{"published":"2024-10-07 00:00:00","blog_url":"https://security-log.hatenablog.com/","provider_url":"https://hatena.blog","height":"190","description":"\u3010\u30cb\u30e5\u30fc\u30b9\u3011 \u25c6\u904b\u7528\u6539\u5584\u3084\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u5bfe\u5fdc\u306a\u3069\u3001CISO\u5411\u3051\u652f\u63f4\u30b5\u30fc\u30d3\u30b9 - NEC\u3089 (Security NEXT, 2024/10/07) https://www.security-next.com/162663","author_name":"tanigawa","title":"\u904b\u7528\u6539\u5584\u3084\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u5bfe\u5fdc\u306a\u3069\u3001CISO\u5411\u3051\u652f\u63f4\u30b5\u30fc\u30d3\u30b9 - NEC\u3089","width":"100%","type":"rich","author_url":"https://blog.hatena.ne.jp/tanigawa/","blog_title":"TT Security Log","url":"https://security-log.hatenablog.com/entry/2024/10/07/000000","image_url":null,"categories":["CISO","\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u4f01\u696d: NEC"],"version":"1.0","provider_name":"Hatena Blog","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fsecurity-log.hatenablog.com%2Fentry%2F2024%2F10%2F07%2F000000\" title=\"\u904b\u7528\u6539\u5584\u3084\u30a4\u30f3\u30b7\u30c7\u30f3\u30c8\u5bfe\u5fdc\u306a\u3069\u3001CISO\u5411\u3051\u652f\u63f4\u30b5\u30fc\u30d3\u30b9 - NEC\u3089 - TT Security Log\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>"}