{"id":28142,"date":"2025-05-21T02:24:06","date_gmt":"2025-05-21T01:24:06","guid":{"rendered":"https:\/\/nihoncyberdefence.co.jp\/?p=28142"},"modified":"2025-05-27T01:47:35","modified_gmt":"2025-05-27T00:47:35","slug":"chinas-apt-threats-to-japans-critical-infrastructure","status":"publish","type":"post","link":"https:\/\/nihoncyberdefence.co.jp\/en\/chinas-apt-threats-to-japans-critical-infrastructure\/","title":{"rendered":"China\u2019s APT Threats to Japan\u2019s Critical Infrastructure"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"28142\" class=\"elementor elementor-28142\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-286c4bfa elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"286c4bfa\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-493d523c\" data-id=\"493d523c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-516f58cb wpr-post-info-align-center elementor-widget elementor-widget-wpr-post-info\" data-id=\"516f58cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<ul class=\"wpr-post-info wpr-post-info-horizontal\"><li class=\"wpr-post-info-taxonomy\"><a href=\"https:\/\/nihoncyberdefence.co.jp\/category\/%e8%84%85%e5%a8%81%e3%82%a4%e3%83%b3%e3%83%86%e3%83%aa%e3%82%b8%e3%82%a7%e3%83%b3%e3%82%b9\/\">\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9<\/a><\/li><li class=\"wpr-post-info-date\"><span>May 21, 2025<\/span><\/li><\/ul>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-719e8984 elementor-widget elementor-widget-heading\" data-id=\"719e8984\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">China\u2019s APT Threats to Japan\u2019s Critical Infrastructure: Salt, Volt, and Silk Typhoon<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ad89315 elementor-widget elementor-widget-heading\" data-id=\"6ad89315\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What Japan\u2019s defenders must know about China\u2019s cyber espionage and infrastructure sabotage campaigns<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f06fd5 elementor-widget elementor-widget-html\" data-id=\"5f06fd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"custom-share-buttons\">\r\n    <a class=\"share-btn twitter\" target=\"_blank\" rel=\"noopener\">\r\n        <i class=\"fab fa-x-twitter\"><\/i>\r\n    <\/a>\r\n    <a class=\"share-btn linkedin\" target=\"_blank\" rel=\"noopener\">\r\n        <i class=\"fab fa-linkedin-in\"><\/i>\r\n    <\/a>\r\n    <a class=\"share-btn whatsapp\" target=\"_blank\" rel=\"noopener\">\r\n        <i class=\"fab fa-whatsapp\"><\/i>\r\n    <\/a>\r\n    <a class=\"share-btn copy-link\" href=\"#\" title=\"Copy link\">\r\n        <i class=\"fas fa-link\"><\/i>\r\n    <\/a>\r\n<\/div>\r\n\r\n<!-- Font Awesome -->\r\n<link rel=\"stylesheet\" href=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/font-awesome\/6.5.1\/css\/all.min.css\">\r\n\r\n<script>\r\n    \/\/ Get current URL, title, and featured image\r\n    const postUrl = window.location.href;\r\n    const encodedUrl = encodeURIComponent(postUrl);\r\n    const postTitle = encodeURIComponent(document.title);\r\n    const ogImage = document.querySelector('meta[property=\"og:image\"]');\r\n    const postImage = ogImage ? encodeURIComponent(ogImage.getAttribute('content')) : '';\r\n\r\n    \/\/ Update share buttons\r\n    document.querySelector('.share-btn.twitter').href = `https:\/\/twitter.com\/intent\/tweet?url=${encodedUrl}&text=${postTitle}`;\r\n    document.querySelector('.share-btn.linkedin').href = `https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=${encodedUrl}`;\r\n    document.querySelector('.share-btn.whatsapp').href = `https:\/\/api.whatsapp.com\/send?text=${postTitle}%20${encodedUrl}`;\r\n\r\n    \/\/ Copy link functionality with alert\r\n    document.querySelector('.share-btn.copy-link').addEventListener('click', (e) => {\r\n        e.preventDefault();\r\n        navigator.clipboard.writeText(postUrl).then(() => {\r\n            alert('Link copied!');\r\n        }).catch(err => {\r\n            console.error('Failed to copy: ', err);\r\n            alert('Failed to copy the link!');\r\n        });\r\n    });\r\n<\/script>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-69847e65 elementor-widget elementor-widget-image\" data-id=\"69847e65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1200\" height=\"531\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png?fit=1200%2C531&amp;ssl=1\" class=\"attachment-full size-full wp-image-28158\" alt=\"Chinese flag overlays a computer keyboard and economic graph, with Japan highlighted \u2014 symbolising cyber and financial influence targeting Japanese infrastructure.\" srcset=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png?resize=300%2C133&amp;ssl=1 300w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png?resize=1024%2C453&amp;ssl=1 1024w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png?resize=768%2C340&amp;ssl=1 768w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Cyber espionage and economic influence converge as China targets Japan\u2019s infrastructure and markets. A visual metaphor for digital-era geopolitical conflict.<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3d293302 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"3d293302\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2d706cd4\" data-id=\"2d706cd4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-68a420b elementor-widget elementor-widget-heading\" data-id=\"68a420b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">China\u2019s Cyber Warfare Strategy and APT Evolution <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40d273ce elementor-widget elementor-widget-text-editor\" data-id=\"40d273ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyber warfare is evolving rapidly, with Advanced Persistent Threats (APTs) becoming more sophisticated, stealthy, and destructive. Among the most concerning in recent years are three China-linked APT groups:\u00a0Salt Typhoon, Volt Typhoon, and Silk Typhoon. Each works with distinct tactics and goals, yet collectively, these groups signal a broader shift in how nation-states conduct cyber operations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3c28ee elementor-widget elementor-widget-text-editor\" data-id=\"b3c28ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In this post, we\u2019ll analyse how these groups operate, what the activities reveal about China\u2019s long-term cyber strategy, and how defenders can prepare for the next wave of cyber warfare.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba24ba0 elementor-widget elementor-widget-heading\" data-id=\"ba24ba0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">APT Group Profiles: Salt, Volt, and Silk Typhoon Explained<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8a2e63e elementor-widget elementor-widget-heading\" data-id=\"8a2e63e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Salt Typhoon: China\u2019s Cyber Espionage Specialist <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a5e4d6 elementor-widget elementor-widget-text-editor\" data-id=\"5a5e4d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Salt Typhoon focuses on cyber espionage, targeting Western enterprises such as technology, defence, and telecommunications. It specialises in exploiting enterprise software vulnerabilities to gain long-term access to sensitive intellectual property and corporate secrets.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-42bf16e elementor-widget elementor-widget-heading\" data-id=\"42bf16e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Volt Typhoon: The Stealthy Infrastructure Saboteur <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6307284 elementor-widget elementor-widget-text-editor\" data-id=\"6307284\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Volt Typhoon, on the other hand, has a different mission &#8211; covertly infiltrating critical infrastructure to pre-position themselves for disruptive or destructive attacks. Unlike traditional APTs that rely on malware, Volt Typhoon\u00a0utilises living-off-the-land (LOL) techniques, making detection much harder.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24871c9 elementor-widget elementor-widget-heading\" data-id=\"24871c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Silk Typhoon: APT Meets Cyber Crime <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52d25e9 elementor-widget elementor-widget-text-editor\" data-id=\"52d25e9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Silk Typhoon is a unique hybrid. It blends\u00a0state-sponsored cyber espionage with financially motivated cybercrime. While it conducts traditional nation-state intelligence gathering operations, it also engages in financially motivated attacks and targets organisations within the global IT supply chain.