array(3) {
["company_details"]=>
array(13) {
["name"]=>
string(8) "KPN B.V."
["slug"]=>
string(15) "1f4bb-nl-kpn-bv"
["logo"]=>
string(84) "https://images.businessradar.com/linkedin_logos/fecc0a68-9ce7-4ae0-931c-2852629c3b27"
["description"]=>
string(676) "Welkom bij de LinkedIn pagina van KPN. Sinds jaar en dag maakt KPN technologie toegankelijk. Hier leest u alles over de ontwikkelingen rondom de thema’s die KPN belangrijk vindt, zoals Het Nieuwe Leven & Werken, Veiligheid & Privacy en ICT-infrastructuur. Ook een transparante en betrouwbare dienstverlener zijn, efficiency in de zorg en duurzaam ondernemen staan bij ons hoog in het vaandel. Op onze pagina blijft u op de hoogte van het laatste nieuws rondom onze activiteiten, de thema’s in uw leven waarin technologie een rol speelt en onze producten en services op het gebied van ICT. Ontdek samen met ons voor u en uw organisatie de beste oplossingen en voel je vrij."
["address_street"]=>
string(14) "Wilhelminakade"
["address_place"]=>
string(9) "Rotterdam"
["address_region"]=>
string(12) "Zuid-Holland"
["founding_date"]=>
string(10) "1989-01-01"
["website_domain"]=>
string(7) "kpn.com"
["website_url"]=>
string(19) "https://www.kpn.com"
["industry_codes"]=>
array(2) {
[0]=>
string(19) "Employment Agencies"
[1]=>
string(39) "Computer Facilities Management Services"
}
["employee_count"]=>
int(14902)
["article_count"]=>
int(98)
}
["articles"]=>
array(8) {
[0]=>
array(7) {
["title_en"]=>
string(78) "KPN Security publishes the latest edition of Cyber Security Perspectives"
["snippet_en"]=>
string(78) "KPN Security publishes the latest edition of Cyber Security Perspectives"
["url"]=>
string(105) "https://dutchitchannel.nl/news/375617/kpn-security-publiceert-nieuwste-editie-cyber-security-perspectives"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/7649d897-84e5-47ce-9917-e7c9c1c765cf"
["source"]=>
string(17) "dutchitchannel.nl"
["publication_date"]=>
string(10) "2023-05-31"
["categories"]=>
array(1) {
[0]=>
string(10) "Cybercrime"
}
}
[1]=>
array(7) {
["title_en"]=>
string(87) "KPN Security publishes latest edition of Cyber Security Perspectives - Emerce"
["snippet_en"]=>
string(143) "Zoetermeer, May 30, 2023 – The latest edition of Cyber Security Perspectives is now available. This annual magazine, published by [...]"
["url"]=>
string(94) "https://www.emerce.nl/wire/kpn-security-publiceert-nieuwste-editie-cyber-security-perspectives"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/2eee9fd9-9133-40c9-8b7e-ef0e2d63efa0"
["source"]=>
string(9) "emerce.nl"
["publication_date"]=>
string(10) "2023-05-30"
["categories"]=>
array(2) {
[0]=>
string(13) "Data Security"
[1]=>
string(10) "Cybercrime"
}
}
[2]=>
array(7) {
["title_en"]=>
string(138) "From 25 to 27 January: KPN Security focuses on digital resilience - Securitymanagement.nl - Security, Congress, Cyber security, News"
["snippet_en"]=>
string(174) "KPN Security will be holding NLSecure[ID] for the fourth time from 25 to 27 January 2022, an event for the Dutch security community. More than twenty top speakers share […]"
["url"]=>
string(117) "https://www.securitymanagement.nl/van-25-tot-en-met-27-januari-kpn-security-staat-in-teken-van-digitale-weerbaarheid/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/a4fbd585-c90f-43e4-934b-4114bbf7277b"
["source"]=>
string(21) "securitymanagement.nl"
["publication_date"]=>
string(10) "2022-01-05"
["categories"]=>
array(3) {
[0]=>
string(13) "Data Security"
[1]=>
string(5) "Event"
[2]=>
string(10) "Cybercrime"
}
}
[3]=>
array(7) {
["title_en"]=>
string(58) "Ransomware creators Avaddon suddenly stop and release keys"
["snippet_en"]=>
string(28) "Ransomware killed thousands."
