We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.
I accept2025-08-04Cybersecurity
Our latest blog explores the enterprise data security and compliance risks associated with AI implementation, including sensitive data leaks, prompt injection attacks, and the gener…
2019-09-27
AICybersecurityDigital Transformation
No one can deny that artificial intelligence (AI) and machine learning technologies are already transforming the world of business. According to Gartner's 2019 CIO Agenda survey, or…
2019-09-20
CloudCybersecurity
Cloud computing is becoming an ideal on-demand solution when it comes to the delivery of enterprise infrastructure, software and platforms...
2019-09-06
Cybersecurity
Internet-of-things (IoT) is growing exponentially across various industries and transforming our daily lives, such as automotive, healthcare, logistics, telecom and manufacturing.
2019-07-22
Cybersecurity
The system of Bulgaria's National Revenue Agency (NRA) was hacked. The financial data of almost all taxpayers in the country was found to be stolen by hackers. The incident becomes …
2019-07-19
AIData AnalyticsCloudNetworkData CenterCybersecurityIntelligent InnovationSD-WANDigital Transformation
In the era of globalization, new economic models continue to emerge. Smart technologies are reinforcing enterprises innovation, and digital transformation is crucial for the success…
2019-03-29
NetworkCybersecurity
Recently, companies encourage employees to bring their own devices (BYOD) to workplace, to access corporate networks, confidential documents and important data. If these devices are…
2019-03-20
Cybersecurity
The World Wide Web (WWW), the Internet Protocol (IP), and Google’s algorithms are three important inventions of the 20th century. This month is the 30th anniversary of the WWW.
2019-02-20
Cybersecurity
The Internet has become part of our daily lives. While technology brings convenience, the importance of information security cannot be ignored. In the recent release of World Econom…
2019-01-30
Cybersecurity
Do you know a National ID can be decoded with personal information?
2019-01-11
Cybersecurity
According to the statistics, each netizen currently needs to manage more than 200 account passwords and is expected to rise to more than 400 in 5 years. It is not easy to memorize a…
2018-12-03
AIData AnalyticsCybersecurity
Big data is the fuel of AI. Apart from secure big data, a scalable and reliable IT infrastructure, and man-machine collaborating processes are also the foundation of a successful AI…
2018-11-02
Cybersecurity
It is suspected that Hong Kong Airlines has a serious loophole in the e-boarding pass issued. By modifying the e-boarding pass URL, the boarding pass number and flight details of an…
General Enquiry:
+372 622 33 99
Sales Hotline:
+372 622 33 60
Service Hotline +372 622 33 90
Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited











