We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.
I accept2025-08-04Cybersecurity
Our latest blog explores the enterprise data security and compliance risks associated with AI implementation, including sensitive data leaks, prompt injection attacks, and the gener…
2023-07-11
CloudNetworkCybersecurity
Digital transformation has revolutionized business operations with multi-cloud strategy, offering enhanced business agility and efficiency. However, concerns such as resource alloca…
2023-06-30
CloudNetworkData CenterCybersecurity
In an era defined by the rapid growth of digital transformation, data has become the new currency. For numerous entities that process and manage sensitive data, especially in heavil…
2023-01-17
NetworkCustomer ExperienceData CenterCybersecurityDigital Transformation
Homogeneous and inefficient offline operations and agency means are no longer applicable to the new market and changing supervision policies, as the insurance industry is undergoing…
2022-12-12
NetworkCustomer ExperienceData CenterCybersecurityDigital Transformation
The fashion industry is entering a highway to a reshuffling and reshaping environment with the rapid development of the digital economy, the question is, how can the industry adapt …
2022-12-05
CloudNetworkData CenterEcosystemCybersecurity
Over the past few years, the challenges ahead of us have been daunting and has put the global economy to the test. For 2023, business prospects are likely to be clouded by uncertain…
2022-09-30
NetworkCybersecurity
As businesses continue to embrace a blended and flexible working model, the number of mobile devices such as smartphones and tablets connecting to enterprise assets surges tremendou…
2022-09-07
NetworkCybersecuritySASE
We will introduce the most important ZTNA concepts and best practices to protect your business applications, data and services.
2022-07-29
Cybersecurity
Phishing has long been identified as an online scam that lures victims into giving out credentials via fraudulent emails, messages or websites.
2022-07-15
CloudNetworkCustomer ExperienceData CenterCybersecuritySD-WANDigital Transformation
Having gone through multiple reviews in 2012, CITIC Pacific Special Steel opted to partner with China Entercom, to improve its focus on the core business with streamlined production…
2022-05-13
CloudNetworkData CenterCybersecurity
In face of “Eastern Data and Western Computing”, it is high time to figure out how to realize the interconnection between data centers in various locations
2022-03-25
Cybersecurity
In retrospect, phishing attacks have struck from time to time over the years. While the range of victims and tactics are evolving with the ever-changing technology landscape, it rem…
2022-03-18
CloudNetworkCustomer ExperienceData CenterCybersecurityDigital Transformation
As digitalization becomes the new normal across all industries especially during a time when staying at home is encouraged, beauty is no exception. For nearly a decade, CITIC Teleco…
General Enquiry:
+372 622 33 99
Sales Hotline:
+372 622 33 60
Service Hotline +372 622 33 90
Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited