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d60185a elementor-widget elementor-widget-image\" data-id=\"d60185a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"434\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Chart-for-China-Blog-scaled.png?fit=1024%2C434&amp;ssl=1\" class=\"attachment-large size-large wp-image-28409\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Chart-for-China-Blog-scaled.png?w=2560&amp;ssl=1 2560w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Chart-for-China-Blog-scaled.png?resize=300%2C127&amp;ssl=1 300w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Chart-for-China-Blog-scaled.png?resize=1024%2C434&amp;ssl=1 1024w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Chart-for-China-Blog-scaled.png?resize=768%2C326&amp;ssl=1 768w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Chart-for-China-Blog-scaled.png?resize=1536%2C652&amp;ssl=1 1536w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Chart-for-China-Blog-scaled.png?resize=2048%2C869&amp;ssl=1 2048w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/Chart-for-China-Blog-scaled.png?w=2400&amp;ssl=1 2400w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5aeaa23 elementor-widget elementor-widget-heading\" data-id=\"5aeaa23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Strategic Implications for Japan\u2019s National Cyber Defence<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2251b2 elementor-widget elementor-widget-text-editor\" data-id=\"d2251b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>For cyber threat practitioners, these groups illustrate the shift from espionage to an integrated model of cybercrime, intelligence collection, and operational disruption. Silk Typhoon exemplifies this evolution, seamlessly pivoting between data theft and financially motivated attacks. An attack today may be aimed at intelligence gathering, tomorrow financial extortion or market manipulation. Defenders must break out of siloed thinking\u2014cyber threats are interconnected across economic, corporate, and national security landscapes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf7cf83 elementor-widget elementor-widget-html\" data-id=\"bf7cf83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!-- Font Awesome for quote icons -->\r\n<link rel=\"stylesheet\" href=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/font-awesome\/6.5.0\/css\/all.min.css\" \/>\r\n\r\n<style>\r\n  .testimonial-wrapper {\r\n    font-family: 'Segoe UI', sans-serif;\r\n    text-align: center;\r\n\r\n  }\r\n\r\n  .testimonial-card {\r\n    background: #ffffff;\r\n    border-radius: 20px;\r\n    padding: 20px;\r\n    margin: 0 auto 20px auto;\r\n    display: inline-block; \/* auto-width based on content *\/\r\n    box-shadow: 0 4px 12px rgba(0, 0, 0, 0.06); \/* lighter, cleaner shadow *\/\r\n    position: relative;\r\n    text-align: left;\r\n  }\r\n\r\n  .testimonial-icon {\r\n    font-size: 40px;\r\n    color: #ce0047;\r\n    margin-bottom: 20px;\r\n    text-align: center;\r\n  }\r\n\r\n  .testimonial-quote {\r\n    font-size: 18px;\r\n    color: #374151;\r\n    line-height: 1.8;\r\n    margin-bottom: 20px;\r\n    text-align: center;\r\n  }\r\n\r\n  .testimonial-author {\r\n    font-weight: 700;\r\n    color: #ce0047;\r\n    font-size: 20px;\r\n    text-align: center;\r\n  }\r\n\r\n  .testimonial-title {\r\n    font-size: 18px;\r\n    color: #6b7280;\r\n  }\r\n<\/style>\r\n\r\n<section class=\"testimonial-wrapper\">\r\n  <!-- Testimonial 1 -->\r\n  <div class=\"testimonial-card\">\r\n    <div class=\"testimonial-icon\"><i class=\"fas fa-quote-left\"><\/i><\/div>\r\n    <p class=\"testimonial-quote\">\r\n    \u201cStealth is now the norm. Sophisticated threat actors are employing living-off-the-land techniques, utilising built-in system tools to evade detection.\u201d\r\n    <\/p>\r\n    <p class=\"testimonial-author\">\r\n    <\/p>\r\n  <\/div>\r\n<\/section>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45daf7c elementor-widget elementor-widget-text-editor\" data-id=\"45daf7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Volt Typhoon\u2019s operations reinforce that cyber warfare is very active. These adversaries are embedding within critical infrastructure, staying undetected for years, pre-positioning themselves for future sabotage. The implications are severe: power grids, logistics, and communications could be compromised long before an attack is detected. Threat intelligence teams must transition from reactive defence to proactive hunting, with the goal of finding persistent, stealthy intrusions before they escalate.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74f26ff elementor-widget elementor-widget-html\" data-id=\"74f26ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!-- Font Awesome for quote icons -->\r\n<link rel=\"stylesheet\" href=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/font-awesome\/6.5.0\/css\/all.min.css\" \/>\r\n\r\n<style>\r\n  .testimonial-wrapper {\r\n    font-family: 'Segoe UI', sans-serif;\r\n    text-align: center;\r\n\r\n  }\r\n\r\n  .testimonial-card {\r\n    background: #ffffff;\r\n    border-radius: 20px;\r\n    padding: 20px;\r\n    margin: 0 auto 20px auto;\r\n    display: inline-block; \/* auto-width based on content *\/\r\n    box-shadow: 0 4px 12px rgba(0, 0, 0, 0.06); \/* lighter, cleaner shadow *\/\r\n    position: relative;\r\n    text-align: left;\r\n    width: 100%;\r\n  }\r\n\r\n  .testimonial-icon {\r\n    font-size: 40px;\r\n    color: #ce0047;\r\n    margin-bottom: 20px;\r\n    text-align: center;\r\n  }\r\n\r\n  .testimonial-quote {\r\n    font-size: 18px;\r\n    color: #374151;\r\n    line-height: 1.8;\r\n    margin-bottom: 20px;\r\n    text-align: center;\r\n  }\r\n\r\n  .testimonial-author {\r\n    font-weight: 700;\r\n    color: #ce0047;\r\n    font-size: 20px;\r\n    text-align: center;\r\n  }\r\n\r\n  .testimonial-title {\r\n    font-size: 18px;\r\n    color: #6b7280;\r\n  }\r\n<\/style>\r\n\r\n<section class=\"testimonial-wrapper\">\r\n  <!-- Testimonial 1 -->\r\n  <div class=\"testimonial-card\">\r\n    <div class=\"testimonial-icon\"><i class=\"fas fa-quote-left\"><\/i><\/div>\r\n    <p class=\"testimonial-quote\">\r\n    \u201cThe notion of a secure perimeter is obsolete\u2014the real threat may already be inside, hidden in plain sight.\u201d\r\n    <\/p>\r\n    <p class=\"testimonial-author\">\r\n    <\/p>\r\n  <\/div>\r\n<\/section>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b728ffd elementor-widget elementor-widget-text-editor\" data-id=\"b728ffd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Supply chain exploitation is another growing challenge. Silk Typhoon has refined indirect compromise, targeting third-party vendors to gain access to high-value targets. Even organisations with strong internal security may find themselves breached through a compromised software update or trusted vendor. Robust cyber defence must extend beyond internal networks, focusing also on the threat from supply chain exploitation. Security teams must enforce strict vendor assessments, enhance supply chain security, and demand transparency in software dependencies.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a309817 elementor-widget elementor-widget-text-editor\" data-id=\"a309817\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Explore how Japan is shifting from compliance to capability in our post on <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/preparing-for-active-cyber-defense-acd\/\"><em>Active Cyber Defence in Japan.<\/em><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b10f8d elementor-widget elementor-widget-heading\" data-id=\"8b10f8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How to Detect and Defend Against APTs from China <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c89937b elementor-widget elementor-widget-text-editor\" data-id=\"c89937b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Salt, Volt, and Silk Typhoon are not just isolated APTs\u2014they are a coordinated, long-term strategy by China to blend espionage, infrastructure pre-positioning, and cybercrime for strategic advantage. Their operations signal a shift: cyber-attacks are no longer episodic\u2014they\u2019re part of a sustained influence campaign.