We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.
I accept2026-02-04AICybersecurity
This blog provides a detailed breakdown of the ordinance’s key contents for enterprises. In addition to explaining the three major obligations, it also highlights the challenges an…
2025-01-17
AICybersecurityEvent Highlights
The last "AI Red/Blue Gamification Experience" in 2024 has successfully concluded! IT leaders and cybersecurity experts from different industries participated in an immersive gamifi…
2024-12-20
CloudCybersecurity
This article will explore a series of ICT solutions, including high-quality cloud services, security measures for safeguarding cloud assets, and a series of cybersecurity solutions.…
2024-10-25
Cybersecurity
Vulnerability management involves a continuous process of vulnerability identification, analysis, reporting and remediation. Learn how vulnerability analysis and response benefit en…
2024-09-09
Data CenterCybersecurity
We were honored to invite WTIA and its members to participate in our “Exploring CITIC Telecom CPC DataHOUSE™ Cloud Data Center" event. At this event, participants had the privileg…
2024-08-20
Cybersecurity
Attack simulation is a process of testing cybersecurity by simulating real-world threats in a controlled environment. Learn how attack simulation identifies vulnerabilities and bols…
By wepro180 - 2024-08-02
Cybersecurity
We recently organized the "Enhance Data Security in Today's Digital Finance Era" customer event, invited industry experts to explore the latest technology trends and risks in the fi…
2024-07-26
Cybersecurity
Recently, a hacker group claimed to have successfully breached the internal systems of an internationally renowned film production company, stole more than 1TB of data from its inte…
2024-07-10
CybersecurityEvent Highlights
CITIC Telecom CPC recently organized two “AI Red/Blue Gamification Experience” events aimed at assisting enterprises across all industries in strengthening cybersecurity measures …
2024-06-18
Cybersecurity
Attack Surface Management (ASM) involves the continuous discovery, prioritisation, and monitoring of an enterprise's IT infrastructure to enhance security. By adopting the perspecti…
2024-06-14
Cybersecurity
This article will explore the technology behind deepfake, how cybercriminals employ deepfake and provide strategies to assist enterprises in safeguarding against such threats.
By wepro180 - 2024-05-31
EcosystemCybersecurityIntelligent InnovationEvent Highlights
We have hosted the "AI is a Double-edged Sword" customer event, featuring a Fireside Chat session with three innovative companies, Pretech, Swapify, and UNCLE2 shared insights on AI…
2024-05-30
Cybersecurity
The Office of the Privacy Commissioner for Personal Data (PCPD), Hong Kong, recently released two investigation reports that detail the vulnerabilities in the cyberattack incidents …
General Enquiry / Sales Hotline +81 3 5339 1968
Service Hotline +81 53 1086 0011
Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited













