Connect with us

Technology

The Top 2024 Cybersecurity Priorities for CISOs and Security Leaders Revealed in New Report by Info-Tech Research Group

Published

on

Info-Tech’s Security Priorities 2024 report delves into the pressing issues that IT and security leaders must prioritize over the coming year, including the cybersecurity talent shortage, the rise of AI-driven threats, the integration of security risks with business risks, the adoption of zero-trust frameworks, and the increasing significance of automating security operations. The global IT research and advisory firm explains in the report that by addressing these priorities, organizations can better prepare themselves to face the evolving threat landscape.

TORONTO, Feb. 12, 2024 /PRNewswire/ – With cyber threats becoming increasingly sophisticated, organizations are facing unprecedented challenges in safeguarding their digital assets. Recognizing the urgent need for robust and dynamic security strategies, Info-Tech Research Group has published its Security Priorities 2024 report. The report underscores the critical need for organizations to adapt their security measures in response to the constant changes in cyber threats in 2024 and beyond. The firm’s research highlights the importance of a strategic approach, emphasizing the need for clear oversight and effective implementation strategies to develop, deploy, and monitor security initiatives that enhance an organization’s resilience against threats.

“The threat landscape has been exacerbated by the various emerging attack vectors, such as credential-compromise attacks and cloud exploitation. The increase in supply chain risks and rise in deepfakes also showcase the shift of threat actors to improve the sophistication of their attacks,” says Ahmad Jowhar, research analyst and lead author of the report. “The rising costs of ransomware and cyber insurance premiums coupled with the continuous talent shortage depicts the challenges of efficiently fighting against these threats.”

The Security Priorities 2024 report reveals the pressing issues that IT and security leaders must prioritize and advocates for a pivot from traditional, reactive security postures to proactive, predictive security strategies. The annual report emphasizes the importance of fostering a security-centric culture across the organization, enhancing collaboration between security teams and other business units, and developing agile security frameworks that can adapt to new threats and business needs.

“The emergence of advanced technologies has created opportunities for organizations and security leaders to explore unique approaches to these challenges while also enhancing existing capabilities to better equip themselves with the right people, process, and technology this year,” says Jowhar. “These approaches include assessing the ability to address the talent shortage through upskilling, establishing a foundation to implement AI technologies, and evaluating an organization’s security risk management with respect to integrating with the enterprise.”

Info-Tech’s latest report is based on comprehensive research, including insights from the firm’s Future of IT survey and in-depth interviews with IT and security professionals across various industries and regions. The diverse approach ensured that the experiences of leaders from both small and large organizations were incorporated into the report and covered a broad spectrum of security budgets. The insights collected and analyzed by the firm reflect the realities of managing cybersecurity in different organizational contexts, from multinational corporations to nimble startups, providing a well-rounded view of the challenges and strategies at play in the current security landscape.

Leveraging the firm’s research findings and data, the Security Priorities 2024 report outlines the following five high-priority initiatives security leaders and their organizations should implement to confidently address security risks for 2024 and the years to come:

Develop and Optimize Cybersecurity Workforce. For the third consecutive year, talent shortage has remained the most pressing cybersecurity challenge, as highlighted by Info-Tech’s survey data. Respondents rated the difficulty of hiring enough security professionals to meet demands at an average concern level of 3.32 out of 5. Security leaders must identify their current skills gap and organizational needs, define their current security resourcing plan, and determine their approach to acquiring the necessary expertise.Secure the AI Revolution. As many organizations are working to leverage the power of AI, measures must be in place to ensure an effective adoption of the technology. Establishing AI governance should be one of the initial initiatives within an organization’s AI roadmap to ensure a strong and ethical risk management framework is in place. However, according to the new report, over 40% of organizations don’t have AI governance in place. In order to address potential vulnerabilities, Info-Tech advises security leaders to prioritize identifying their organization’s AI goals, determine existing security gaps, and formalize a comprehensive AI governance framework. This framework must define clear accountability, responsibilities, and risk management strategies for AI deployments.Embed Security Risk Management with the Enterprise. With the increasing adoption of AI, organizational reliance on third-party vendor platforms and capabilities will also grow exponentially. This reliance on vendors means increased information sharing and places greater accountability on CISOs or security leaders to safeguard an organization’s information assets. Despite this critical need, many organizations lack mature vendor risk management practices. As outlined in the report, in many organizations, the responsibility of vendor risk inadvertently falls on the CISO, given their role in protecting sensitive information and assets. To address this issue, security leaders must evaluate their organization’s existing third-party risk management practices, establish comprehensive policies, and ensure third-party risk management is communicated effectively to executive leadership.Operationalize Zero Trust Strategy. As cyberattacks increase in sophistication due to the advancement of emerging technology and evolving attack techniques, organizations are evaluating various defense strategies to protect their most critical assets. The report emphasizes the adoption of a zero trust framework as an effective measure to enhance an organization’s security posture and align with its business objectives. A zero trust model can significantly reduce an attacker’s capacity for lateral movement within a network, enforce least privilege access across critical resources, and minimize the organization’s overall attack surface. Info-Tech recommends security leaders adopt an iterative and scalable approach to developing a zero trust roadmap, allowing for continuous improvement and strategic deployment with an initial focus on critical surfaces. Security leaders can start by defining their zero trust strategy, assessing and identifying key capabilities and processes, formulating a comprehensive roadmap, and then consistently monitoring initiatives to identify enhancement opportunities.Automate and Autonomize Security Processes. With automated and AI-based threats becoming increasingly prevalent, the need for security process automation and autonomization has become more pronounced. Organizations should evaluate their capacity for refining security processes to proactively defend against sophisticated attacks and maintain a technological edge. However, the firm’s research shows that not all security processes are prime candidates for automation, as they could introduce risks if automated. The report recommends security leaders start streamlining their security processes by first defining automation objectives and assessing the current and desired states of their security operations to identify any gaps. Subsequently, they should determine the suitability, value, and risks associated with automating each security process, thereby prioritizing initiatives accordingly. Finally, a detailed automation roadmap that aligns with the organization’s strategic objectives must be developed and effectively communicated to executive leadership in order to obtain support.

The 2024 report also includes customizable templates that security leaders can utilize to effectively communicate their organization’s key security priorities to stakeholders and executives, ensuring a clear understanding of the required security measures.

In the face of ever-evolving cyber threats, the Security Priorities 2024 report provides security leaders with a blueprint for safeguarding their digital environment. By implementing the priorities based on their unique organizational goals and needs, security leaders can enhance their security posture, proactively address and mitigate vulnerabilities, and build a culture of resilience against the cyber threats of the future.

Those interested in exploring the specific 2024 security priorities recommended by Info-Tech Research Group are invited to register for the firm’s webinar on Wednesday, February 28, at 1:00 PM ET / 10:00 AM PT.

For exclusive media commentary from Ahmad Jowhar, a cybersecurity and privacy expert, or to access the complete Security Priorities 2024 report, please contact pr@infotech.com.

About Info-Tech Research Group

Info-Tech Research Group is one of the world’s leading information technology research and advisory firms, proudly serving over 30,000 professionals. The company produces unbiased and highly relevant research to help CIOs and leaders make strategic, timely, and well-informed decisions. For more than 25 years, Info-Tech has partnered closely with IT teams to provide them with everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

Media professionals can register for unrestricted access to research across IT, HR, and software and hundreds of industry analysts through the firm’s Media Insiders program. To gain access, contact pr@infotech.com.

For information about Info-Tech Research Group or to view the latest research, visit infotech.com and connect via LinkedIn and X.

View original content to download multimedia:https://www.prnewswire.com/news-releases/the-top-2024-cybersecurity-priorities-for-cisos-and-security-leaders-revealed-in-new-report-by-info-tech-research-group-302059568.html

SOURCE Info-Tech Research Group

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Technology

Military Cybersecurity Market to Grow by USD 17.9 Billion (2024-2028) Due to Cloud Adoption, AI-Driven Market Insights by Technavio

Published

on

By

NEW YORK, Sept. 16, 2024 /PRNewswire/ — Report on how AI is driving market transformation- The global military cybersecurity market size is estimated to grow by USD 17.90 billion from 2024-2028, according to Technavio. The market is estimated to grow at a CAGR of  11.53%  during the forecast period. Increase in adoption of cloud-based services is driving market growth, with a trend towards high adoption of AI and machine learning. However, system integration and interoperability issues  poses a challenge. Key market players include Airbus SE, BAE Systems Plc, Booz Allen Hamilton Holding Corp., Broadcom Inc., CACI International Inc., Cisco Systems Inc., Digital Management LLC, Fortinet Inc., General Dynamics Corp., GovCIO, Intel Corp., International Business Machines Corp., Leidos Holdings Inc., Lockheed Martin Corp., ManTech International Corp., NetCentrics Corp., Northrop Grumman Corp., RTX Corp., SAIC Motor Corp. Ltd., Thales Group, and Viasat Inc..