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-434f1b5 elementor-widget elementor-widget-heading\" data-id=\"434f1b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Proactive Defence: Turning Intelligence into Action<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b4d5a3 elementor-widget elementor-widget-text-editor\" data-id=\"0b4d5a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As threat analysts, we need to move past reactive posture. Relying on perimeter defences is no longer sufficient\u2014assume compromise and operate accordingly.<\/p><ul><li><strong>Operationalise threat intelligence<\/strong>\u2014Map IOCs and TTPs from these groups directly to your environment.<\/li><li><strong>Hunt continuously<\/strong>\u2014Focus on persistence mechanisms, LOLBins, and lateral movement activity.<\/li><li><strong>Test your IR playbooks<\/strong>\u2014Simulate long-term intrusions and stealthy C2 scenarios in red\/blue team exercises.<\/li><li><strong>Push for visibility<\/strong>\u2014Across endpoints, network, and third-party supply chains. You can\u2019t defend what you can\u2019t see.<\/li><\/ul><p>The threat is already embedded. The mission now is to detect, contain, and outpace the adversary before they activate.<\/p><p>Explore how AI is transforming security strategies in an earlier post, <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/the-rise-of-ai-driven-warfare\/\"><em>The Rise of AI-Driven Warfare: Securing Nations and Critical Infrastructure from Emerging Threats.<\/em><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0980345 elementor-widget elementor-widget-heading\" data-id=\"0980345\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Is Your Organisation Resilient Enough to Withstand<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8e62a4 elementor-widget elementor-widget-text-editor\" data-id=\"f8e62a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>NCD is uniquely positioned to help governments, critical infrastructure providers, and enterprises prepare for, detect, and respond to these threats before they escalate.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-730199d elementor-widget elementor-widget-text-editor\" data-id=\"730199d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/contact-us\/\">Contact Us<\/a> Let\u2019s talk about\u00a0your current level of cyber resilience.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3c0fd9db\" data-id=\"3c0fd9db\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7ee0aaa elementor-widget elementor-widget-html\" data-id=\"7ee0aaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!-- Load Roboto font from Google Fonts -->\r\n<link href=\"https:\/\/fonts.googleapis.com\/css2?family=Roboto:wght@400;500;700&display=swap\" rel=\"stylesheet\" \/>\r\n\r\n<div class=\"modern-profile-card\">\r\n  <a href=\"https:\/\/nihoncyberdefence.co.jp\/\" target=\"_blank\">\r\n    <img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrew_headshot.jpg?ssl=1\" alt=\"Andrew Turner, Threat Intelligence Analyst @ Nihon Cyber Defence\" class=\"profile-image\" \/>\r\n  <\/a>\r\n\r\n  <div class=\"profile-content\">\r\n    <a href=\"https:\/\/nihoncyberdefence.co.jp\/\" target=\"_blank\" class=\"profile-name-link\">\r\n    Andrew Turner\r\n    <\/a>\r\n    <p class=\"profile-title\">\r\n      <em>Threat Intelligence Analyst @ Nihon Cyber Defence<\/em><\/em>\r\n    <\/p>\r\n    <p class=\"profile-description\">\r\n     Turner brings years of experience with the UK Ministry of Defence and NATO-aligned operations and is an expert in high-stakes operational intelligence.\r\n    <\/p>\r\n  <\/div>\r\n<\/div>\r\n\r\n<style>\r\n  .modern-profile-card {\r\n    max-width: 580px;\r\n    margin: 0 auto;\r\n    padding: 16px 20px;\r\n    background-color: #ffffff;\r\n    border: 1px solid #e5e7eb;\r\n    border-radius: 2px;\r\n    box-shadow: 0 2px 4px rgba(0, 0, 0, 0.1); \/* \ud83d\udc48 Shadow from #more-services *\/\r\n    font-family: 'Roboto', sans-serif;\r\n    display: flex;\r\n    flex-direction: column;\r\n    align-items: center;\r\n  }\r\n\r\n  .profile-image {\r\n    width: 100%;\r\n    max-width: 260px;\r\n    border-radius: 10px;\r\n    object-fit: cover;\r\n    margin-bottom: 16px;\r\n    transition: opacity 0.3s ease;\r\n  }\r\n\r\n  .profile-image:hover {\r\n    opacity: 0.9;\r\n  }\r\n\r\n  .profile-content {\r\n    text-align: center;\r\n    width: 100%;\r\n  }\r\n\r\n  .profile-name-link {\r\n    display: block;\r\n    font-size: 1.1rem;\r\n    font-weight: 700;\r\n    text-transform: uppercase;\r\n    letter-spacing: 0.4px;\r\n    margin-bottom: 6px;\r\n    text-decoration: none;\r\n    color: #ce0047;\r\n    transition: opacity 0.3s ease;\r\n  }\r\n\r\n  .profile-name-link:hover {\r\n    opacity: 0.85;\r\n  }\r\n\r\n  .profile-title {\r\n    font-size: 0.8rem;\r\n    color: #666;\r\n    margin-bottom: 12px;\r\n    line-height: 1.4;\r\n\r\n  }\r\n\r\n  .profile-description {\r\n    font-size: 0.88rem;\r\n    color: #333;\r\n    line-height: 1.6;\r\n  }\r\n\r\n  @media (max-width: 480px) {\r\n    .modern-profile-card {\r\n      padding: 14px 16px;\r\n    }\r\n\r\n    .profile-name-link {\r\n      font-size: 1rem;\r\n    }\r\n\r\n    .profile-title {\r\n      font-size: 0.78rem;\r\n    }\r\n\r\n    .profile-description {\r\n      font-size: 0.85rem;\r\n    }\r\n  }\r\n<\/style>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d4b2a5 elementor-widget elementor-widget-wpr-elementor-template\" data-id=\"4d4b2a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-elementor-template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\/* Start custom CSS for html, class: .elementor-element-e56c3b6 *\/\/* Styling for More Services Section *\/\r\n#more-services {\r\n  padding: 20px;\r\n  background-color: #ffffff;\r\n  border-radius: 2px;\r\n  box-shadow: 0 2px 4px rgba(0, 0, 0, 0.1);\r\n}\r\n\r\n#more-services .widget-title {\r\n  font-size: 1.5rem;\r\n  font-weight: bold;\r\n  color: #ce0047;\r\n  margin-bottom: 10px;\r\n  border-bottom: 2px solid #ce0047;\r\n  display: inline-block;\r\n  padding-bottom: 5px;\r\n}\r\n\r\n#more-services nav ul {\r\n  list-style: none;\r\n  padding: 0;\r\n}\r\n\r\n#more-services nav ul li {\r\n  margin: 10px 0;\r\n}\r\n\r\n#more-services nav ul li a {\r\n  text-decoration: none;\r\n  font-size: 1rem;\r\n  color: black;\r\n  transition: color 0.3s ease;\r\n}\r\n\r\n#more-services nav ul li a:hover {\r\n  color: #ce0047;\r\n}\/* End custom CSS *\/<\/style>\t\t<div data-elementor-type=\"section\" data-elementor-id=\"26192\" class=\"elementor elementor-26192\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2e182c5 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"2e182c5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f1fdc3d\" data-id=\"f1fdc3d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e56c3b6 elementor-widget elementor-widget-html\" data-id=\"e56c3b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-widget-container\">\r\n    <aside id=\"more-services\" class=\"widget widget_more_services\">\r\n        <h2 class=\"widget-title\">Explore NCD Services<\/h2>\r\n        <nav aria-label=\"More Services\">\r\n            <ul>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/cyber-security-consultancy-3\/\">Cyber Security Consultancy<\/a><\/li>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/services\/#protective-services\">Protective Services<\/a><\/li>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/security-operations\/\">Security Operations<\/a><\/li>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/siem\/\">NCD SIEM<\/a><\/li>\r\n                <li><a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/incident-management-services\/\">Incident Management Services<\/a><\/li>\r\n            <\/ul>\r\n        <\/nav>\r\n    <\/aside>\r\n<\/div>\r\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<span class=\"wpr-template-edit-btn\" data-permalink=\"https:\/\/nihoncyberdefence.co.jp\/en\/?elementor_library=ncd_service_sidebar_mar25\">Edit Template<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3b5aa18 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"3b5aa18\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-969444c\" data-id=\"969444c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4277e91 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"4277e91\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-08b7728 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"08b7728\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8303ae8\" data-id=\"8303ae8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fd4d10e elementor-widget elementor-widget-wpr-elementor-template\" data-id=\"fd4d10e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-elementor-template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>.elementor-24612 .elementor-element.elementor-element-65c14fa:not(.elementor-motion-effects-element-type-background), .elementor-24612 .elementor-element.elementor-element-65c14fa > .elementor-motion-effects-container > .elementor-motion-effects-layer{background-color:var( --e-global-color-astglobalcolor5 );}.elementor-24612 .elementor-element.elementor-element-65c14fa{transition:background 0.3s, border 0.3s, border-radius 0.3s, box-shadow 0.3s;padding:40px 0px 0px 0px;}.elementor-24612 .elementor-element.elementor-element-65c14fa > .elementor-background-overlay{transition:background 0.3s, border-radius 0.3s, opacity 0.3s;}.elementor-24612 .elementor-element.elementor-element-20a4c35 .elementor-heading-title{font-family:\"Roboto\", Sans-serif;-webkit-text-stroke-color:#000;stroke:#000;color:var( --e-global-color-3f44114 );}.elementor-24612 .elementor-element.elementor-element-9871ba7{font-family:\"Roboto\", Sans-serif;font-size:18px;}.elementor-24612 .elementor-element.elementor-element-9871ba7 p{margin-block-end:0px;}.elementor-24612 .elementor-element.elementor-element-f2ac74a{text-align:center;}.elementor-24612 .elementor-element.elementor-element-f2ac74a .elementor-heading-title{font-family:\"Roboto\", Sans-serif;color:#CE0047;}.elementor-24612 .elementor-element.elementor-element-7e1fd79{text-align:center;}.elementor-24612 .elementor-element.elementor-element-7e1fd79 .elementor-heading-title{font-family:\"Roboto\", Sans-serif;}.elementor-24612 .elementor-element.elementor-element-bf733a7{--spacer-size:10px;}.elementor-24612 .elementor-element.elementor-element-cad7d3a{text-align:center;}.elementor-24612 .elementor-element.elementor-element-cad7d3a .elementor-heading-title{font-family:\"Roboto\", Sans-serif;color:#CE0047;}.elementor-24612 .elementor-element.elementor-element-93dbb7a{text-align:center;}.elementor-24612 .elementor-element.elementor-element-93dbb7a .elementor-heading-title{font-family:\"Roboto\", Sans-serif;}.elementor-24612 .elementor-element.elementor-element-dbe8c8d > .elementor-widget-container{margin:10px 0px 0px 0px;}<\/style>\t\t<div data-elementor-type=\"section\" data-elementor-id=\"24612\" class=\"elementor elementor-24612\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-65c14fa elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"65c14fa\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-951cee2\" data-id=\"951cee2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-20a4c35 elementor-widget elementor-widget-heading\" data-id=\"20a4c35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cyber Maturity Assessment<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9871ba7 elementor-widget elementor-widget-text-editor\" data-id=\"9871ba7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nihon Cyber Defence (NCD) offers comprehensive\u00a0<a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/cyber-security-consultancy-3\/\">Cyber Maturity Assessments<\/a>\u00a0designed to evaluate an organisations current cyber security capabilities, identify areas for improvement, and develop a strategic roadmap to enhance overall security posture.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2ac74a elementor-widget elementor-widget-heading\" data-id=\"f2ac74a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cyber Security Framework (NIST)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e1fd79 elementor-widget elementor-widget-heading\" data-id=\"7e1fd79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">National Institute of Standards and Technology<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3aa09b3 elementor-widget elementor-widget-image\" data-id=\"3aa09b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"404\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?fit=768%2C404&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-24616\" alt=\"NIST Framework Graphic\" srcset=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?w=2048&amp;ssl=1 2048w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?resize=300%2C158&amp;ssl=1 300w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?resize=1024%2C538&amp;ssl=1 1024w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?resize=768%2C404&amp;ssl=1 768w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/NIST-Framework-Graphic_EN.png?resize=1536%2C807&amp;ssl=1 1536w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf733a7 elementor-widget elementor-widget-spacer\" data-id=\"bf733a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cad7d3a elementor-widget elementor-widget-heading\" data-id=\"cad7d3a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Cyber Assessment Framework (CAF)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-93dbb7a elementor-widget elementor-widget-heading\" data-id=\"93dbb7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">National Cyber Security Centre<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbe8c8d elementor-widget elementor-widget-image\" data-id=\"dbe8c8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"680\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/CAF-Framework-Graphic_EN.png?fit=768%2C680&amp;ssl=1\" class=\"attachment-medium_large size-medium_large wp-image-24618\" alt=\"CAF Framework Graphic\" srcset=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/CAF-Framework-Graphic_EN.png?w=1342&amp;ssl=1 1342w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/CAF-Framework-Graphic_EN.png?resize=300%2C266&amp;ssl=1 300w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/CAF-Framework-Graphic_EN.png?resize=1024%2C906&amp;ssl=1 1024w, https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/02\/CAF-Framework-Graphic_EN.png?resize=768%2C680&amp;ssl=1 768w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b09fb82 elementor-widget elementor-widget-text-editor\" data-id=\"b09fb82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Explore more of the NCD suite: <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/cyber-security-consultancy-3\/\">Cyber Security Consultancy<\/a>, <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/protective-services-2\/\">Protective Services<\/a>, <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/security-operations\/\">Network Monitoring &amp; Security Operations<\/a>, <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/siem\/\">SIEM<\/a>, <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/incident-management-services\/\">Incident Management<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<span class=\"wpr-template-edit-btn\" data-permalink=\"https:\/\/nihoncyberdefence.co.jp\/en\/?elementor_library=cma_en\">Edit Template<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5f7c1e6 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"5f7c1e6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0edaa14\" data-id=\"0edaa14\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-53e0440 elementor-widget elementor-widget-wpr-elementor-template\" data-id=\"53e0440\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"wpr-elementor-template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-widget-heading-wrapper.heading-style1 .tpg-widget-heading::before{background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-widget-heading-wrapper.heading-style4::before{background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .tpg-post-holder .entry-title:hover{color:var( --e-global-color-b578261 );}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .tpg-el-image-wrap img{width:inherit;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .rt-holder .tpg-el-image-wrap img{object-position:inherit;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .rt-holder:hover .tpg-el-image-wrap img{object-position:inherit;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .tpg-el-main-wrapper .tpg-post-holder .post-meta-tags a:hover{color:var( --e-global-color-b578261 );}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .tpg-post-holder .rt-detail .read-more a{border-style:solid;border-width:1px 1px 1px 1px;border-color:#D4D4D4;}body .elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .tpg-post-holder .rt-detail .read-more a:hover{color:#CE0047;border-style:solid;border-width:1px 1px 1px 1px;border-color:var( --e-global-color-b578261 );}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination-wrap{justify-content:center;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:not(:hover) > a, .elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:not(:hover) > span{color:#FFFFFF;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-page-numbers .paginationjs .paginationjs-pages ul li:not(:hover) > a{color:#FFFFFF;background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-page-numbers .paginationjs .paginationjs-pages ul li:not(:hover){color:#FFFFFF;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-loadmore-btn{color:#FFFFFF;background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li > a:not(:hover), .elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:not(:hover) > span{background-color:#CE0047;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:hover > a, .elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > li:hover > span{color:#FFFFFF !important;background-color:#AA1736 !important;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-page-numbers .paginationjs .paginationjs-pages ul li:hover > a{color:#FFFFFF !important;background-color:#AA1736 !important;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-loadmore-btn:hover{color:#FFFFFF !important;background-color:#AA1736 !important;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > a,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > span,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > a:hover,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > span:hover,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > a:focus,\n\t\t\t\t\t.