María Teresa Nieto Galán Digital Identity, Privacy and Blockchain —Can They All Be In The Same Equation? We are becoming increasingly aware of how our data is circulating on the net. In fact, we have all probably had that feeling that, after looking at a pair...
Alexandre Maravilla Web3 and the evolution of Internet Identity The recent rise of Web3; the new evolution of the Internet to make it decentralised through Blockchain, is also bringing a lot of talk about decentralised identity schemes and...
Alexandre Maravilla Digital Identity Wallets against identity theft fraud Identity theft or impersonation is a type of fraud in which criminals manage to supplant the identity of the person being deceived, based on the theft of their personal...
Alexandre Maravilla Europe’s new digital identity; sovereign identity wallets Have you ever stopped to think about how many user accounts we have on the Internet? Bank accounts, utility providers, Social Networks, email, e-commerce, … Nowadays we handle an...
Jorge Ordovás Blockchain Expectations and Realities From 2017 To 2021 And Beyond It has been several years since 2017 when Gartner first included Blockchain at the top of its “Hype Cycle” of emerging technologies. Back then he estimated that it would...
Telefónica Tech Blockchain News: Everything You Need to Know About One of The Technologies of The Future There is no doubt that Blockchain technology is one of the most popular technologies of recent times. In many blogs, forums, social networks and even in general media news,...
José Luis Núñez Díaz Alastria 3.0: the spanish blockchain consortium On the June 1st, the Annual Assembly of Alastria, the Spanish Blockchain consortium, was held. Today we are already more than 500 members: companies of all sizes, profiles and...
Gonzalo Álvarez Marañón Challenges and Business Opportunities of Post Quantum Cryptography Sooner or later we'll have to make the leap to post-quantum cryptography. Discover this new system and prepare your organization for change.
Félix Brezo Fernández XVI STIC Conference: 5 trends in Cyber Security highlighted by our analysts for 2023 The CCN-CERT STIC Conference has been a classic security event at the end of the year for more than a decade. Held between 29 November and 1 December 2022...
Gonzalo Fernández Rodríguez What is a Cloud-Native Application? The term Cloud Native is something that goes beyond moving applications on-premises, i.e. hosted directly in a data centre to an infrastructure from a Cloud provider, whether public or...
Alberto García García-Castro Incentives in business blockchain networks: a new approach It has always been a fundamental part of the technology to use incentives that reward collaboration and good practices among participants in a blockchain network. So much so that...
New Markets Team Human Factors in Cybersecurity: Protect Yourself Download the last report from Telefónica Tech Cyber & Cloud New Markets Team aimed at fighting disinformation and raising awareness about Cybersecurity
Roberto García Esteban Cloud market trends until 2025 All of us who work in Cloud services are aware that this market is still in a phase of accelerated growth and that more and more companies are taking...
Javier Coronado Blazquez Endless worlds, realistic worlds: procedural generation and artificial intelligence in video games The video game No Man's Sky creates entirely visitable and different galaxies and planets at full-scale using a simple algorithm. How does it do it?