Company Details
nec
17,837
251,818
5415
nec.com
0
NEC_6068233
In-progress

NEC Corporation Company CyberSecurity Posture
nec.comNEC Corporation has established itself as a leader in the integration of IT and network technologies while promoting the brand statement of “Orchestrating a brighter world.” NEC enables businesses and communities to adapt to rapid changes taking place in both society and the market as it provides for the social values of safety, security, fairness and efficiency to promote a more sustainable world where everyone has the chance to reach their full potential. For more information, visit NEC at http://www.nec.com NEC's Strengths and Competencies ・Named "2017 Global 100 Most Sustainable Corporations in the World" an Index Listing the World’s 100 Most Sustainable Corporations ・Named one of the "World's Top 100 Most Innovative Organizations for 2016" by Thomson Reuters ・Face recognition technology achieved No. 1 in the recent Face in Video Evaluation (FIVE, *1) testing performed by the U.S. National Institute of Standards and Technology (NIST) (*2) (*1) https://www.nist.gov/programs-projects/face-video-evaluation-five (*2) Results shown from the Face In Video Evaluation (FIVE), the Multiple Biometric Grand Challenge (MBGC), the Multiple Biometric Evaluation (MBE) and the Face Recognition Vendor Test (FRVT) do not constitute endorsement of any particular product by the U.S. Government. ** Please note that we reserve the right to delete any comments posted on NEC Corporation’s LinkedIn page that are deemed extremely defamatory or libelous to any company or individual, or that may be offensive to others.
Company Details
nec
17,837
251,818
5415
nec.com
0
NEC_6068233
In-progress
Between 800 and 849

NEC Corporation Global Score (TPRM)XXXX



No incidents recorded for NEC Corporation in 2025.
No incidents recorded for NEC Corporation in 2025.
No incidents recorded for NEC Corporation in 2025.
NEC Corporation cyber incidents detection timeline including parent company and subsidiaries

NEC Corporation has established itself as a leader in the integration of IT and network technologies while promoting the brand statement of “Orchestrating a brighter world.” NEC enables businesses and communities to adapt to rapid changes taking place in both society and the market as it provides for the social values of safety, security, fairness and efficiency to promote a more sustainable world where everyone has the chance to reach their full potential. For more information, visit NEC at http://www.nec.com NEC's Strengths and Competencies ・Named "2017 Global 100 Most Sustainable Corporations in the World" an Index Listing the World’s 100 Most Sustainable Corporations ・Named one of the "World's Top 100 Most Innovative Organizations for 2016" by Thomson Reuters ・Face recognition technology achieved No. 1 in the recent Face in Video Evaluation (FIVE, *1) testing performed by the U.S. National Institute of Standards and Technology (NIST) (*2) (*1) https://www.nist.gov/programs-projects/face-video-evaluation-five (*2) Results shown from the Face In Video Evaluation (FIVE), the Multiple Biometric Grand Challenge (MBGC), the Multiple Biometric Evaluation (MBE) and the Face Recognition Vendor Test (FRVT) do not constitute endorsement of any particular product by the U.S. Government. ** Please note that we reserve the right to delete any comments posted on NEC Corporation’s LinkedIn page that are deemed extremely defamatory or libelous to any company or individual, or that may be offensive to others.


We bring together the right people, the right technology and the right partners to create innovative solutions that make positive impact and address some of the most urgent and complex challenges facing the modern world. With a focus on serving governments globally, Serco’s services span justice,

We are one of the world's leading consultancies in technological services for companies and the public sector. With headquarters in Spain and presence in more than 100 countries, we combine experience in AI, data, cloud and cybersecurity to help companies and organizations generate a positive impact
A leading applied technology services company, we innovate to deliver service excellence and successful outcomes across sales, delivery and development. With our strategy to be agile, nimble and customer-centric, we anticipate the future of applied technology and predict tomorrow’s trends to keep ou
At Globant, we create the digitally-native products that people love. We bridge the gap between businesses and consumers through technology and creativity, leveraging our experience as an AI powerhouse. We dare to digitally transform organizations and strive to delight their customers. - We have mo
Coforge is a global digital services and solutions provider, that leverages emerging technologies and deep domain expertise to deliver real-world business impact for its clients. A focus on select industries, a deep domain understanding of the underlying processes of those industries and partners

Infosys BPM Ltd., the business process management subsidiary of Infosys Ltd. (NYSE: INFY), was set up in April 2002. Infosys BPM focuses on integrated end-to-end outsourcing and delivers transformational benefits to its clients through reduced costs, ongoing productivity improvements, and process re

Akkodis is a global digital engineering company and Smart Industry leader. We enable clients to advance in their digital transformation with Talent, Academy, Consulting, and Solutions services. Our 50,000 experts combine best-in-class technologies, R&D, and deep sector know-how for purposeful innova

iSoftStone is a global IT service and consulting company‚ÄØthat creates value and drives success through technology solutions, service excellence, and digital innovation. We specialize in web and application development, software testing and support, data and content management, digital experience,

CenturyLink (NYSE: CTL) is a technology leader delivering hybrid networking, cloud connectivity, and security solutions to customers around the world. Through its extensive global fiber network, CenturyLink provides secure and reliable services to meet the growing digital demands of businesses and c
.png)
KDDI and NEC said they have set up a joint venture called United Cyber Force (UCF), which will start operating on 28 November. The two companies had first...
OnNovember 17, 2025, NEC Corporation will launch its next-generation cybersecurity service 'CyIOC' as a new brand, integrating NEC's...
media[813129]**BANGKOK, Nov. 5, 2025 /PRNewswire/ -- NEC Corporation (Thailand) Ltd. reaffirms its commitment to creating social value for...
While telcos and ISPs may not handle money directly, they carry something just as valuable: data, says Anthony Laing, GM of networking at...
Snapchat, long celebrated for its disappearing messages, playful filters, and interactive features, is making a significant change to its...
NEC Security, a subsidiary of NEC Corporation (NEC; TSE: 6701), has been awarded a contract to provide cybersecurity services for GREEN×EXPO...
NEC Corporation has reinforced its cybersecurity expertise by participating in Locked Shields 2025, one of the world's largest international...
NewswireTODAY - /newswire/ - Tokyo, Japan, 2025/09/05 - NEC Corporation participated in Locked Shields 2025, an international cyber defence exercise...
NEC Corporation (NEC; TSE: 6701) participated in Locked Shields 2025, an international cyber defence exercise organised by the NATO...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of NEC Corporation is https://www.nec.com/en/.
According to Rankiteo, NEC Corporation’s AI-generated cybersecurity score is 811, reflecting their Good security posture.
According to Rankiteo, NEC Corporation currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, NEC Corporation is not certified under SOC 2 Type 1.
According to Rankiteo, NEC Corporation does not hold a SOC 2 Type 2 certification.
According to Rankiteo, NEC Corporation is not listed as GDPR compliant.
According to Rankiteo, NEC Corporation does not currently maintain PCI DSS compliance.
According to Rankiteo, NEC Corporation is not compliant with HIPAA regulations.
According to Rankiteo,NEC Corporation is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
NEC Corporation operates primarily in the IT Services and IT Consulting industry.
NEC Corporation employs approximately 17,837 people worldwide.
NEC Corporation presently has no subsidiaries across any sectors.
NEC Corporation’s official LinkedIn profile has approximately 251,818 followers.
NEC Corporation is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.
Yes, NEC Corporation has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/nec.
Yes, NEC Corporation maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/nec.
As of November 27, 2025, Rankiteo reports that NEC Corporation has not experienced any cybersecurity incidents.
NEC Corporation has an estimated 36,296 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, NEC Corporation has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.