["url"]=>
string(95) "https://www.agconnect.nl/artikel/makers-ransomware-avaddon-stoppen-plots-en-geven-sleutels-vrij"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/557adc12-0016-461e-b1e7-7a115b12f154"
["source"]=>
string(12) "agconnect.nl"
["publication_date"]=>
string(10) "2021-06-15"
["categories"]=>
array(1) {
[0]=>
string(10) "Cybercrime"
}
}
[4]=>
array(7) {
["title_en"]=>
string(56) "KPN Security publishes Cyber Security Perspectives"
["snippet_en"]=>
string(167) "The first edition of the renewed Cyber Security Perspectives magazine is now available. This annual publication by KPN Security focuses on digital resilience ..."
["url"]=>
string(124) "https://www.computable.nl/artikel/techwire/security/7167788/2499347/kpn-security-publiceert-cyber-security-perspectives.html"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/a6fc2853-b0af-41dd-b05f-25ed06ad8fdd"
["source"]=>
string(13) "computable.nl"
["publication_date"]=>
string(10) "2021-04-15"
["categories"]=>
array(2) {
[0]=>
string(13) "Data Security"
[1]=>
string(10) "Cybercrime"
}
}
[5]=>
array(7) {
["title_en"]=>
string(19) "KPN Security - LINK"
["snippet_en"]=>
string(208) "More intensive cloud use, the arrival of 5G: technological developments continue to rage. That offers countless opportunities, that much is certain. But in addition to companies, hackers also benefit from it."
["url"]=>
string(108) "https://linkmagazine.nl/erno-doorenspleet-kpn-security-data-zijn-de-verantwoordelijkheid-van-bedrijven-zelf/"
["image_url"]=>
string(78) "https://images.businessradar.com/articles/07db8709-aa72-4029-81ec-ca4bb3ca0d99"
["source"]=>
string(15) "linkmagazine.nl"
["publication_date"]=>
string(10) "2020-12-23"
["categories"]=>
array(1) {
[0]=>
string(10) "Cybercrime"
}
}
[6]=>
array(7) {
["title_en"]=>
string(35) "KPN merges IT security subsidiaries"
["snippet_en"]=>
string(255) "ROTTERDAM (AFN) - Telecom company KPN is combining its various IT security providers under the name KPN Security. In addition to KPN Security Services, the companies DearBytes and QSight IT, acquired two years ago, will also be included in the new branch."
["url"]=>
string(77) "https://www.iex.nl/Nieuws/622109/KPN-voegt-IT-beveiligingsdochters-samen.aspx"
["image_url"]=>
NULL
["source"]=>
string(6) "iex.nl"
["publication_date"]=>
string(10) "2019-04-11"
["categories"]=>
array(4) {
[0]=>
string(13) "Data Security"
[1]=>
string(11) "Acquisition"
[2]=>
string(10) "Cybercrime"
[3]=>
string(11) "Name Change"
}
}
[7]=>
array(7) {
["title_en"]=>
string(31) "Cyber supply chain attack"
["snippet_en"]=>
string(273) "Cyber supply chain attack - here's what you can do
Solid IT security helps to stop ransomware, phishing and other cyber threats. But what if the hackers come in via a supplier who does not have his cybersecurity in order? - this is called a cyber supply chain attack"
["url"]=>
string(85) "https://digimagazine.logistiek.nl/ketensamenwerking_2021_01/cyber_supply_chain_aanval"
["image_url"]=>
NULL
["source"]=>
string(12) "logistiek.nl"
["publication_date"]=>
NULL
["categories"]=>
array(4) {
[0]=>
string(23) "Supply Chain Management"
[1]=>
string(13) "Data Security"
[2]=>
string(10) "Cybercrime"
[3]=>
string(23) "Supply Chain Disruption"
}
}
}
["category_annotations"]=>
array(30) {
[0]=>
array(2) {
["name"]=>
string(13) "Data Security"
["count"]=>
int(13)
}
[1]=>
array(2) {
["name"]=>
string(10) "Cybercrime"
["count"]=>
int(8)
}
[2]=>
array(2) {
["name"]=>
string(13) "Collaboration"
["count"]=>
int(8)
}
[3]=>
array(2) {
["name"]=>
string(5) "Event"
["count"]=>
int(5)
}
[4]=>
array(2) {
["name"]=>
string(12) "Board Change"
["count"]=>
int(4)
}
[5]=>
array(2) {
["name"]=>
string(5) "Award"
["count"]=>
int(3)
}
[6]=>
array(2) {
["name"]=>
string(15) "Deals & Tenders"
["count"]=>
int(3)
}
[7]=>
array(2) {
["name"]=>
string(11) "Acquisition"
["count"]=>
int(2)
}
[8]=>
array(2) {
["name"]=>
string(6) "Merger"
["count"]=>
int(2)
}
[9]=>
array(2) {
["name"]=>
string(18) "Ecological Impacts"
["count"]=>
int(2)
}
[10]=>
array(2) {
["name"]=>
string(23) "Supply Chain Disruption"
["count"]=>
int(2)
}
[11]=>
array(2) {
["name"]=>
string(24) "Quarterly/Annual Figures"
["count"]=>
int(2)
}
[12]=>
array(2) {
["name"]=>
string(5) "Legal"
["count"]=>
int(1)
}
[13]=>
array(2) {
["name"]=>
string(11) "Name Change"
["count"]=>
int(1)
}
[14]=>
array(2) {
["name"]=>
string(6) "Outage"
["count"]=>
int(1)
}
[15]=>
array(2) {
["name"]=>
string(37) "Product Design & Lifecycle Management"
["count"]=>
int(1)
}
[16]=>
array(2) {
["name"]=>
string(14) "Product Launch"
["count"]=>
int(1)
}
[17]=>
array(2) {
["name"]=>
string(26) "Product Quality and safety"
["count"]=>
int(1)
}
[18]=>
array(2) {
["name"]=>
string(13) "Raw Materials"
["count"]=>
int(1)
}
[19]=>
array(2) {
["name"]=>
string(5) "R & D"
["count"]=>
int(1)
}
[20]=>
array(2) {
["name"]=>
string(23) "Real estate development"
["count"]=>
int(1)
}
[21]=>
array(2) {
["name"]=>
string(12) "Stock Market"
["count"]=>
int(1)
}
[22]=>
array(2) {
["name"]=>
string(23) "Supply Chain Management"
["count"]=>
int(1)
}
[23]=>
array(2) {
["name"]=>
string(13) "Vessel Damage"
["count"]=>
int(1)
}
[24]=>
array(2) {
["name"]=>
string(17) "Academic Research"
["count"]=>
int(1)
}
[25]=>
array(2) {
["name"]=>
string(14) "Work from Home"
["count"]=>
int(1)
}
[26]=>
array(2) {
["name"]=>
string(15) "Blogs & Columns"
["count"]=>
int(1)
}
[27]=>
array(2) {
["name"]=>
string(20) "Business Development"
["count"]=>
int(1)
}
[28]=>
array(2) {
["name"]=>
string(27) "Business Model & Innovation"
["count"]=>
int(1)
}
[29]=>
array(2) {
["name"]=>
string(25) "Business Model Resilience"
["count"]=>
int(1)
}
}
}
1f4bb-nl-kpn-bv
KPN B.V.
Location
Zuid-Holland
Founded
1989-01-01
Website
https://www.kpn.com
Articles
98 Articles
Category
Employment Agencies
Computer Facilities Management Services
Description
Welkom bij de LinkedIn pagina van KPN. Sinds jaar en dag maakt KPN technologie toegankelijk. Hier leest u alles over de ontwikkelingen rondom de thema’s die KPN belangrijk vindt, zoals Het Nieuwe Leven & Werken, Veiligheid & Privacy en ICT-infrastructuur. Ook een transparante en betrouwbare dienstverlener zijn, efficiency in de zorg en duurzaam ondernemen staan bij ons hoog in het vaandel. Op onze pagina blijft u op de hoogte van het laatste nieuws rondom onze activiteiten, de thema’s in uw leven waarin technologie een rol speelt en onze producten en services op het gebied van ICT. Ontdek samen met ons voor u en uw organisatie de beste oplossingen en voel je vrij.
KPN Security will be holding NLSecure[ID] for the fourth time from 25 to 27 January 2022, an event for the Dutch security community. More than twenty top speakers share […]
The first edition of the renewed Cyber Security Perspectives magazine is now available. This annual publication by KPN Security focuses on digital resilience ...
More intensive cloud use, the arrival of 5G: technological developments continue to rage. That offers countless opportunities, that much is certain. But in addition to companies, hackers also benefit from it.
ROTTERDAM (AFN) - Telecom company KPN is combining its various IT security providers under the name KPN Security. In addition to KPN Security Services, the companies DearBytes and QSight IT, acquired two years ago, will also be included in the new branch.
Cyber supply chain attack - here's what you can do
Solid IT security helps to stop ransomware, phishing and other cyber threats. But what if the hackers come in via a supplier who does not have his cybersecurity in order? - this is called a cyber supply chain attack
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.