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-pagination .pagination-list > .active > span:focus{color:#FFFFFF !important;background-color:#CE0047 !important;}.elementor-26442 .elementor-element.elementor-element-67c9a499 .rt-tpg-container .rt-pagination-wrap .rt-page-numbers .paginationjs .paginationjs-pages ul li.active > a{color:#FFFFFF;background-color:#CE0047;}<\/style>\t\t<div data-elementor-type=\"section\" data-elementor-id=\"26442\" class=\"elementor elementor-26442\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-366640da elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"366640da\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-dc744a9\" data-id=\"dc744a9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67c9a499 meta-visibility-show section-title-style-style1 title_position_default title_hover_border_default title-default img_hover_animation_default meta_position_default tpg-category-position-default readmore-btn-default-style grid-hover-overlay-type-always tpg-el-box-border-enable tpg-border-bottom-disable elementor-widget elementor-widget-tpg-grid-layout\" data-id=\"67c9a499\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"tpg-grid-layout.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"rt-container-fluid rt-tpg-container tpg-el-main-wrapper clearfix grid-layout1-main \"\n\t\t\t id=\"rt-tpg-container-1297075067\"\n\t\t\t data-layout=\"grid-layout1\"\n\t\t\t data-grid-style=\"tpg-full-height\"\n\t\t\t data-sc-id=\"elementor\"\n\t\t\t data-el-settings=''\n\t\t\t data-el-query=''\n\t\t\t data-el-path=''\n\t\t>\n\t\t\t\t\t\t<div class='tpg-header-wrapper '>\n\t\t\t\t\n        <div class=\"tpg-widget-heading-wrapper rt-clear heading-style1 \">\n            <span class=\"tpg-widget-heading-line line-left\"><\/span>\n\t\t\t<h2 class='tpg-widget-heading'>\n\t\t\t\n\t\t\t\t                    <span>\n\t\t\t\t\t\tMore from NCD\u200b\t\t\t\t\t<\/span>\n\t\t\t\t\t\n\t\t\t\t\t\t\t<\/h2>            <span class=\"tpg-widget-heading-line line-right\"><\/span>\n\n\t\t\t\n        <\/div>\n\n\t\t\n\t\t\t\t\t<\/div>\n\n\t\t\t<div data-title=\"Loading ...\" class=\"rt-row rt-content-loader grid-layout1 grid-behaviour tpg-full-height grid_layout_wrapper\">\n\t\t\t\t<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-29266 post type-post status-publish format-standard has-post-thumbnail hentry category-103\"        data-id=\"29266\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"29266\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/understanding-phishing-and-how-to-stop-it\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2026\/02\/ncdevent2026_v1.2-1-1.png?fit=768%2C327&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"327\"\n                             alt=\"NCD EVENT 2026\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"29266\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/understanding-phishing-and-how-to-stop-it\/\" class=\"tpg-post-link\" target=\"_self\">Understanding Phishing and How to Stop it !!!<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2026\/02\/05\/\">\n\t\t\t\t\tFebruary 5, 2026\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"%e3%83%97%e3%83%ac%e3%82%b9%e3%83%aa%e3%83%aa%e3%83%bc%e3%82%b9\" href=\"https:\/\/nihoncyberdefence.co.jp\/category\/%e3%83%97%e3%83%ac%e3%82%b9%e3%83%aa%e3%83%aa%e3%83%bc%e3%82%b9\/\">\u30d7\u30ec\u30b9\u30ea\u30ea\u30fc\u30b9<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defence (NCD) is proud to host a special cybersecurity seminar on Tuesday, February 24, 2026. This exclusive event brings together leading experts from NCD, Netcraft, and the Japan Cyber...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"29266\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/understanding-phishing-and-how-to-stop-it\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-29155 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2\"        data-id=\"29155\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"29155\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-opens-kyiv-office\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2026\/01\/DSC_0361-scaled.jpg?fit=768%2C512&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"512\"\n                             alt=\"Nihon Cyber Defence opens Kyiv office\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"29155\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-opens-kyiv-office\/\" class=\"tpg-post-link\" target=\"_self\">Nihon Cyber Defence opens Kyiv office<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2026\/01\/20\/\">\n\t\t\t\t\tJanuary 20, 2026\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defence Co., Ltd. (NCD) held an official opening reception for the Kyiv office in Kyiv, Ukraine on December 30, 2025, with the presence of His Excellency Ambassador Extraordinary and...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"29155\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-opens-kyiv-office\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-29073 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2\"        data-id=\"29073\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"29073\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-shizuoka-city-announce-strategic-cooperation\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/12\/NCSCOE.jpg?fit=768%2C512&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"512\"\n                             alt=\"Nihon Cyber Defence and Shizuoka City Announce Strategic Cooperation\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"29073\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-shizuoka-city-announce-strategic-cooperation\/\" class=\"tpg-post-link\" target=\"_self\">Nihon Cyber Defence and Shizuoka City Announce Strategic Cooperation<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/12\/28\/\">\n\t\t\t\t\tDecember 28, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defence and Shizuoka City Announce Strategic Cooperation to Establish Nihon Cyber Shizuoka Centre of Excellence (NCSCOE)...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"29073\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/nihon-cyber-defence-shizuoka-city-announce-strategic-cooperation\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28997 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2 tag-649 tag-cyber tag-defence tag-econosec tag-exhibition tag-japan tag-ncd tag-ncsc tag-nihon tag-presentation\"        data-id=\"28997\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28997\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/ransomware-dos-donts-a-practical-case-study-on-ransomware-negotiations\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/11\/edited-photo.jpg?fit=768%2C319&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"319\"\n                             alt=\"Ransomware Do&#8217;s &#038; Don&#8217;ts &#8211; A Practical Case Study on Ransomware Negotiations\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28997\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/ransomware-dos-donts-a-practical-case-study-on-ransomware-negotiations\/\" class=\"tpg-post-link\" target=\"_self\">Ransomware Do&#8217;s &#038; Don&#8217;ts &#8211; A Practical Case Study on Ransomware Negotiations<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/11\/18\/\">\n\t\t\t\t\tNovember 18, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tCartan McLaughlin, CEO of Nihon Cyber Defence (NCD)\u2014the first Japanese cybersecurity company to receive certification from the UK\u2019s National Cyber Security Centre (NCSC)\u2014will be speaking at this event...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28997\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/ransomware-dos-donts-a-practical-case-study-on-ransomware-negotiations\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28930 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2 tag-649 tag-cyber tag-defence tag-econosec tag-exhibition tag-japan tag-ncd tag-nihon tag-presentation\"        data-id=\"28930\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28930\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/exhibition-and-presentation-at-econosec-japan-2025\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/08\/econosec-edited-1.png?fit=768%2C438&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"438\"\n                             alt=\"Exhibition and Presentation at ECONOSEC JAPAN 2025\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28930\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/exhibition-and-presentation-at-econosec-japan-2025\/\" class=\"tpg-post-link\" target=\"_self\">Exhibition and Presentation at ECONOSEC JAPAN 2025<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/09\/29\/\">\n\t\t\t\t\tSeptember 29, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defense (NCD) will be exhibiting at ECONOSEC Japan 2025, held at Sunshine City, Ikebukuro from September 30 to October 1, 2025, in partnership with Fivecast...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28930\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/exhibition-and-presentation-at-econosec-japan-2025\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28687 post type-post status-publish format-standard has-post-thumbnail hentry category-press-release-2 tag-cyber-diplomacy tag-cybersecurity-company-tokyo tag-cybersecurity-growth-japan tag-executive-appointment-cybersecurity tag-japan-cyber-defence-platform tag-japan-cybersecurity-leadership tag-japan-ukraine-cyber-security tag-ncd tag-ncd-japan tag-nihon-cyber-defence-en tag-public-private-cyber-cooperation tag-senior-advisor tag-sergiy-korsunsky tag-sovereign-cybersecurity-japan tag-ukrainian-ambassador-japan\"        data-id=\"28687\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28687\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/dr-sergiy-korsunsky-appointed-senior-advisor-to-nihon-cyber-defence\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/12\/Korsunsky-NCD-EN-2.png?fit=768%2C339&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"339\"\n                             alt=\"Dr. Sergiy Korsunsky &#8211; Appointed Senior Advisor to Nihon Cyber Defence\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28687\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/dr-sergiy-korsunsky-appointed-senior-advisor-to-nihon-cyber-defence\/\" class=\"tpg-post-link\" target=\"_self\">Dr. Sergiy Korsunsky &#8211; Appointed Senior Advisor to Nihon Cyber Defence<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/07\/09\/\">\n\t\t\t\t\tJuly 9, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"press-release-2\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/press-release-2\/\">Press Release<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tNihon Cyber Defence (NCD) appoints former Ukrainian Ambassador to Japan, Dr. Sergiy Korsunsky, as Senior Advisor. Dr. Korsunsky will enhance NCD\u2019s international strategy and cyber defence leadership...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28687\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/dr-sergiy-korsunsky-appointed-senior-advisor-to-nihon-cyber-defence\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28732 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-security-leadership tag-acd-compliance-strategy tag-acd-law-japan tag-blog tag-board-cyber-governance tag-business-continuity-japan tag-critical-infrastructure-cybersecurity-japan tag-cyber-resilience-japan tag-cyber-risk-management-japan tag-executive-cyber-risk tag-japan-active-cyber-defence tag-meti-cybersecurity-guidance tag-ncd tag-ncd-governance-support tag-nihon-cyber-defence-en tag-sovereign-cybersecurity-japan tag-toshio-nawa-cyber-insights\"        data-id=\"28732\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28732\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/what-japans-acd-law-means-for-business-leaders\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/06\/what-acd-means-1.jpg?fit=768%2C340&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"340\"\n                             alt=\"Japanese train conductor on platform, preparing for departure highlighting metro rail as part of Japan\u2019s critical infrastructure.\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28732\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/what-japans-acd-law-means-for-business-leaders\/\" class=\"tpg-post-link\" target=\"_self\">What Japan\u2019s ACD Law Means for Business Leaders<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/06\/16\/\">\n\t\t\t\t\tJune 16, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"cyber-security-leadership\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/cyber-security-leadership\/\">Cyber Security Leadership<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tJapan\u2019s ACD Law places cyber risk accountability on boards and executives. Learn what leaders in CNI, finance, and manufacturing must now prioritise...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28732\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/what-japans-acd-law-means-for-business-leaders\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28665 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-resilience tag-crisis-communications-cyber-attack tag-critical-infrastructure-cybersecurity-japan tag-cyber-incident-response tag-cyber-resilience-japan tag-cyber-risk-management-japan tag-financial-services-cyber-resilience-japan tag-incident-management-service-japan tag-leadership-cyber-crisis-communications tag-ncd tag-nihon-cyber-defence-en tag-sovereign-cybersecurity-japan\"        data-id=\"28665\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28665\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/crisis-communications-in-cyber-incidents\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/06\/crisis_communication.jpg?fit=768%2C340&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"340\"\n                             alt=\"Microphones at press conference, symbolising leadership communications during a cyber incident.\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28665\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/crisis-communications-in-cyber-incidents\/\" class=\"tpg-post-link\" target=\"_self\">Crisis Communications in Cyber Incidents<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/06\/12\/\">\n\t\t\t\t\tJune 12, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"cyber-resilience\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/cyber-resilience\/\">Cyber Resilience<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tHow leadership teams in Japan\u2019s CNI, Finance, and Manufacturing sectors can strengthen crisis communications in cyber incident response...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28665\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/crisis-communications-in-cyber-incidents\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n<div class=\"rt-col-md-4 rt-col-sm-6 rt-col-xs-12 default rt-grid-item post-28638 post type-post status-publish format-standard has-post-thumbnail hentry category-cyber-resilience tag-acd-law-japan tag-blog tag-critical-infrastructure-cybersecurity-japan tag-cti-integration tag-cti-japan tag-cyber-resilience-japan tag-cyber-risk-management-japan tag-financial-sector-cybersecurity-japan tag-japan-cyber-threat-intelligence tag-ncd tag-nihon-cyber-defence-en tag-sovereign-cybersecurity-japan\"        data-id=\"28638\">\n    <div class=\"rt-holder tpg-post-holder \">\n        <div class=\"rt-detail rt-el-content-wrapper\">\n\t\t\t                <div class=\"rt-img-holder tpg-el-image-wrap has-thumbnail\">\n\t\t\t\t\t<a data-id=\"28638\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/integrating-a-strategic-cti-function-in-japan\/\" class=\"tpg-post-link\" target=\"_self\">                        <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/06\/CTI-1.jpg?fit=768%2C340&#038;ssl=1\"\n                             class=\"rt-img-responsive\"\n                             width=\"768\"\n                             height=\"340\"\n                             alt=\"Business leader analysing cyber threat intelligence data visualisation on large digital display in cyber security operations centre, Japan.\">\n\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\t\t<\/a>\n\t\t        <div class=\"overlay grid-hover-content\"><\/div>\n\t\t                <\/div>\n\t\t\t\n\t\t\t<div class=\"entry-title-wrapper\"><h3 class=\"entry-title\"><a data-id=\"28638\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/integrating-a-strategic-cti-function-in-japan\/\" class=\"tpg-post-link\" target=\"_self\">Integrating a Strategic CTI Function in Japan<\/a><\/h3><\/div>\n\t\t\t                <div class=\"post-meta-tags rt-el-post-meta\">\n\t\t\t\t\t            <span class='date'>\n\t\t\t\t<i class='far fa-calendar-alt '><\/i>\t\t\t\t                    <a href=\"https:\/\/nihoncyberdefence.co.jp\/en\/2025\/06\/10\/\">\n\t\t\t\t\tJune 10, 2025\t\t\t\t<\/a>\n\t\t\t\t\t\t\t<\/span>\n\t\t\t            <span class='categories-links'>\n\t\t\t\t<i class='fas fa-folder-open '><\/i><a class=\"cyber-resilience\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/category\/cyber-resilience\/\">Cyber Resilience<\/a>\t\t\t<\/span>\n\t\t\t                <\/div>\n\t\t\t\n\n\t\t\t                <div class=\"tpg-excerpt tpg-el-excerpt\">\n\t\t\t\t\t                        <div class=\"tpg-excerpt-inner\">\n\t\t\t\t\t\t\tHow Japanese enterprises can integrate Cyber Threat Intelligence (CTI) to strengthen cyber resilience, meet compliance, and protect critical sectors...                        <\/div>\n\t\t\t\t\t\t\t\t\t\t                <\/div>\n\t\t\t\n\t\t\t        <div class=\"post-footer\">\n            <div class=\"post-footer\">\n                <div class=\"read-more\">\n\t\t\t\t\t<a data-id=\"28638\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/integrating-a-strategic-cti-function-in-japan\/\" class=\"tpg-post-link\" target=\"_self\">Read More<\/a>                <\/div>\n            <\/div>\n        <\/div>\n\t\t        <\/div>\n    <\/div>\n<\/div>\n\t\t\t<\/div>\n\t\t\t<div class='rt-pagination-wrap' data-total-pages='4' data-posts-per-page='' data-type='pagination'><div class=\"rt-pagination\"><ul class=\"pagination-list\"><li class=\"active\"><span>1<\/span><\/li><li><a data-paged='2' href='https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/28142\/page\/2\/'>2<\/a><\/li><li><a data-paged='3' href='https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/28142\/page\/3\/'>3<\/a><\/li><li><a data-paged='4' href='https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/28142\/page\/4\/'>4<\/a><\/li><\/ul><\/div><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<span class=\"wpr-template-edit-btn\" data-permalink=\"https:\/\/nihoncyberdefence.co.jp\/en\/?elementor_library=more_from_ncd_english\">Edit Template<\/span>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>China-linked APT groups\u2014Salt, Volt, and Silk Typhoon\u2014are reshaping cyber warfare. Learn how these threats target Japan\u2019s critical infrastructure and how to respond effectively.<\/p>\n","protected":false},"author":1,"featured_media":28158,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[122],"tags":[496,359,490,495,494,285,66,492,493,491],"class_list":["post-28142","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-122","tag-apt-threat-intelligence","tag-blog","tag-china-apt","tag-chinese-cyber-threats","tag-cyber-security-in-japan","tag-ncd","tag-nihon-cyber-defence-en","tag-salt-typhoon-espionage","tag-silk-typhoon-cybercrime","tag-volt-typhoon-japan"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>China\u2019s APT Threats to Japan\u2019s Critical Infrastructure - Nihon Cyber Defence<\/title>\n<meta name=\"description\" content=\"China-linked APT groups\u2014Salt, Volt, and Silk Typhoon\u2014are reshaping cyber warfare. Learn how these threats target Japan\u2019s critical infrastructure and how to respond effectively.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nihoncyberdefence.co.jp\/en\/chinas-apt-threats-to-japans-critical-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"China\u2019s APT Threats to Japan\u2019s Critical Infrastructure - Nihon Cyber Defence\" \/>\n<meta property=\"og:description\" content=\"China-linked APT groups\u2014Salt, Volt, and Silk Typhoon\u2014are reshaping cyber warfare. Learn how these threats target Japan\u2019s critical infrastructure and how to respond effectively.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nihoncyberdefence.co.jp\/en\/chinas-apt-threats-to-japans-critical-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"Nihon Cyber Defence\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-21T01:24:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-27T00:47:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"531\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/chinas-apt-threats-to-japans-critical-infrastructure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/chinas-apt-threats-to-japans-critical-infrastructure\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#\\\/schema\\\/person\\\/2299396c038606cf8c63b7acf696cd43\"},\"headline\":\"China\u2019s APT Threats to Japan\u2019s Critical Infrastructure\",\"datePublished\":\"2025-05-21T01:24:06+00:00\",\"dateModified\":\"2025-05-27T00:47:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/chinas-apt-threats-to-japans-critical-infrastructure\\\/\"},\"wordCount\":973,\"publisher\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/chinas-apt-threats-to-japans-critical-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/andrews_apt_resized.png?fit=1200%2C531&ssl=1\",\"keywords\":[\"APT threat intelligence\",\"blog\",\"China APT\",\"Chinese cyber threats\",\"Cyber security in Japan\",\"NCD\",\"Nihon Cyber Defence\",\"Salt Typhoon espionage\",\"Silk Typhoon cybercrime\",\"Volt Typhoon Japan\"],\"articleSection\":[\"\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/chinas-apt-threats-to-japans-critical-infrastructure\\\/\",\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/chinas-apt-threats-to-japans-critical-infrastructure\\\/\",\"name\":\"China\u2019s APT Threats to Japan\u2019s Critical Infrastructure - Nihon Cyber Defence\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/chinas-apt-threats-to-japans-critical-infrastructure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/chinas-apt-threats-to-japans-critical-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/andrews_apt_resized.png?fit=1200%2C531&ssl=1\",\"datePublished\":\"2025-05-21T01:24:06+00:00\",\"dateModified\":\"2025-05-27T00:47:35+00:00\",\"description\":\"China-linked APT groups\u2014Salt, Volt, and Silk Typhoon\u2014are reshaping cyber warfare. Learn how these threats target Japan\u2019s critical infrastructure and how to respond effectively.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/chinas-apt-threats-to-japans-critical-infrastructure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/chinas-apt-threats-to-japans-critical-infrastructure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/chinas-apt-threats-to-japans-critical-infrastructure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/andrews_apt_resized.png?fit=1200%2C531&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/andrews_apt_resized.png?fit=1200%2C531&ssl=1\",\"width\":1200,\"height\":531,\"caption\":\"Cyber espionage and economic influence converge as China targets Japan\u2019s infrastructure and markets. A visual metaphor for digital-era geopolitical conflict.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/chinas-apt-threats-to-japans-critical-infrastructure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u30db\u30fc\u30e0\",\"item\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"China\u2019s APT Threats to Japan\u2019s Critical Infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/\",\"name\":\"Nihon Cyber Defence\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#organization\",\"name\":\"Nihon Cyber Defence\",\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Asset-12.png?fit=424%2C164&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/nihoncyberdefence.co.jp\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Asset-12.png?fit=424%2C164&ssl=1\",\"width\":424,\"height\":164,\"caption\":\"Nihon Cyber Defence\"},\"image\":{\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/#\\\/schema\\\/person\\\/2299396c038606cf8c63b7acf696cd43\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nihoncyberdefence.co.jp\"],\"url\":\"https:\\\/\\\/nihoncyberdefence.co.jp\\\/en\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"China\u2019s APT Threats to Japan\u2019s Critical Infrastructure - Nihon Cyber Defence","description":"China-linked APT groups\u2014Salt, Volt, and Silk Typhoon\u2014are reshaping cyber warfare. Learn how these threats target Japan\u2019s critical infrastructure and how to respond effectively.