We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.
I accept2025-08-04Küberturvalisus
Our latest blog explores the enterprise data security and compliance risks associated with AI implementation, including sensitive data leaks, prompt injection attacks, and the gener…
2025-08-04
Küberturvalisus
Our latest blog explores the enterprise data security and compliance risks associated with AI implementation, including sensitive data leaks, prompt injection attacks, and the gener…
2025-07-18
KüberturvalisusSASESD-WAN
Network security services and solutions are essential for safeguarding sensitive data, maintaining operational continuity, and ensuring regulatory compliance.
2025-06-18
TehisintellektKüberturvalisus
We have made a significant impact at this year’s Tech Fest Summit, exploring the future of cybersecurity and AI with global tech leaders. Our Digital Strategy Officer (Information …
2025-03-17
TehisintellektKüberturvalisus
GenAI empowers industries. Ensuring security and compliance, and ethical use of AI-generated content is critical. CITIC Telecom CPC's AI Guardrail enables real-time monitoring and m…
2025-02-28
TehisintellektÜhendusedKüberturvalisus
This article explores how generative AI leverages deep learning technologies to improve SASE performance, ensure data security, and actualize digital transformation.
2025-02-21
TehisintellektKüberturvalisus
This article explores how CITIC Telecom CPC leverages generative AI technologies like DeepSeek to strengthen SOC capabilities, enabling enterprises to swiftly respond to increasingl…
2025-01-24
TehisintellektKüberturvalisus
AI Pentest strengthens AI security, bridges traditional testing gaps, and fulfills industry needs, empowering enterprises to enhance defenses and protect data.
2025-01-17
TehisintellektKüberturvalisusSündmuse tipphetked
The last "AI Red/Blue Gamification Experience" in 2024 has successfully concluded! IT leaders and cybersecurity experts from different industries participated in an immersive gamifi…
2024-12-20
PilvKüberturvalisus
This article will explore a series of ICT solutions, including high-quality cloud services, security measures for safeguarding cloud assets, and a series of cybersecurity solutions.…
2024-10-25
Küberturvalisus
Vulnerability management involves a continuous process of vulnerability identification, analysis, reporting and remediation. Learn how vulnerability analysis and response benefit en…
2024-09-09
MajutuskeskusKüberturvalisus
We were honored to invite WTIA and its members to participate in our “Exploring CITIC Telecom CPC DataHOUSE™ Cloud Data Center" event. At this event, participants had the privileg…
2024-08-20
Küberturvalisus
Attack simulation is a process of testing cybersecurity by simulating real-world threats in a controlled environment. Learn how attack simulation identifies vulnerabilities and bols…
Üldtelefon:
+3726223399
Müük:
+3726223360
Tehniline abi +372 622 33 90
Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited












