Global Site
Breadcrumb navigation
NEC Security Blog
Engineers from the NEC Security Engineering Center provide technical topics related to cybersecurity.

Toshiki Takeuchi
Dr.Manikantan Srinivasan
Dr.Sareena Karapoola
Dr.Manikantan Srinivasan
Dr.Sareena Karapoola
Sep 20, 2024

ChamelDoH Implant: Tunnelling or DNS-over-HTTPS (DoH)?
Toshiki Takeuchi
Dr.Manikantan Srinivasan
Dr.Sareena Karapoola
Dr.Manikantan Srinivasan
Dr.Sareena Karapoola
Aug 23, 2024

Andromeda Malware Analysis
Yoshihiko Koizumi
Jul 5, 2024

Guidelines and Best Practices for Developing Dashboards
Wataru Takahashi
Dr.Manikantan Srinivasan
Dr. Sareena Karapoola
Dr.Manikantan Srinivasan
Dr. Sareena Karapoola
Mar 22, 2024

Understanding Fargo Ransomware
Masashi Kobayashi
Feb 22, 2024

NEC’s Secure Development Initiatives
Kota Morimoto
Feb 9, 2024

How to Choose a Security Solution
Hidefumi Yamada
Jun 30, 2023

Causes of Misdirected E-mail and Countermeasures
Takahiro Kakumaru
Feb 27, 2023

Issues related to ChatGPT and its security
Satoshi Gunji
Jun 10, 2022

Software Updates for PCs, Smartphones, and Tablet Devices
Shun Miyazaki
Mar 11, 2022

Considering How to work on Secure Development
Asuka Suzuki
Jan 7, 2022

Look-alike URL ~Beware of Misleading URL~
Kotaro Kusakabe
Jun 18, 2021

The reasons why dual NIC is risky: Consideration from NIST SP800-82
Shun Miyazaki
Feb 5, 2021

What is Security Awareness?
Shun Miyazaki
Sep 18, 2020

Password Requirements Examined from Guidelines and Survey