Skip to main content
CNB aims for win-win growth, communicating, innovating and developing with our partners...
Search
Menu
0 items $0.00
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us

Yearly Archives: 2024

Home2024Page 128
27 Sep
Blogs

Over 3K U.S. congressional staffers’ data exposed on dark web

Posted by author-avatar admin
27/09/2024
0
Hunters International claimed in a post on its extortion portal last week that it had exfiltrated terabytes of data from the auto deale...
Continue reading
27 Sep
Blogs

Major Linux distributions hit by OpenPrinting CUPS flaws

Posted by author-avatar admin
27/09/2024
0
CyberScoop reports that widely used Linux distributions, such as Ubuntu, Red Hat, and Debian, have been impacted by four vulnerabilitie...
Continue reading
27 Sep
Blogs

Digital personhood: InfoSec World 2024 delves into the legal implications of AI

Posted by author-avatar admin
27/09/2024
0
The first day of InfoSec World 2024 ended with upbeat predictions about a coming AI-powered golden age. The following two days brought ...
Continue reading
27 Sep
Blogs

Global ransomware incidence spikes | SC Media

Posted by author-avatar admin
27/09/2024
0
At least 117 countries were targeted by ransomware intrusions last year, up from 105 in 2022, with Iran, Pakistan, Brazil, and India ha...
Continue reading
27 Sep
Blogs

Minimum healthcare cyber standards called by new legislation

Posted by author-avatar admin
27/09/2024
0
Healthcare providers, health plans, and connected entities across the U.S. would be subjected to minimum cybersecurity standards under ...
Continue reading
27 Sep
Blogs

Novel payloads spread in Kimsuky attacks

Posted by author-avatar admin
27/09/2024
0
North Korean advanced persistent threat operations Kimsuky — also known as APT43, Black Banshee, ARCHIPELAGO, Springtail, Sparkling Pis...
Continue reading
27 Sep
Blogs

Five ways to beef up network security and reduce data theft

Posted by author-avatar admin
27/09/2024
0
As stories about data breaches hit the headlines, data security remains front and center for every organization. Customers are increasi...
Continue reading
27 Sep
Blogs

38% of AI-using employees admit to sending sensitive work data

Posted by author-avatar admin
27/09/2024
0
More than a third of employees who use AI for work admit to sending sensitive work information to AI applications without their employe...
Continue reading
26 Sep
Blogs

Google restricts creation of its accounts in Russia

Posted by author-avatar admin
26/09/2024
0
In Putin’s Russia, Google regulates you.According to Kremlin media, the search giant has put Russian customers in the naughty corner.Us...
Continue reading
26 Sep
Blogs

Secure the most widely used, yet most attacked enterprise app today: the browser

Posted by author-avatar admin
26/09/2024
0
The browsers of today become endpoints managed and secured in the cloud, says Menlo Security's Neko Papaz. Source link
Continue reading
  • «
  • ‹
  • 126
  • 127
  • 128
  • 129
  • 130
  • ›
  • »

CNB aims for win-win growth, communicating, innovating and developing with our partners

Our social networks:

Linkedin Instagram Whatsapp Telegram Twitter

Quick Links

  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management
  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management

UAE Office

+971 44438992

Mon – Fri : 09:00 – 17:00

info@cnbtel.com

General Enquiries

+971 527970286 24/7 on

Whatsapp/Telegram

4th floor, Rasis Business Center Al Barsha1

Dubai – UAE

Korea Office

1011, Deawoo Maison, 11, Uisadang-Daero-1Gil, Yeongdengpo-Gu

Seoul – Korea

China Office

Building 14, Yijiashan community, Choucheng Street, Yiwu City

Zhejiang - China

© Copyright 2024 CNB Tel. All rights reserved

  • Privacy Policy
  • Cookies policy
Start typing to see posts you are looking for.
  • Menu
  • Categories
Set your categories menu in Header builder -> Mobile -> Mobile menu element -> Show/Hide -> Choose menu
Create your first navigation menu here
Shopping cart
Close
Shop
Wishlist
0 items Cart
My account