CNB aims for win-win growth, communicating, innovating and developing with our partners...
Search
Menu
0 items $0.00
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us

Monthly Archives: January 2025

Home2025JanuaryPage 19
13 Jan
Blogs

Redefining third-party governance and identity for the cloud-first era

Posted by author-avatar admin
13/01/2025
0
The rapid evolution of digital ecosystems, driven by cloud-first technologies and software-as-a-service (SaaS) models, has exposed glar...
Continue reading
13 Jan
Blogs

Privacy Under Siege: Navigating Data Theft and the BadBox Threat – Gavin Reid – CSP #208

Posted by author-avatar admin
13/01/2025
0
Gavin Reid serves as the CISO for HUMAN Security, a cybersecurity company that specializes in safeguarding enterprises from digital att...
Continue reading
13 Jan
Blogs

Italy subjected to pro-Russian DDoS attacks anew

Posted by author-avatar admin
13/01/2025
0
Attacks exploiting the vulnerability not only deployed the SPAWN malware previously launched by Chinese state-backed intrusions involvi...
Continue reading
13 Jan
Blogs

Major cyberattack hits Slovakian land registry

Posted by author-avatar admin
13/01/2025
0
Slovakia's Geodesy, Cartography and Cadastre Office, or UGKK, had its systems taken down and offices closed following a suspected ranso...
Continue reading
13 Jan
Blogs

Telefónica hack disclosed following data exposure

Posted by author-avatar admin
13/01/2025
0
Information compromised in the breach included not only names, birthdates, email addresses, and phone numbers, but also Social Security...
Continue reading
13 Jan
Blogs

US: TikTok’s excessive data collection practices threaten privacy, national security

Posted by author-avatar admin
13/01/2025
0
TikTok and its parent firm ByteDance have been accused by U.S. Solicitor General Elizabeth Prelogar of gathering exorbitant amounts of ...
Continue reading
13 Jan
Blogs

The public and private sectors must come together on GenAI  

Posted by author-avatar admin
13/01/2025
0
COMMENTARY: Unlocking what pundits tout as the unprecedented potential of GenAI may require vast amounts of electric power, and it’s un...
Continue reading
13 Jan
Blogs

Building a map of hacker history, one conversation at a time – Nathan Sportsman – ESW #389

Posted by author-avatar admin
13/01/2025
0
Nathan Sportsman is the Founder and CEO of Praetorian, a leader in offensive cybersecurity. With over two decades in the industry, Nath...
Continue reading
12 Jan
Blogs

How threat-informed defense benefits each security team member – Frank Duff – ESW #389

Posted by author-avatar admin
12/01/2025
0
Frank Duff is a distinguished thought leader in threat-informed defense, specializing in the assessment of organizations and security c...
Continue reading
11 Jan
Blogs

Robot Dogs, Ivanti, SonicWall, Banshee, Telegram, Motorola, Aaran Leyland, and more. – SWN #441

Posted by author-avatar admin
11/01/2025
0
Robot Dogs, Ivanti, SonicWall, Banshee, Telegram, Motorola, Aaran Leyland, and more. - SWN #441 Source link
Continue reading
  • «
  • ‹
  • 17
  • 18
  • 19
  • 20
  • 21
  • ›
  • »

CNB aims for win-win growth, communicating, innovating and developing with our partners

Our social networks:

Linkedin Instagram Whatsapp Telegram Twitter

Quick Links

  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management
  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management

UAE Office

+971 44438992

Mon – Fri : 09:00 – 17:00

info@cnbtel.com

General Enquiries

+971 527970286 24/7 on

Whatsapp/Telegram

4th floor, Rasis Business Center Al Barsha1

Dubai – UAE

Korea Office

1011, Deawoo Maison, 11, Uisadang-Daero-1Gil, Yeongdengpo-Gu

Seoul – Korea

China Office

Building 14, Yijiashan community, Choucheng Street, Yiwu City

Zhejiang - China

© Copyright 2024 CNB Tel. All rights reserved

  • Privacy Policy
  • Cookies policy
Start typing to see posts you are looking for.
  • Menu
  • Categories
Set your categories menu in Header builder -> Mobile -> Mobile menu element -> Show/Hide -> Choose menu
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us
Shopping cart
Close
Shop
Wishlist
0 items Cart
My account