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nihoncyberdefence.co.jp\/en\/chinas-apt-threats-to-japans-critical-infrastructure\/","og_locale":"en_US","og_type":"article","og_title":"China\u2019s APT Threats to Japan\u2019s Critical Infrastructure - Nihon Cyber Defence","og_description":"China-linked APT groups\u2014Salt, Volt, and Silk Typhoon\u2014are reshaping cyber warfare. Learn how these threats target Japan\u2019s critical infrastructure and how to respond effectively.","og_url":"https:\/\/nihoncyberdefence.co.jp\/en\/chinas-apt-threats-to-japans-critical-infrastructure\/","og_site_name":"Nihon Cyber Defence","article_published_time":"2025-05-21T01:24:06+00:00","article_modified_time":"2025-05-27T00:47:35+00:00","og_image":[{"width":1200,"height":531,"url":"https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":false,"Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/chinas-apt-threats-to-japans-critical-infrastructure\/#article","isPartOf":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/chinas-apt-threats-to-japans-critical-infrastructure\/"},"author":{"name":"admin","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#\/schema\/person\/2299396c038606cf8c63b7acf696cd43"},"headline":"China\u2019s APT Threats to Japan\u2019s Critical Infrastructure","datePublished":"2025-05-21T01:24:06+00:00","dateModified":"2025-05-27T00:47:35+00:00","mainEntityOfPage":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/chinas-apt-threats-to-japans-critical-infrastructure\/"},"wordCount":973,"publisher":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#organization"},"image":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/chinas-apt-threats-to-japans-critical-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png?fit=1200%2C531&ssl=1","keywords":["APT threat intelligence","blog","China APT","Chinese cyber threats","Cyber security in Japan","NCD","Nihon Cyber Defence","Salt Typhoon espionage","Silk Typhoon cybercrime","Volt Typhoon Japan"],"articleSection":["\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/chinas-apt-threats-to-japans-critical-infrastructure\/","url":"https:\/\/nihoncyberdefence.co.jp\/en\/chinas-apt-threats-to-japans-critical-infrastructure\/","name":"China\u2019s APT Threats to Japan\u2019s Critical Infrastructure - Nihon Cyber Defence","isPartOf":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/chinas-apt-threats-to-japans-critical-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/chinas-apt-threats-to-japans-critical-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png?fit=1200%2C531&ssl=1","datePublished":"2025-05-21T01:24:06+00:00","dateModified":"2025-05-27T00:47:35+00:00","description":"China-linked APT groups\u2014Salt, Volt, and Silk Typhoon\u2014are reshaping cyber warfare. Learn how these threats target Japan\u2019s critical infrastructure and how to respond effectively.","breadcrumb":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/chinas-apt-threats-to-japans-critical-infrastructure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nihoncyberdefence.co.jp\/en\/chinas-apt-threats-to-japans-critical-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/chinas-apt-threats-to-japans-critical-infrastructure\/#primaryimage","url":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png?fit=1200%2C531&ssl=1","contentUrl":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png?fit=1200%2C531&ssl=1","width":1200,"height":531,"caption":"Cyber espionage and economic influence converge as China targets Japan\u2019s infrastructure and markets. A visual metaphor for digital-era geopolitical conflict."},{"@type":"BreadcrumbList","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/chinas-apt-threats-to-japans-critical-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u30db\u30fc\u30e0","item":"https:\/\/nihoncyberdefence.co.jp\/en\/"},{"@type":"ListItem","position":2,"name":"China\u2019s APT Threats to Japan\u2019s Critical Infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#website","url":"https:\/\/nihoncyberdefence.co.jp\/en\/","name":"Nihon Cyber Defence","description":"","publisher":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nihoncyberdefence.co.jp\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#organization","name":"Nihon Cyber Defence","url":"https:\/\/nihoncyberdefence.co.jp\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/06\/Asset-12.png?fit=424%2C164&ssl=1","contentUrl":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2023\/06\/Asset-12.png?fit=424%2C164&ssl=1","width":424,"height":164,"caption":"Nihon Cyber Defence"},"image":{"@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nihoncyberdefence.co.jp\/en\/#\/schema\/person\/2299396c038606cf8c63b7acf696cd43","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e83b7f6bc7da08a62b42a34bd599081567c1e79452148ea560413ed9bf414d74?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nihoncyberdefence.co.jp"],"url":"https:\/\/nihoncyberdefence.co.jp\/en\/author\/admin\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png?fit=1200%2C531&ssl=1","uagb_featured_image_src":{"full":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png?fit=1200%2C531&ssl=1",1200,531,false],"thumbnail":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png?resize=150%2C150&ssl=1",150,150,true],"medium":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png?fit=300%2C133&ssl=1",300,133,true],"medium_large":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png?fit=768%2C340&ssl=1",768,340,true],"large":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png?fit=1024%2C453&ssl=1",1024,453,true],"1536x1536":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png?fit=1200%2C531&ssl=1",1200,531,true],"2048x2048":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png?fit=1200%2C531&ssl=1",1200,531,true]},"uagb_author_info":{"display_name":false,"author_link":"https:\/\/nihoncyberdefence.co.jp\/en\/author\/admin\/"},"uagb_comment_info":0,"uagb_excerpt":"China-linked APT groups\u2014Salt, Volt, and Silk Typhoon\u2014are reshaping cyber warfare. Learn how these threats target Japan\u2019s critical infrastructure and how to respond effectively.","jetpack_sharing_enabled":true,"rttpg_featured_image_url":{"full":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png?fit=1200%2C531&ssl=1",1200,531,false],"landscape":["https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png",1200,531,false],"portraits":["https:\/\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png",1200,531,false],"thumbnail":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png?resize=150%2C150&ssl=1",150,150,true],"medium":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png?fit=300%2C133&ssl=1",300,133,true],"large":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png?fit=1024%2C453&ssl=1",1024,453,true],"1536x1536":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png?fit=1200%2C531&ssl=1",1200,531,true],"2048x2048":["https:\/\/i0.wp.com\/nihoncyberdefence.co.jp\/wp-content\/uploads\/2025\/05\/andrews_apt_resized.png?fit=1200%2C531&ssl=1",1200,531,true]},"rttpg_author":{"display_name":false,"author_link":"https:\/\/nihoncyberdefence.co.jp\/en\/author\/admin\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/nihoncyberdefence.co.jp\/category\/%e8%84%85%e5%a8%81%e3%82%a4%e3%83%b3%e3%83%86%e3%83%aa%e3%82%b8%e3%82%a7%e3%83%b3%e3%82%b9\/\" rel=\"category tag\">\u8105\u5a01\u30a4\u30f3\u30c6\u30ea\u30b8\u30a7\u30f3\u30b9<\/a>","rttpg_excerpt":"China-linked APT groups\u2014Salt, Volt, and Silk Typhoon\u2014are reshaping cyber warfare. Learn how these threats target Japan\u2019s critical infrastructure and how to respond effectively.","_links":{"self":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/28142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/comments?post=28142"}],"version-history":[{"count":10,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/28142\/revisions"}],"predecessor-version":[{"id":28413,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/posts\/28142\/revisions\/28413"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/media\/28158"}],"wp:attachment":[{"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/media?parent=28142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/categories?post=28142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nihoncyberdefence.co.jp\/en\/wp-json\/wp\/v2\/tags?post=28142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}