We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.
I accept2025-08-04Cybersecurity
Our latest blog explores the enterprise data security and compliance risks associated with AI implementation, including sensitive data leaks, prompt injection attacks, and the gener…
2025-08-04
Cybersecurity
Our latest blog explores the enterprise data security and compliance risks associated with AI implementation, including sensitive data leaks, prompt injection attacks, and the gener…
2025-07-18
CybersecuritySASESD-WAN
Network security services and solutions are essential for safeguarding sensitive data, maintaining operational continuity, and ensuring regulatory compliance.
2025-06-18
AICybersecurity
We have made a significant impact at this year’s Tech Fest Summit, exploring the future of cybersecurity and AI with global tech leaders. Our Digital Strategy Officer (Information …
2025-03-17
AICybersecurity
GenAI empowers industries. Ensuring security and compliance, and ethical use of AI-generated content is critical. CITIC Telecom CPC's AI Guardrail enables real-time monitoring and m…
2025-02-28
AINetworkCybersecurity
This article explores how generative AI leverages deep learning technologies to improve SASE performance, ensure data security, and actualize digital transformation.
2025-02-21
AICybersecurity
This article explores how CITIC Telecom CPC leverages generative AI technologies like DeepSeek to strengthen SOC capabilities, enabling enterprises to swiftly respond to increasingl…
2025-01-24
AICybersecurity
AI Pentest strengthens AI security, bridges traditional testing gaps, and fulfills industry needs, empowering enterprises to enhance defenses and protect data.
2025-01-17
AICybersecurityEvent Highlights
The last "AI Red/Blue Gamification Experience" in 2024 has successfully concluded! IT leaders and cybersecurity experts from different industries participated in an immersive gamifi…
2024-12-20
CloudCybersecurity
This article will explore a series of ICT solutions, including high-quality cloud services, security measures for safeguarding cloud assets, and a series of cybersecurity solutions.…
2024-10-25
Cybersecurity
Vulnerability management involves a continuous process of vulnerability identification, analysis, reporting and remediation. Learn how vulnerability analysis and response benefit en…
2024-09-09
Data CenterCybersecurity
We were honored to invite WTIA and its members to participate in our “Exploring CITIC Telecom CPC DataHOUSE™ Cloud Data Center" event. At this event, participants had the privileg…
2024-08-20
Cybersecurity
Attack simulation is a process of testing cybersecurity by simulating real-world threats in a controlled environment. Learn how attack simulation identifies vulnerabilities and bols…
General Enquiry / Sales Hotline +60 3 2280 1500
Service Hotline +60 03 2280 1488
Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited












