We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.

I accept
Featured
New Ordinance on Critical Infrastructure: Ushers in a New Chapter for Cybersecurity

New Ordinance on Critical Infrastructure: Ushers in a New Chapter for Cybersecurity

2026-02-04AICybersecurity

This blog provides a detailed breakdown of the ordinance’s key contents for enterprises. In addition to explaining the three major obligations, it also highlights the challenges an…

More
AI vs AI: Strategic Cybersecurity Deployment

AI vs AI: Strategic Cybersecurity Deployment

2025-01-17 AICybersecurityEvent Highlights

The last "AI Red/Blue Gamification Experience" in 2024 has successfully concluded! IT leaders and cybersecurity experts from different industries participated in an immersive gamifi…

More
Safeguarding Your Data with Comprehensive Cybersecurity Strategies

Safeguarding Your Data with Comprehensive Cybersecurity Strategies

2024-12-20 CloudCybersecurity

This article will explore a series of ICT solutions, including high-quality cloud services, security measures for safeguarding cloud assets, and a series of cybersecurity solutions.…

More
What is Vulnerability Management? From Analysis to Response

What is Vulnerability Management? From Analysis to Response

2024-10-25 Cybersecurity

Vulnerability management involves a continuous process of vulnerability identification, analysis, reporting and remediation. Learn how vulnerability analysis and response benefit en…

More
Driving Digital Intelligence Transformation Through Collaborative Ecosystem Partnerships

Driving Digital Intelligence Transformation Through Collaborative Ecosystem Partnerships

2024-09-09 Data CenterCybersecurity

We were honored to invite WTIA and its members to participate in our “Exploring CITIC Telecom CPC DataHOUSE™ Cloud Data Center" event. At this event, participants had the privileg…

More
Attack Simulation: What is it and how does it work?

Attack Simulation: What is it and how does it work?

2024-08-20 Cybersecurity

Attack simulation is a process of testing cybersecurity by simulating real-world threats in a controlled environment. Learn how attack simulation identifies vulnerabilities and bols…

More
【Turning Crisis into Opportunity】New Momentum for Fintech, Integrating Resources to Enhance Security Protection

【Turning Crisis into Opportunity】New Momentum for Fintech, Integrating Resources to Enhance Security Protection

By wepro180 - 2024-08-02 Cybersecurity

We recently organized the "Enhance Data Security in Today's Digital Finance Era" customer event, invited industry experts to explore the latest technology trends and risks in the fi…

More
Strengthen Defenses from the Inside Out to Withstand Advanced Cyberattacks

Strengthen Defenses from the Inside Out to Withstand Advanced Cyberattacks

2024-07-26 Cybersecurity

Recently, a hacker group claimed to have successfully breached the internal systems of an internationally renowned film production company, stole more than 1TB of data from its inte…

More
AI Red/Blue Gamification Experience: Equipping Businesses Across Industries to Tackle New Cybersecurity Challenges

AI Red/Blue Gamification Experience: Equipping Businesses Across Industries to Tackle New Cybersecurity Challenges

2024-07-10 CybersecurityEvent Highlights

CITIC Telecom CPC recently organized two “AI Red/Blue Gamification Experience” events aimed at assisting enterprises across all industries in strengthening cybersecurity measures …

More
What Is Attack Surface Management (ASM)?

What Is Attack Surface Management (ASM)?

2024-06-18 Cybersecurity

Attack Surface Management (ASM) involves the continuous discovery, prioritisation, and monitoring of an enterprise's IT infrastructure to enhance security. By adopting the perspecti…

More
How Can Enterprises Respond to the Unexpected Deepfake Threats?

How Can Enterprises Respond to the Unexpected Deepfake Threats?

2024-06-14 Cybersecurity

This article will explore the technology behind deepfake, how cybercriminals employ deepfake and provide strategies to assist enterprises in safeguarding against such threats.

More
【New Cybersecurity Challenges】AI-Enabled Managed Security Services Respond Swiftly for AI-Enhanced Attacks

【New Cybersecurity Challenges】AI-Enabled Managed Security Services Respond Swiftly for AI-Enhanced Attacks

By wepro180 - 2024-05-31 EcosystemCybersecurityIntelligent InnovationEvent Highlights

We have hosted the "AI is a Double-edged Sword" customer event, featuring a Fireside Chat session with three innovative companies, Pretech, Swapify, and UNCLE2 shared insights on AI…

More
Analysis of Cyberattack Incidents: Remediating Vulnerabilities to Prevent Data Breach

Analysis of Cyberattack Incidents: Remediating Vulnerabilities to Prevent Data Breach

2024-05-30 Cybersecurity

The Office of the Privacy Commissioner for Personal Data (PCPD), Hong Kong, recently released two investigation reports that detail the vulnerabilities in the cyberattack incidents …

More
Products & Services
Europe Solutions Networking Information Security Cloud Solutions Cloud Data Center Internet Services Managed Services ICT-MiiND
Solutions
Architecture, Engineering & Construction Automobile BFSI Logistics & Transportation Manufacturing Legal & Accounting Services Retail Healthcare
Technology & Services
Consulting Services Customer Services
Resources Center
Product Leaflets New Offering Videos White Paper Success Stories Blog CPC Spotlights
About Us
Our Company Global Ecosystem Partners News Center Accreditation & Awards Careers
Contact Us

General Enquiry / Sales Hotline +31 20 567 2000

Service Hotline +372 622 33 00

Contact Us

Follow Us

Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited

Need help? Chat with CPC Chatbot
Supported browsers: Latest versions of IE11, Firefox, Chrome and Safari.
Terms & Conditions
Welcome to CITIC Telecom International CPC Limited. Your conversation with CPC Chatbot may be recorded for training, quality control and dispute handling purposes. By clicking “Continue” and using CPC Chatbot, you accept and agree to be bound by our Privacy Policy and give your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.
Continue