack lifecycle and stealth capabilities\u00a0 The growing risk to Japan\u2019s power, transport, and communications infrastructure\u00a0 Why conventional defences are failing against this threat\u00a0 What Japan\u2019s public and private sectors must do to prevent infiltration\u00a0 Proactive, layered mitigation strategies based on U.S. and Japanese cyber defence policies\u00a0 Featuring insights from\u202fRet. Admiral Akira Ichida, former head of JMSDF cyber operations and senior advisor at Nihon Cyber Defence (NCD), this report is essential reading for policy leaders, cyber security executives, and CNI operators.\u00a0 Fill out the quick form below to unlock your download link for the exclusive white paper. We respect your privacy. In accordance with our data protection policy, your personal information will be used only to deliver the requested material. No further contact will be made without your explicit consent.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-27498","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gated-Landing-Page - Nihon Cyber Defence<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/gated-landing-page\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gated-Landing-Page - Nihon Cyber Defence\" \/>\n<meta property=\"og:description\" content=\"Volt Typhoon and the Cyber Threat to Japan\u2019s Critical Infrastructure Uncover how a Chinese state-linked threat group is shifting from espionage to pre-positioned cyber sabotage \u2014 and what Japan must do next. The advanced persistent threat (APT) group known as Volt Typhoon has quietly evolved into one of the most strategically dangerous actors targeting critical infrastructure in the United States and its allies \u2014 including Japan. Linked to the Chinese state, this group uses stealthy \u201cLiving off the Land\u201d (LoTL) tactics to infiltrate systems without detection, creating pre-positioned access for future disruption.\u00a0 This whitepaper offers a deep analysis of:\u00a0 Volt Typhoon\u2019s attack lifecycle and stealth capabilities\u00a0 The growing risk to Japan\u2019s power, transport, and communications infrastructure\u00a0 Why conventional defences are failing against this threat\u00a0 What Japan\u2019s public and private sectors must do to prevent infiltration\u00a0 Proactive, layered mitigation strategies based on U.S. and Japanese cyber defence policies\u00a0 Featuring insights from\u202fRet. Admiral Akira Ichida, former head of JMSDF cyber operations and senior advisor at Nihon Cyber Defence (NCD), this report is essential reading for policy leaders, cyber security executives, and CNI operators.\u00a0 Fill out the quick form below to unlock your download link for the exclusive white paper. We respect your privacy. In accordance with our data protection policy, your personal information will be used only to deliver the requested material. No further contact will be made without your explicit consent. Volt Typhoon and the Cyber Threat to Japan\u2019s Critical Infrastructure Uncover how a Chinese state-linked threat group is shifting from espionage to pre-positioned cyber sabotage \u2014 and what Japan must do next. The advanced persistent threat (APT) group known as Volt Typhoon has quietly evolved into one of the most strategically dangerous actors targeting critical infrastructure in the United States and its allies \u2014 including Japan. Linked to the Chinese state, this group uses stealthy \u201cLiving off the Land\u201d (LoTL) tactics to infiltrate systems without detection, creating pre-positioned access for future disruption.\u00a0 This whitepaper offers a deep analysis of:\u00a0 Volt Typhoon\u2019s attack lifecycle and stealth capabilities\u00a0 The growing risk to Japan\u2019s power, transport, and communications infrastructure\u00a0 Why conventional defences are failing against this threat\u00a0 What Japan\u2019s public and private sectors must do to prevent infiltration\u00a0 Proactive, layered mitigation strategies based on U.S. and Japanese cyber defence policies\u00a0 Featuring insights from\u202fRet. Admiral Akira Ichida, former head of JMSDF cyber operations and senior advisor at Nihon Cyber Defence (NCD), this report is essential reading for policy leaders, cyber security executives, and CNI operators.\u00a0 Fill out the quick form below to unlock your download link for the exclusive white paper. We respect your privacy. In accordance with our data protection policy, your personal information will be used only to deliver the requested material. No further contact will be made without your explicit consent. Volt Typhoon and the Cyber Threat to Japan\u2019s Critical Infrastructure Uncover how a Chinese state-linked threat group is shifting from espionage to pre-positioned cyber sabotage \u2014 and what Japan must do next. The advanced persistent threat (APT) group known as Volt Typhoon has quietly evolved into one of the most strategically dangerous actors targeting critical infrastructure in the United States and its allies \u2014 including Japan. Linked to the Chinese state, this group uses stealthy \u201cLiving off the Land\u201d (LoTL) tactics to infiltrate systems without detection, creating pre-positioned access for future disruption.\u00a0 This whitepaper offers a deep analysis of:\u00a0 Volt Typhoon\u2019s attack lifecycle and stealth capabilities\u00a0 The growing risk to Japan\u2019s power, transport, and communications infrastructure\u00a0 Why conventional defences are failing against this threat\u00a0 What Japan\u2019s public and private sectors must do to prevent infiltration\u00a0 Proactive, layered mitigation strategies based on U.S. and Japanese cyber defence policies\u00a0 Featuring insights from\u202fRet. Admiral Akira Ichida, former head of JMSDF cyber operations and senior advisor at Nihon Cyber Defence (NCD), this report is essential reading for policy leaders, cyber security executives, and CNI operators.\u00a0 Fill out the quick form below to unlock your download link for the exclusive white paper. We respect your privacy. In accordance with our data protection policy, your personal information will be used only to deliver the requested material. No further contact will be made without your explicit consent.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nihoncyberdefence.co.jp\/en\/gated-landing-page\/\" \/>\n<meta property=\"og:site_name\" content=\"Nihon Cyber Defence\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-22T06:27:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Hero-image-V1-1-1024x512.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/gated-landing-page\\\/\",\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/gated-landing-page\\\/\",\"name\":\"Gated-Landing-Page - Nihon Cyber Defence\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/gated-landing-page\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/gated-landing-page\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Hero-image-V1-1-1024x512.png\",\"datePublished\":\"2025-04-23T08:26:31+00:00\",\"dateModified\":\"2025-05-22T06:27:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/gated-landing-page\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/gated-landing-page\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/gated-landing-page\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Hero-image-V1-1-1024x512.png\",\"contentUrl\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Hero-image-V1-1-1024x512.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/gated-landing-page\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u30db\u30fc\u30e0\",\"item\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gated-Landing-Page\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/\",\"name\":\"Nihon Cyber Defence\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#organization\",\"name\":\"Nihon Cyber Defence\",\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Asset-12.png?fit=424%2C164&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Asset-12.png?fit=424%2C164&ssl=1\",\"width\":424,\"height\":164,\"caption\":\"Nihon Cyber Defence\"},\"image\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gated-Landing-Page - Nihon Cyber Defence","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nihoncyberdefence.co.jp\/en\/gated-landing-page\/","og_locale":"en_US","og_type":"article","og_title":"Gated-Landing-Page - Nihon Cyber Defence","og_description":"Volt Typhoon and the Cyber Threat to Japan\u2019s Critical Infrastructure Uncover how a Chinese state-linked threat group is shifting from espionage to pre-positioned cyber sabotage \u2014 and what Japan must do next. The advanced persistent threat (APT) group known as Volt Typhoon has quietly evolved into one of the most strategically dangerous actors targeting critical infrastructure in the United States and its allies \u2014 including Japan. Linked to the Chinese state, this group uses stealthy \u201cLiving off the Land\u201d (LoTL) tactics to infiltrate systems without detection, creating pre-positioned access for future disruption.\u00a0 This whitepaper offers a deep analysis of:\u00a0 Volt Typhoon\u2019s attack lifecycle and stealth capabilities\u00a0 The growing risk to Japan\u2019s power, transport, and communications infrastructure\u00a0 Why conventional defences are failing against this threat\u00a0 What Japan\u2019s public and private sectors must do to prevent infiltration\u00a0 Proactive, layered mitigation strategies based on U.S. and Japanese cyber defence policies\u00a0 Featuring insights from\u202fRet. Admiral Akira Ichida, former head of JMSDF cyber operations and senior advisor at Nihon Cyber Defence (NCD), this report is essential reading for policy leaders, cyber security executives, and CNI operators.\u00a0 Fill out the quick form below to unlock your download link for the exclusive white paper. We respect your privacy. In accordance with our data protection policy, your personal information will be used only to deliver the requested material. No further contact will be made without your explicit consent. Volt Typhoon and the Cyber Threat to Japan\u2019s Critical Infrastructure Uncover how a Chinese state-linked threat group is shifting from espionage to pre-positioned cyber sabotage \u2014 and what Japan must do next. The advanced persistent threat (APT) group known as Volt Typhoon has quietly evolved into one of the most strategically dangerous actors targeting critical infrastructure in the United States and its allies \u2014 including Japan. Linked to the Chinese state, this group uses stealthy \u201cLiving off the Land\u201d (LoTL) tactics to infiltrate systems without detection, creating pre-positioned access for future disruption.\u00a0 This whitepaper offers a deep analysis of:\u00a0 Volt Typhoon\u2019s attack lifecycle and stealth capabilities\u00a0 The growing risk to Japan\u2019s power, transport, and communications infrastructure\u00a0 Why conventional defences are failing against this threat\u00a0 What Japan\u2019s public and private sectors must do to prevent infiltration\u00a0 Proactive, layered mitigation strategies based on U.S. and Japanese cyber defence policies\u00a0 Featuring insights from\u202fRet. Admiral Akira Ichida, former head of JMSDF cyber operations and senior advisor at Nihon Cyber Defence (NCD), this report is essential reading for policy leaders, cyber security executives, and CNI operators.\u00a0 Fill out the quick form below to unlock your download link for the exclusive white paper. We respect your privacy. In accordance with our data protection policy, your personal information will be used only to deliver the requested material. No further contact will be made without your explicit consent. Volt Typhoon and the Cyber Threat to Japan\u2019s Critical Infrastructure Uncover how a Chinese state-linked threat group is shifting from espionage to pre-positioned cyber sabotage \u2014 and what Japan must do next. The advanced persistent threat (APT) group known as Volt Typhoon has quietly evolved into one of the most strategically dangerous actors targeting critical infrastructure in the United States and its allies \u2014 including Japan. Linked to the Chinese state, this group uses stealthy \u201cLiving off the Land\u201d (LoTL) tactics to infiltrate systems without detection, creating pre-positioned access for future disruption.\u00a0 This whitepaper offers a deep analysis of:\u00a0 Volt Typhoon\u2019s attack lifecycle and stealth capabilities\u00a0 The growing risk to Japan\u2019s power, transport, and communications infrastructure\u00a0 Why conventional defences are failing against this threat\u00a0 What Japan\u2019s public and private sectors must do to prevent infiltration\u00a0 Proactive, layered mitigation strategies based on U.S. and Japanese cyber defence policies\u00a0 Featuring insights from\u202fRet. Admiral Akira Ichida, former head of JMSDF cyber operations and senior advisor at Nihon Cyber Defence (NCD), this report is essential reading for policy leaders, cyber security executives, and CNI operators.\u00a0 Fill out the quick form below to unlock your download link for the exclusive white paper. We respect your privacy. In accordance with our data protection policy, your personal information will be used only to deliver the requested material. No further contact will be made without your explicit consent.","og_url":"https:\/\/nihoncyberdefence.co.jp\/en\/gated-landing-page\/","og_site_name":"Nihon Cyber Defence","article_modified_time":"2025-05-22T06:27:16+00:00","og_image":[{"url":"https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Hero-image-V1-1-1024x512.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/gated-landing-page\/","url":"https:\/\/nihoncyberdefence.co.jp\/en\/gated-landing-page\/","name":"Gated-Landing-Page - Nihon Cyber Defence","isPartOf":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/gated-landing-page\/#primaryimage"},"image":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/gated-landing-page\/#primaryimage"},"thumbnailUrl":"https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Hero-image-V1-1-1024x512.png","datePublished":"2025-04-23T08:26:31+00:00","dateModified":"2025-05-22T06:27:16+00:00","breadcrumb":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/gated-landing-page\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nihoncyberdefence.co.jp\/en\/gated-landing-page\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/gated-landing-page\/#primaryimage","url":"https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Hero-image-V1-1-1024x512.png","contentUrl":"https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Hero-image-V1-1-1024x512.png"},{"@type":"BreadcrumbList","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/gated-landing-page\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u30db\u30fc\u30e0","item":"https:\/\/nihoncyberdefence.co.jp\/en\/"},{"@type":"ListItem","position":2,"name":"Gated-Landing-Page"}]},{"@type":"WebSite","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#website","url":"https:\/\/nihoncyberdefence.co.jp\/en\/","name":"Nihon Cyber Defence","description":"","publisher":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nihoncyberdefence.co.jp\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#organization","name":"Nihon Cyber Defence","url":"https:\/\/nihoncyberdefence.co.jp\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/06\/Asset-12.png?fit=424%2C164&ssl=1","contentUrl":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/06\/Asset-12.png?fit=424%2C164&ssl=1","width":424,"height":164,"caption":"Nihon Cyber Defence"},"image":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#\/schema\/logo\/image\/"}}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":false,"author_link":"https:\/\/nihoncyberdefence.co.jp\/en\/author\/admin\/"},"uagb_comment_info":0,"uagb_excerpt":"Volt Typhoon and the Cyber Threat to Japan\u2019s Critical Infrastructure Uncover how a Chinese state-linked threat group is shifting from espionage to pre-positioned cyber sabotage \u2014 and what Japan must do next. The advanced persistent threat (APT) group known as Volt Typhoon has quietly evolved into one of the most strategically dangerous actors targeting critical&hellip;","jetpack_sharing_enabled":true,"rttpg_featured_image_url":null,"rttpg_author":{"display_name":false,"author_link":"https:\/\/nihoncyberdefence.co.jp\/en\/author\/admin\/"},"rttpg_comment":0,"rttpg_category":" <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/?taxonomy=translation_priority&#038;term=optional\" rel=\"tag\">Optional<\/a>","rttpg_excerpt":"Volt Typhoon and the Cyber Threat to Japan\u2019s Critical Infrastructure Uncover how a Chinese state-linked threat group is shifting from espionage to pre-positioned cyber sabotage \u2014 and what Japan must do next. The advanced persistent threat (APT) group known as Volt Typhoon has quietly evolved into one of the most strategically dangerous actors targeting critical&hellip;","_links":{"self":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/pages\/27498","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/comments?post=27498"}],"version-history":[{"count":11,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/pages\/27498\/revisions"}],"predecessor-version":[{"id":28250,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/pages\/27498\/revisions\/28250"}],"wp:attachment":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/media?parent=27498"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}