We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.

I accept
Esiletõstetud
New Ordinance on Critical Infrastructure: Ushers in a New Chapter for Cybersecurity

New Ordinance on Critical Infrastructure: Ushers in a New Chapter for Cybersecurity

2026-02-04TehisintellektKüberturvalisus

This blog provides a detailed breakdown of the ordinance’s key contents for enterprises. In addition to explaining the three major obligations, it also highlights the challenges an…

Rohkem
AI vs AI: Strategic Cybersecurity Deployment

AI vs AI: Strategic Cybersecurity Deployment

2025-01-17 TehisintellektKüberturvalisusSündmuse tipphetked

The last "AI Red/Blue Gamification Experience" in 2024 has successfully concluded! IT leaders and cybersecurity experts from different industries participated in an immersive gamifi…

Rohkem
Safeguarding Your Data with Comprehensive Cybersecurity Strategies

Safeguarding Your Data with Comprehensive Cybersecurity Strategies

2024-12-20 PilvKüberturvalisus

This article will explore a series of ICT solutions, including high-quality cloud services, security measures for safeguarding cloud assets, and a series of cybersecurity solutions.…

Rohkem
What is Vulnerability Management? From Analysis to Response

What is Vulnerability Management? From Analysis to Response

2024-10-25 Küberturvalisus

Vulnerability management involves a continuous process of vulnerability identification, analysis, reporting and remediation. Learn how vulnerability analysis and response benefit en…

Rohkem
Driving Digital Intelligence Transformation Through Collaborative Ecosystem Partnerships

Driving Digital Intelligence Transformation Through Collaborative Ecosystem Partnerships

2024-09-09 MajutuskeskusKüberturvalisus

We were honored to invite WTIA and its members to participate in our “Exploring CITIC Telecom CPC DataHOUSE™ Cloud Data Center" event. At this event, participants had the privileg…

Rohkem
Attack Simulation: What is it and how does it work?

Attack Simulation: What is it and how does it work?

2024-08-20 Küberturvalisus

Attack simulation is a process of testing cybersecurity by simulating real-world threats in a controlled environment. Learn how attack simulation identifies vulnerabilities and bols…

Rohkem
【Turning Crisis into Opportunity】New Momentum for Fintech, Integrating Resources to Enhance Security Protection

【Turning Crisis into Opportunity】New Momentum for Fintech, Integrating Resources to Enhance Security Protection

By wepro180 - 2024-08-02 Küberturvalisus

We recently organized the "Enhance Data Security in Today's Digital Finance Era" customer event, invited industry experts to explore the latest technology trends and risks in the fi…

Rohkem
Strengthen Defenses from the Inside Out to Withstand Advanced Cyberattacks

Strengthen Defenses from the Inside Out to Withstand Advanced Cyberattacks

2024-07-26 Küberturvalisus

Recently, a hacker group claimed to have successfully breached the internal systems of an internationally renowned film production company, stole more than 1TB of data from its inte…

Rohkem
AI Red/Blue Gamification Experience: Equipping Businesses Across Industries to Tackle New Cybersecurity Challenges

AI Red/Blue Gamification Experience: Equipping Businesses Across Industries to Tackle New Cybersecurity Challenges

2024-07-10 KüberturvalisusSündmuse tipphetked

CITIC Telecom CPC recently organized two “AI Red/Blue Gamification Experience” events aimed at assisting enterprises across all industries in strengthening cybersecurity measures …

Rohkem
What Is Attack Surface Management (ASM)?

What Is Attack Surface Management (ASM)?

2024-06-18 Küberturvalisus

Attack Surface Management (ASM) involves the continuous discovery, prioritisation, and monitoring of an enterprise's IT infrastructure to enhance security. By adopting the perspecti…

Rohkem
How Can Enterprises Respond to the Unexpected Deepfake Threats?

How Can Enterprises Respond to the Unexpected Deepfake Threats?

2024-06-14 Küberturvalisus

This article will explore the technology behind deepfake, how cybercriminals employ deepfake and provide strategies to assist enterprises in safeguarding against such threats.

Rohkem
【New Cybersecurity Challenges】AI-Enabled Managed Security Services Respond Swiftly for AI-Enhanced Attacks

【New Cybersecurity Challenges】AI-Enabled Managed Security Services Respond Swiftly for AI-Enhanced Attacks

By wepro180 - 2024-05-31 ÖkosfäärKüberturvalisusArukas innovatsioonSündmuse tipphetked

We have hosted the "AI is a Double-edged Sword" customer event, featuring a Fireside Chat session with three innovative companies, Pretech, Swapify, and UNCLE2 shared insights on AI…

Rohkem
Analysis of Cyberattack Incidents: Remediating Vulnerabilities to Prevent Data Breach

Analysis of Cyberattack Incidents: Remediating Vulnerabilities to Prevent Data Breach

2024-05-30 Küberturvalisus

The Office of the Privacy Commissioner for Personal Data (PCPD), Hong Kong, recently released two investigation reports that detail the vulnerabilities in the cyberattack incidents …

Rohkem
Tooted ja Teenused
Euroopa lahendused Võrgustiku loomine Infoturve Pilvelahendused Pilvandmekeskus Internetiteenused Haldatavad teenused ICT-MiiND
Lahendused
Arhitektuur, projekteerimine ja ehitus Autotööstus BFSI Logistika ja transport Tootmine Õigus- ja raamatupidamisteenused Jaemüük Healthcare
Tehnoloogia ja teenused
Konsultatsiooniteenused Klienditeenindus
Infomaterjalid
Teenuste brozüürid Uued pakkumised Videod Valge raamat Edulood Blogi CPC Spotlights
Firmast
Meie firma Globaalsed ökosüsteemi partnerid Uudised Akrediteerimised ja auhinnad Karjäär
Võtke ühendust

Üldtelefon:
+3726223399
Müük:
+3726223360

Tehniline abi +372 622 33 90

Võtke ühendust

Jälgi meid

Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited

Kuidas saada ühendust
Helistage meile

372 622 33 99

Kirjutage meile

Saatke meile oma küsimus