CNB aims for win-win growth, communicating, innovating and developing with our partners...
Login / Register
Sign inCreate an Account

Lost your password?

Search
Menu
0 items $0.00
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us

Monthly Archives: January 2025

Home2025JanuaryPage 27
07 Jan
Blogs

Argentinian airport security payroll system reportedly breached

Posted by author-avatar admin
07/01/2025
0
Infiltration of the hospital's network earlier that month resulted in the compromise of files, one of which had individuals' names, bir...
Continue reading
07 Jan
Blogs

Massive T-Mobile breach prompts lawsuit from Washington state

Posted by author-avatar admin
07/01/2025
0
Infiltration of the hospital's network earlier that month resulted in the compromise of files, one of which had individuals' names, bir...
Continue reading
07 Jan
Blogs

Thomson Reuters acquires SafeSend for $600M

Posted by author-avatar admin
07/01/2025
0
Global media and technology services provider Thomson Reuters Corporation has paid $600 million in cash to acquire Michigan-based tax a...
Continue reading
07 Jan
Blogs

Alibaba Cloud introduces advanced security features for hybrid, multi-cloud

Posted by author-avatar admin
07/01/2025
0
Alibaba Cloud has launched enhanced security features to address the increasing complexity of managing hybrid and multi-cloud environme...
Continue reading
07 Jan
Blogs

Cloud security challenges arise for data engineers

Posted by author-avatar admin
07/01/2025
0
As data becomes a critical asset for businesses, data engineers play a pivotal role in ensuring its secure management, particularly wit...
Continue reading
07 Jan
Blogs

Cloud, AI, and cybersecurity converge on fintech landscape

Posted by author-avatar admin
07/01/2025
0
The intersection of cloud computing, artificial intelligence, and cybersecurity is transforming financial services, driving innovations...
Continue reading
07 Jan
Blogs

Key trends for Kubernetes security in 2024

Posted by author-avatar admin
07/01/2025
0
Kubernetes security encompasses protective measures to safeguard applications within Kubernetes environments, and with Kubernetes adopt...
Continue reading
Blogs

Four million locations in sight for fiber builder Brightspeed

Posted by author-avatar admin
07/01/2025
0
Press Release Brightspeed, one of the nation’s largest fiber broadband builders focused on empowering more homes with ultrafast, reliab...
Continue reading
07 Jan
Blogs

Removing Rust, Double Clickjacking, h3i CLI, JWT Mistakes, Reviewing Recursion – ASW #312

Posted by author-avatar admin
07/01/2025
0
To emphasize from the start, many of these vulns "...result in little or no real-world harm in most contexts." However, there's still ...
Continue reading
07 Jan
Blogs

Four ways to mitigate the abuse of generic top-level domains

Posted by author-avatar admin
07/01/2025
0
COMMENTARY: Domain mirroring, or a domain impersonation attack, remains one of the oldest tricks in the phishing playbook. It’s when th...
Continue reading
  • «
  • ‹
  • 25
  • 26
  • 27
  • 28
  • 29
  • ›
  • »

CNB aims for win-win growth, communicating, innovating and developing with our partners

Our social networks:

Linkedin Instagram Whatsapp Telegram Twitter

Quick Links

  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management
  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management

UAE Office

+971 44438992

Mon – Fri : 09:00 – 17:00

info@cnbtel.com

General Enquiries

+971 527970286 24/7 on

Whatsapp/Telegram

4th floor, Rasis Business Center Al Barsha1

Dubai – UAE

Korea Office

1011, Deawoo Maison, 11, Uisadang-Daero-1Gil, Yeongdengpo-Gu

Seoul – Korea

China Office

Building 14, Yijiashan community, Choucheng Street, Yiwu City

Zhejiang - China

© Copyright 2024 CNB Tel. All rights reserved

  • Privacy Policy
  • Cookies policy
Start typing to see posts you are looking for.
  • Menu
  • Categories
Set your categories menu in Header builder -> Mobile -> Mobile menu element -> Show/Hide -> Choose menu
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us
Shopping cart
Close
Shop
Wishlist
0 items Cart
My account