CNB aims for win-win growth, communicating, innovating and developing with our partners...
Login / Register
Sign inCreate an Account

Lost your password?

Search
Menu
0 items $0.00
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us

Monthly Archives: January 2025

Home2025JanuaryPage 30
06 Jan
Blogs

Five ways to make cybersecurity resilience more than just a buzzword

Posted by author-avatar admin
06/01/2025
0
COMMENTARY: The word resilience gets tossed around a lot in cybersecurity, but what does it really mean?In a cybersecurity context, res...
Continue reading
Blogs

Finnish court rejects calls to release tanker suspected of subsea cable damage

Posted by author-avatar admin
06/01/2025
0
News The tanker is believed to have damage submarine telecoms and electricity cables by dragging its anchor across the lines late last ...
Continue reading
04 Jan
Blogs

Microsoft pushes identity management feature for Azure via Entra

Posted by author-avatar admin
04/01/2025
0
Microsoft released a new Azure feature aimed at minimizing security risk during authentication.The Federated Identity Credentials syste...
Continue reading
04 Jan
Blogs

New LLM jailbreak uses models’ evaluation skills against them

Posted by author-avatar admin
04/01/2025
0
A new jailbreak method for large language models (LLMs) takes advantage of models’ ability to identify and score harmful content in ord...
Continue reading
03 Jan
Blogs

FireScam Android malware poses as Telegram app to steal sensitive data

Posted by author-avatar admin
03/01/2025
0
An Android infostealer malware called FireScam disguised as a fake Telegram Premium app was discovered being distributed through a GitH...
Continue reading
03 Jan
Blogs

Identity-security predictions for 2025 | SC Media

Posted by author-avatar admin
03/01/2025
0
What's in store for 2025? No one knows for sure, but experts at Okta have made some educated guesses, especially as they relate to the ...
Continue reading
03 Jan
Blogs

Endpoint Security – Rob Allen – SWN Vault

Posted by author-avatar admin
03/01/2025
0
Rob Allen is an IT Professional with almost two decades of experience assisting small and medium enterprises embrace and utilize techno...
Continue reading
Blogs

US court blocks reinstatement of net neutrality

Posted by author-avatar admin
03/01/2025
0
News The court of appeal ruled on Thursday that the Federal Communications Commission (FCC) does not have the legal authority to reinst...
Continue reading
03 Jan
Blogs

Treasury’s sanctions office reportedly subjected to Chinese hack

Posted by author-avatar admin
03/01/2025
0
Chinese state-sponsored threat operation Volt Typhoon, also known as Vanguard Panda, was regarded by CrowdStrike Senior Vice President ...
Continue reading
03 Jan
Blogs

Network sniffing attacks threaten millions of unencrypted mail servers

Posted by author-avatar admin
03/01/2025
0
"This means that passwords used for mail access may be intercepted by a network sniffer. Additionally, service exposure may enable pass...
Continue reading
  • «
  • ‹
  • 28
  • 29
  • 30
  • 31
  • 32
  • ›
  • »

Quick Links

  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management
  • Training
  • Company
  • Blogs
  • Catalogues
  • Contact
  • Environmental Management

UAE Office

+971 44438992

Mon – Fri : 09:00 – 17:00

info@cnbtel.com

General Enquiries

+971 527970286 24/7 on

Whatsapp/Telegram

4th floor, Rasis Business Center Al Barsha1

Dubai – UAE

Korea Office

1011, Deawoo Maison, 11, Uisadang-Daero-1Gil, Yeongdengpo-Gu

Seoul – Korea

China Office

Building 14, Yijiashan community, Choucheng Street, Yiwu City

Zhejiang - China

CNB aims for win-win growth, communicating, innovating and developing with our partners

Our social networks:

Linkedin Instagram Whatsapp Telegram Twitter

© Copyright 2024 CNB Tel. All rights reserved

  • Privacy Policy
  • Cookies policy
Start typing to see posts you are looking for.
  • Menu
  • Categories
Set your categories menu in Header builder -> Mobile -> Mobile menu element -> Show/Hide -> Choose menu
  • Home
  • Services
    • Telecom Services
      • IP TRANSIT
      • DATA CENTER
      • VOICE
      • EPC
    • OT Security services
      • CONSULTANCY
      • RISK ASSESSMENT
      • REGULATORY COMPLIANCE
      • ASSET HARDENING
      • NETWORK SEGMENTATION
      • OT ASSET INVENTORY
      • OT VULNERABILITY ASSESSMENT
      • PENETRATION TESTING
      • INCIDENT RESPONSE
      • INDUSTRIAL SECURITY TTX
      • STAFF AUGMENTATION
      • OT CYBER SECURITY FRAMEWORK
      • OT CYBER SECURITY PROGRAM
      • DIGITAL FORENSICS INCIDENT RESPONSE (DFIR)
      • MALEVOLENT THREAT ACTOR MONITORING
      • Capital Project Assurance
      • Architecture Assessment
  • Solution
    • Telecom Solutions
      • NANJING WASIN FUJIKURA
      • SNELL OPTIC
      • HUAWEI
      • NEWOSYS
    • IT SECURITY SOLUTIONS
      • FORTINET
      • APPSCREENER
      • KASPERSKY
      • SOPHOS
      • JUNIPER
    • OT SECURITY SOLUTIONS
      • DATAFLOWX
      • NOZOMI
  • TRAINING
    • MILTRE ATT&CK DEFENDER (MAD20)
    • CYBER RANGES
    • LEGO® Serious Play®
  • INDUSTRIES
    • POWER
    • OIL & GAS
    • MANUFACTURING
    • WATER & WASTEWATER
    • CHEMICAL
    • FOOD & BEVERAGE
    • AUTOMOTIVE
    • MARITIME 
    • HEALTH 
    • TRANSPORT
    • PHARMACEUTICAL 
    • MINING
  • COMPANY
    • ABOUT
    • ENVIRONMENTAL MANAGEMENT
  • Catalogues
    • Newosys
    • Nozomi Networks Guardian
    • NWF Brochure
    • WASIN FUJIKURA PROUDUCTS
    • DataBrokerX
    • DataDiodeX
    • DataMessageX
    • Newosys-G
  • Blogs
  • Contact Us
Shopping cart
Close
Shop
Wishlist
0 items Cart
My account