Key insights into market evolution with AI-powered analysis. Explore trends, segmentation, and growth drivers- View the snapshot of this report

Military Cybersecurity Market Scope

Report Coverage

Details

Base year

2023

Historic period

2018 – 2022

Forecast period

2024-2028

Growth momentum & CAGR

Accelerate at a CAGR of 11.53%

Market growth 2024-2028

USD 17903.9 million

Market structure

Fragmented

YoY growth 2022-2023 (%)

10.45

Regional analysis

North America, APAC, Europe, Middle East and Africa, and South America

Performing market contribution

North America at 36%

Key countries

US, China, India, Russia, and UK

Key companies profiled

Airbus SE, BAE Systems Plc, Booz Allen Hamilton Holding Corp., Broadcom Inc., CACI International Inc., Cisco Systems Inc., Digital Management LLC, Fortinet Inc., General Dynamics Corp., GovCIO, Intel Corp., International Business Machines Corp., Leidos Holdings Inc., Lockheed Martin Corp., ManTech International Corp., NetCentrics Corp., Northrop Grumman Corp., RTX Corp., SAIC Motor Corp. Ltd., Thales Group, and Viasat Inc.

Market Driver

The integration of Artificial Intelligence (AI) and machine learning in military cybersecurity is anticipated to significantly contribute to economic growth, particularly in developed economies. Developed countries are adopting AI-based solutions at a faster pace due to their advanced infrastructure. Machine learning, a subset of AI, delivers outputs similar to humans without extensive programming. Technologies like autonomous vehicles, speech recognition, and advanced web searches utilize machine learning. Extensive research and development activities are ongoing in this field. As AI replaces human monitoring and analysis, human error is reduced, leading to more effective cybersecurity solutions. This enhancement is projected to fuel the expansion of the global military cybersecurity market. 

Military cybersecurity is a critical issue as military systems, networks, and infrastructure face increasing threats from cyber attacks. Unauthorized access, espionage, and malicious activities pose risks to military operations and defense organizations. State-sponsored attacks and cyber warfare are major concerns. Defense budgets continue to grow to fund cybersecurity measures, including cloud computing solutions from cybersecurity companies. Threat intelligence, incident response, machine learning, and quantum-resistant cryptography are essential security solutions. Defense organizations must also secure their supply chains and communication networks. Cybersecurity norms, cloud-based storage solutions, and investments by governments are driving innovation in areas like autonomous defense, blockchain, space operations, and security professional services. The Biden-Harris Administration prioritizes military cybersecurity, focusing on training and education, deployment modes, data security, application security, cloud security, and endpoint security. Defense personnel require ongoing training to counter evolving threats.

Request Sample of our comprehensive report now to stay ahead in the AI-driven market evolution!

Market Challenges

The military sector’s increasing adoption of advanced technologies brings about the need for network security solutions. However, defense agencies encounter challenges in integrating these solutions with their existing IT infrastructure. Vendors must offer unified IT solutions to ensure seamless integration. Technical issues during operations can result in significant costs and reduced efficiency. Hacking-related malfunctions, such as server errors and technical defects, pose a threat. To mitigate these risks, vendors must conduct rigorous trials before market introduction. Integration of multiple IT systems on traditional infrastructure can lead to cross-platform issues, potentially hindering military cybersecurity implementation and market growth.Military organizations face unique cybersecurity challenges in areas like supply chain security, threat intelligence, incident response, and defense security norms. Machine learning and quantum-resistant cryptography help strengthen network, endpoint, application, data, cloud, and communication security. Cyber-physical systems, autonomous defense, blockchain, and space operations require specialized solutions. Biden-Harris Administration’s focus on cybersecurity includes investments in cybersecurity technologies, professional services, training, and education. Challenges include hacking, import/export analysis, and compliance with defense security norms. Cloud-based storage solutions, security services, and encryption are essential for data protection. Access controls, national security, and incident response are critical components of defense cybersecurity strategies. Military cybersecurity requires a multi-layered approach to address the evolving threat landscape. This includes deploying security solutions for various modes, implementing communication networks with intelligence and surveillance capabilities, and ensuring supply chain security. Defense personnel need ongoing training to stay updated on the latest cybersecurity trends and best practices. Defense budgets continue to increase for cybersecurity initiatives, with investments in unmanned vehicles, cloud-based storage solutions, and security services.

Discover how AI is revolutionizing market trends- Get your access now!

Segment Overview 

This military cybersecurity market report extensively covers market segmentation by  

Deployment 1.1 On-premise1.2 Cloud-basedType 2.1 Network security2.2 Data security2.3 Identity and access management2.4 Cloud securityGeography 3.1 North America3.2 APAC3.3 Europe3.4 Middle East and Africa3.5 South America

1.1 On-premise-  The on-premises segment dominated the global military cybersecurity market in 2022, accounting for the largest share. On-premises security solutions run on an organization’s own hardware infrastructure, enabling defense institutions to purchase licenses for cybersecurity software to operate on their local servers. The primary advantage of on-premises systems is data protection, as data is stored locally, granting end-users complete control. Military organizations maintain full authority over their network security without external interference. Although the demand for on-premises systems has decreased due to the rise of cloud-based alternatives, concerns regarding security, compliance, and network control continue to drive market growth.

Download a Sample of our comprehensive report today to discover how AI-driven innovations are reshaping competitive dynamics

Research Analysis

The Military Cybersecurity Market encompasses the protective measures implemented to safeguard military systems, networks, and infrastructure from cyber threats. With the increasing reliance on technology for military operations, unauthorized access, espionage, and malicious activities pose significant risks. Defense organizations face threats from state-sponsored attacks, hacking, and import/export analysis. To counter these risks, governments are making substantial investments in cybersecurity technologies, including cloud-based storage solutions, encryption, access controls, and security services. The Biden-Harris Administration has prioritized cybersecurity, recognizing its importance to national security. Unmanned vehicles and defense personnel also require protection. The defense budget reflects this priority, with a growing allocation towards cybersecurity. Cybersecurity is essential to maintaining the integrity and confidentiality of military information, ensuring the safety of defense personnel, and preserving national security.

Market Research Overview

The Military Cybersecurity market encompasses the protection of Military systems, networks, and infrastructure from Cyber threats such as unauthorized access, espionage, malicious activities, and state-sponsored attacks. Cybersecurity measures are essential to safeguard Military operations and defense organizations from Cyber warfare. Defense budgets continue to prioritize Cybersecurity, with investments in Cloud computing, Cybersecurity companies, and advanced technologies like Machine learning, Quantum-resistant cryptography, Blockchain, and Autonomous defense. Military cybersecurity extends to securing Cyber-physical systems, communication networks, Intelligence and surveillance, and Supply chain. Defense organizations face various threats, including hacking, import/export analysis, and encryption breaches. Access controls and National security are paramount, with a focus on Cloud-based storage solutions, Security services, and Cybersecurity technologies. Personnel training and education are crucial, with deployment modes varying from on-premises to Cloud-based solutions. The Biden-Harris Administration has focued Military cybersecurity, with Defense personnel receiving increased training and education. Defense budgets continue to allocate funds for Cybersecurity, with a focus on securing Space operations, Unmanned vehicles, and Defense personnel. Cybersecurity norms and regulations are evolving, with a growing emphasis on Threat intelligence, Incident response, and Deployment modes.

Table of Contents:

1 Executive Summary
2 Market Landscape
3 Market Sizing
4 Historic Market Size
5 Five Forces Analysis
6 Market Segmentation

DeploymentOn-premiseCloud-basedTypeNetwork SecurityData SecurityIdentity And Access ManagementCloud SecurityGeographyNorth AmericaAPACEuropeMiddle East And AfricaSouth America

7 Customer Landscape
8 Geographic Landscape
9 Drivers, Challenges, and Trends
10 Company Landscape
11 Company Analysis
12 Appendix

About Technavio

Technavio is a leading global technology research and advisory company. Their research and analysis focuses on emerging market trends and provides actionable insights to help businesses identify market opportunities and develop effective strategies to optimize their market positions.

With over 500 specialized analysts, Technavio’s report library consists of more than 17,000 reports and counting, covering 800 technologies, spanning across 50 countries. Their client base consists of enterprises of all sizes, including more than 100 Fortune 500 companies. This growing client base relies on Technavio’s comprehensive coverage, extensive research, and actionable market insights to identify opportunities in existing and potential markets and assess their competitive positions within changing market scenarios.

Contacts

Technavio Research
Jesse Maida
Media & Marketing Executive
US: +1 844 364 1100
UK: +44 203 893 3200
Email: media@technavio.com
Website: www.technavio.com/

View original content to download multimedia:https://www.prnewswire.com/news-releases/military-cybersecurity-market-to-grow-by-usd-17-9-billion-2024-2028-due-to-cloud-adoption-ai-driven-market-insights-by-technavio-302247678.html

SOURCE Technavio

Continue Reading

Technology

Sinch Accelerates Adoption of Rich Communication Services (RCS) Business Messaging with RCS Upscale

Published

on

By

Leading the Evolution of Customer Engagement with Secure, Interactive, and Branded Messaging Across Devices & Platforms

ATLANTA and STOCKHOLM, Sept. 16, 2024 /PRNewswire/ — Sinch (Sinch AB (publ) – XSTO: SINCH), which is pioneering the way the world communicates through its Customer Communications Cloud, is accelerating the adoption of Rich Communication Services (RCS.)   Sinch has consistently delivered secure, branded, and interactive messaging solutions, offering flexible options that include messaging APIs, SaaS tools, and messaging enablement services. These solutions empower both brands and carriers to embrace RCS and transform customer interactions.

With Sinch’s RCS Upscale solution, businesses can seamlessly transition from SMS to RCS without additional costs or integration changes.  For markets where RCS is not fully supported, Sinch’s SMS fallback ensures continued messaging reach.  Customers using Sinch’s RCS solutions have seen unparalleled delivery and engagement rates on high-value use cases across the customer journey, making RCS an ideal choice for businesses looking to transform customer experiences.

Sinch sends millions of RCS business messages each month, helping brands like EasyPark and Micromania-Zing in EMEA, delivery companies in the North America, and banks across Latin America and India.  Sinch’s solutions are helping these organizations leverage RCS to improve their messaging capabilities, driving better customer engagement and satisfaction.

The release of iOS 18, which introduces RCS support in select markets, marks a

pivotal moment for the growth of RCS.  This development brings a more united and seamless messaging experience between Apple and Android devices for consumers, paving the way for RCS Business Messaging (RBM) adoption.  With Apple’s commitment to supporting the RCS Universal 2.4, which includes RBM, the stage is set for broader adoption, providing businesses with a powerful new tool to engage customers through rich, interactive experiences directly in their mobile inbox across a wider range of devices.

Sinch’s innovations in RCS are further evidenced by tools like the Omnichannel Connector on Salesforce AppExchange, which enables Salesforce Marketing Cloud customers to create dynamic, interactive campaigns.

Backed by Sinch’s global super network, strong direct operator connections, and a preferred partnership with Google, the company leads the RCS space and is fully prepared for widespread RCS rollout. Sinch’s APIs, SaaS tools, and carrier enablement services empower both businesses and carriers to create personalized, interactive RCS

experiences, driving significant improvements in customer engagement across industries.

“Sinch RCS products and solutions help businesses quickly upgrade to RCS, whether they’re looking to upscale from SMS or enable richer, more interactive and conversational experiences for their customers,” said Lodema Steinbach, VP of Product & Carrier Relations, North America at Sinch. “With a broad range of offerings and expertise across customer segments, Sinch provides the flexibility businesses need to enhance customer engagement in a secure, trusted environment.”

“As RCS adoption accelerates, we are proud to lead this technological shift,” Steinbach added. “Sinch’s API-first platform and SaaS solutions make it easy for brands to adopt RCS and drive results, whether through simple transactional messaging or richer, more interactive customer engagements. Our deep relationships with mobile operators and in-house expertise position us to support businesses throughout their RCS journey.”

To learn more about implementing RCS and how it can transform customer engagement, download Sinch’s comprehensive guide on building a business case for RCS or contact our team for personalized support.

CONTACT: 
For further information please contact:
Janet Lennon, Director of Global PR & Communications
janet.lennon@sinch.com |1.206.914.6175

This information was brought to you by Cision http://news.cision.com

View original content:https://www.prnewswire.com/news-releases/sinch-accelerates-adoption-of-rich-communication-services-rcs-business-messaging-with-rcs-upscale-302249386.html

SOURCE Sinch AB

Continue Reading

Technology

LAZ collaborates with bp to bring bp pulse ultra-fast public EV charging hubs to 20 cities over next five years

Published

on

By

Under the agreement, the ultra fast charging sites will host Level 3 chargers, be open to the public 24/7 and provide drivers with up to one hour of free parking while charging

HARTFORD, Conn., Sept. 16, 2024 /PRNewswire/ — LAZ Parking, the largest, fastest-growing privately owned parking operator in the United States, is pleased to announce that it has entered into an agreement with bp pulse to collaborate in the development, deployment, and operation of ultra-fast public charging hubs at LAZ-managed locations. bp pulse is a leading worldwide provider and best-in-class operator of ultra-fast electric vehicle charging. LAZ manages and leases a network of distributed real estate encompassing 1.6 million parking spaces in over 3,800 locations in 42 states and 477 cities in the U.S. and Canada.

“We are thrilled to be collaborating with bp pulse,” said Alan Lazowski, Chairman and CEO, of LAZ Parking. “This agreement builds on LAZ’s mission to provide value to our clients and opportunities for our employees. By focusing on embracing emerging technologies, and collaborating with major stakeholders, like bp pulse, we are driving positive change and propelling the parking industry toward a resilient and more efficient future.”

The ultra-fast charging hubs developed by bp pulse are classified as Level 3 charging and rated at 250kW or higher. These chargers can provide EV customers with a full charge in 30-45 minutes depending on variables like vehicle type and battery health.  

“This collaboration with LAZ supports the delivery of our strategy to bring EV charging to major metro areas at locations where drivers are already going in their day-to-day routines,” said Sujay Sharma, CEO bp pulse America. “bp pulse is proud to be to working with like-minded partners who have long term commitments to the EV transition and are propelling the EV industry forward. These LAZ locations will be a welcome addition to bp’s own extensive real estate footprint across the US and bp pulse’s existing third-party relationships like our recently announced plans with Simon Property Group, amongst others.”

As LAZ’s preferred partner for ultra-fast charging nationwide, bp pulse will work with LAZ to identify locations best suited for ultra-fast charging hubs with a focus on key metros and other areas with a high density of vehicles including those with high tenancy housing, universities and hotels. Each site will be publicly available and operate 24/7 to ensure drivers can charge when they need to. As part of the charging experience, EV drivers will receive up to one hour of free parking when they charge using the bp pulse app.

“Unlike many other companies in this space, bp is a proven global brand committed to electrification internationally,” said Lazowski. “They are experts at designing, building, operating, and maintaining infrastructure. We could not be happier in our choice of a partner for this exciting collaboration.”

About LAZ Parking 

LAZ Parking is the largest, fastest-growing privately owned parking operator in the United States and a pioneer in digital parking technology. Founded in Hartford, CT, LAZ has been providing best-in-class parking management and transportation services since 1981 and operates over 1.6 million parking spaces in over 3,800 locations in 42 states and 477 cities in the U.S. and Canada. LAZ is an industry leader in business intelligence, remote monitoring, eCommerce solutions, and Proximity On-Demand Services or “LAZ PODS”. We leverage our international network of parking facilities to offer cutting edge, tech-enabled solutions, that include EV charging, micro warehousing, last-mile logistics, working across the hospitality, commercial, healthcare, airports, transportation, universities, government, retail, events, residential, and shuttle service industries. LAZ is a people first, conscious capitalist company, committed to elevating humanity through business. Additional information can be found at www.lazparking.com.

About bp pulse

bp pulse is bp’s electric vehicle (EV) charging business. Focused on fast and reliable charging, bp pulse deploys charging points for EV drivers and commercial fleets on the go; at destination hubs, at the depot and bp retail sites.

Around the world bp pulse is partnering with some of the world’s biggest businesses, while developing the Gigahub™ network, a series of large EV high-speed charging hubs in high-demand locations.

Electric vehicle charging is one of five growth engines of bp’s transformation into an integrated energy company. The company has already installed more than 33,900 charge points and aims to expand its network of public EV charging stations to more than 100,000 worldwide by 2030.

View original content to download multimedia:https://www.prnewswire.com/news-releases/laz-collaborates-with-bp-to-bring-bp-pulse-ultra-fast-public-ev-charging-hubs-to-20-cities-over-next-five-years-302249389.html

SOURCE LAZ Parking

Continue Reading

Trending