Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Take control of your vehicles with Fleet Optimise What connected intelligence can do in your home
  • Big Data
    • Telco Data Analytics: what’s next in Big Data for Telcos Weve launches Weve Locate – Location verification technology
  • Cybersecurity
    • Business Continuity Plan: From Paper to Action Cyber Security Weekly Briefing, 15 – 19 May

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • ElevenPaths

      The Intelligent MSSP

      During years, Managed Security Services (MSS) have been the most effective strategy to tackle the increasing and changing threat landscape. Otherwise, some disruptive factors are compelling a new approach...
      Cyber Security Weekly Briefing April 24-30 2021
      ElevenPaths

      Cyber Security Weekly Briefing April 24-30

      BadAlloc – Critical Vulnerabilities in Industrial IoT and OT Devices Microsoft security researchers have discovered 25 critical remote code execution (RCE) vulnerabilities, collectively referred to as BadAlloc, affecting a wide...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Indicators of Compromise, Key to Detecting and Solving Incidents in an Agile Way
      Cytomic Team, unit of Panda Security

      Indicators of Compromise, Key to Detecting and Solving Incidents in an Agile Way

      Quick and agile response to incidents is a basic aspect of a good cybersecurity strategy. Little by little, more and more companies are becoming aware of this, and this...
      ElevenPaths

      #CyberSecurityPulse: Guess Riddle… How Is Information Stored In a Bitcoin Address?

      As we have seen in previous post on ElevenPaths blog, the OP_RETURN field of a Bitcoin transaction is used to store a small portion of information (up to 80...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Are You Crypto-Agile to Respond Quickly to Changing Cyberthreats?
      Gonzalo Álvarez Marañón

      Are You Crypto-Agile to Respond Quickly to Changing Cyberthreats?

      A business is considered agile if it is able to respond quickly to market changes, adapt to maintain stability. However, without cryptography there is no security and without security...
      TypoSquatting: Using Your Brain to Trick You
      Diego Samuel Espitia

      TypoSquatting: Using Your Brain to Trick You

      Our brain capacity is outstanding but it also creates some cybersecurity risks. Discover why in this post.
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Photo: Matthew Henry / Unsplash
Telefónica Tech

How does a hybrid cloud work?

When it comes to digitalisation and starting the “journey” to the cloud, most companies choose multi-cloud solutions or hybrid clouds as the main technology for safeguarding their databases and...
Telefónica Tech

Cyber Security Weekly Briefing, 18 – 25 November

Exploit for ProxyNotShell vulnerabilities published The first publications about new critical vulnerabilities in Microsoft Exchange Server, CVE-2022-41040 and CVE-2022-41082, which were named ProxyNotShell, were published at the end of September. However,...
Telefónica Tech

Cyber Security Weekly Briefing, 11 – 18 November

Security updates for 35 Cisco vulnerabilities Cisco has released a security update that addresses 35 vulnerabilities in Cisco Adaptive Security Appliance (ASA), Firepower Threat Defense (FTD) and Firepower Management Center...
José Pedro Gómez

A matter of trust: The need for governance and control of a project

Why do I need management figures for the governance of my project? Back in the 13th century, a philosopher once said that an arrow has all the power in itself...
Photo: Berkeley Communications / Unsplash
César Cañada Alonso

Zero trust, a trend in the cyber security environment

Nowadays, the attack surface is larger than before, as there are now more applications, servers, users, etc. in companies. For this reason, it is necessary to limit access, granting...
Photo: Anthony Riera / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 5 – 11 November

Robin Banks Phishing Platform Reactivated Researchers at IronNet have published the second part of their investigation into the Robin Banks phishing-as-a-service platform. The platform was discovered in June this year...
Daniel Sandmeier

Disinformation and fake news: what initiatives do exist to combat them?

The phenomenon of disinformation has been causing concern in European societies, including Spain, for several years now. The I Study on disinformation in Spanish society reveals revealing data such...
Telefónica Tech

Cyber Security Weekly Briefing, 28 October – 4 November

Vulnerabilities fixed in new OpenSSL version  The new 3.0.7 version of OpenSSL, announced last week by the developers of the project, was made public this past Wednesday. The expectation around this...
Martiniano Mallavibarrena

Attention: Data leak! (In search of lost data)

We have been hearing about “data leaks” on a regular basis for years, both in the media and in our professional or even personal environment. The concept actually covers...
Photo: Jenny Ueberberg / Unsplash
Mark Skelton

The Formula for Successful Hybrid Working

Optimising cloud-based technologies and enabling a seamless blend between remote and office work will be the key to hybrid working success. To achieve this, any effective hybrid working formula...

Navegación de entradas

Previous articles
1 … 8 9 10 … 64
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
Eleven Paths Talks: WordPress in Paranoid Mode
  ¡Regístrate aquí!   El próximo Jueves 30 de Junio nuestro compañero Pablo González impartirá una charla en la que se verá una prueba de concepto realizada en Eleven Paths. Pablo está en...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration