CNB aims for win-win growth, communicating, innovating and developing with our partners...
Search
Menu
0 items $0.00
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us

Yearly Archives: 2024

Home2024Page 135
24 Sep
Blogs

The Audaciousness Factor: Five Steps to Ignite your Cybersecurity Success – Olivia Rose – ISW24 #1

Posted by author-avatar admin
24/09/2024
0
Olivia Rose is an award-winning Cybersecurity leader and three-time global Chief Information Security Officer (CISO). Olivia Rose is th...
Continue reading
24 Sep
Blogs

How & Why ICIT Partnering with CRC is Moving Critical Infrastructure Security Forward – Cory Simpson – ISW24 #1

Posted by author-avatar admin
24/09/2024
0
Cory is a security and policy expert with over 20 years of experience in the national security, legal, and technology sectors. He is th...
Continue reading
24 Sep
Blogs

Human Resiliency through the perfect storm of CISO & Individual life realities – Amy Bogac – ISW24 #1

Posted by author-avatar admin
24/09/2024
0
Welcome to Cyber Risk TV's live coverage from InfoSec World 2024! Join host Mandy Logan as she sits down with Amy Bogac, CISO of Elevat...
Continue reading
24 Sep
Blogs

‘AI is here to stay’: Cyber experts, investors foresee more AI evolution

Posted by author-avatar admin
24/09/2024
0
Does the rapid growth of the AI market foreshadow a bubble about to burst? With the lightning speed at which AI investments have taken ...
Continue reading
24 Sep
Blogs

‘Honkai: Star Rail’ game executable hijacked to launch ransomware

Posted by author-avatar admin
24/09/2024
0
A new ransomware uses the executable for the popular video game “Honkai: Star Rail” to help launch itself while avoiding detection.The ...
Continue reading
24 Sep
Blogs

CyberRisk TV LIVE from InfoSec World 2024 – Day 1 Wrap-Up – ISW24 #1

Posted by author-avatar admin
24/09/2024
0
Copyright © 2024 CyberRisk Alliance, LLC All Rights Reserved. This material may not be published, broadcast, rewritten or redis...
Continue reading
24 Sep
Blogs

Authentication and Authorization in the AI Era – Shiven Ramji – BSW #365

Posted by author-avatar admin
24/09/2024
0
Shiven Ramji is the President, Customer Identity at Okta, where he is responsible for the Customer Identity Cloud product, data, securi...
Continue reading
Blogs

Cellnex mulls sale of French data centres

Posted by author-avatar admin
24/09/2024
0
News According to reports, the sale could raise hundreds of millions of euros Reports on Friday suggest that digital infrastructure spe...
Continue reading
24 Sep
Blogs

Authentication and Authorization in the AI Era – Shiven Ramji – BSW #365

Posted by author-avatar admin
24/09/2024
0
Shiven Ramji is the President, Customer Identity at Okta, where he is responsible for the Customer Identity Cloud product, data, securi...
Continue reading
24 Sep
Blogs

Vulnerability and Exposure Management – Brian Contos – ISW24 #1

Posted by author-avatar admin
24/09/2024
0
With two IPOs & eight acquisitions, Brian has helped build some of the most successful security companies in the world. He has over...
Continue reading
  • «
  • ‹
  • 133
  • 134
  • 135
  • 136
  • 137
  • ›
  • »

CNB aims for win-win growth, communicating, innovating and developing with our partners

Our social networks:

Linkedin Instagram Whatsapp Telegram Twitter

Quick Links

  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management
  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management

UAE Office

+971 44438992

Mon – Fri : 09:00 – 17:00

info@cnbtel.com

General Enquiries

+971 527970286 24/7 on

Whatsapp/Telegram

4th floor, Rasis Business Center Al Barsha1

Dubai – UAE

Korea Office

1011, Deawoo Maison, 11, Uisadang-Daero-1Gil, Yeongdengpo-Gu

Seoul – Korea

China Office

Building 14, Yijiashan community, Choucheng Street, Yiwu City

Zhejiang - China

© Copyright 2024 CNB Tel. All rights reserved

  • Privacy Policy
  • Cookies policy
Start typing to see posts you are looking for.
  • Menu
  • Categories
Set your categories menu in Header builder -> Mobile -> Mobile menu element -> Show/Hide -> Choose menu
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us
Shopping cart
Close
Shop
Wishlist
0 items Cart
My account