We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.
I accept2026-02-04TehisintellektKüberturvalisus
This blog provides a detailed breakdown of the ordinance’s key contents for enterprises. In addition to explaining the three major obligations, it also highlights the challenges an…
2025-01-17
TehisintellektKüberturvalisusSündmuse tipphetked
The last "AI Red/Blue Gamification Experience" in 2024 has successfully concluded! IT leaders and cybersecurity experts from different industries participated in an immersive gamifi…
2024-12-20
PilvKüberturvalisus
This article will explore a series of ICT solutions, including high-quality cloud services, security measures for safeguarding cloud assets, and a series of cybersecurity solutions.…
2024-10-25
Küberturvalisus
Vulnerability management involves a continuous process of vulnerability identification, analysis, reporting and remediation. Learn how vulnerability analysis and response benefit en…
2024-09-09
MajutuskeskusKüberturvalisus
We were honored to invite WTIA and its members to participate in our “Exploring CITIC Telecom CPC DataHOUSE™ Cloud Data Center" event. At this event, participants had the privileg…
2024-08-20
Küberturvalisus
Attack simulation is a process of testing cybersecurity by simulating real-world threats in a controlled environment. Learn how attack simulation identifies vulnerabilities and bols…
By wepro180 - 2024-08-02
Küberturvalisus
We recently organized the "Enhance Data Security in Today's Digital Finance Era" customer event, invited industry experts to explore the latest technology trends and risks in the fi…
2024-07-26
Küberturvalisus
Recently, a hacker group claimed to have successfully breached the internal systems of an internationally renowned film production company, stole more than 1TB of data from its inte…
2024-07-10
KüberturvalisusSündmuse tipphetked
CITIC Telecom CPC recently organized two “AI Red/Blue Gamification Experience” events aimed at assisting enterprises across all industries in strengthening cybersecurity measures …
2024-06-18
Küberturvalisus
Attack Surface Management (ASM) involves the continuous discovery, prioritisation, and monitoring of an enterprise's IT infrastructure to enhance security. By adopting the perspecti…
2024-06-14
Küberturvalisus
This article will explore the technology behind deepfake, how cybercriminals employ deepfake and provide strategies to assist enterprises in safeguarding against such threats.
By wepro180 - 2024-05-31
ÖkosfäärKüberturvalisusArukas innovatsioonSündmuse tipphetked
We have hosted the "AI is a Double-edged Sword" customer event, featuring a Fireside Chat session with three innovative companies, Pretech, Swapify, and UNCLE2 shared insights on AI…
2024-05-30
Küberturvalisus
The Office of the Privacy Commissioner for Personal Data (PCPD), Hong Kong, recently released two investigation reports that detail the vulnerabilities in the cyberattack incidents …
Üldtelefon:
+3726223399
Müük:
+3726223360
Tehniline abi +372 622 33 90
Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited













