Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Your children’s toys are now connected Worker’s Diary IoT III
  • Big Data
    • More countries focus on Artificial Intelligence LUCA’s MWC 2017 Roundup
  • Cybersecurity
    • #CyberSecurityPulse: The Boom of JavaScript Miners New tools: Metashield Bots, analyzing and cleaning metadata for everyone, from everywhere
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Diego Samuel Espitia

Electronic Engineer, Network Security Specialist, HEC, ISO27000 Auditor, RHCT. Chief Security Ambassador - CSA of ElevenPaths in Colombia.



Diego Samuel Espitia

Cybersecurity in OT: a need with differences

Cyber incidents in industrial environments have been increasing significantly since 2010, but it is undoubtedly in the 2020s that these incidents have affected the general population or made the...
Photo: Adem Ay / Unsplash
Diego Samuel Espitia

How to protect your social media accounts

Companies and individuals use social networks today to generate new revenue or to sell their services and products, much more than just to communicate with other people or to...
Photo: Lenny Kuhne / Unsplash
Diego Samuel Espitia

Wireless attacks on OT

Wireless networks are now present in all types of industries. It is undoubtedly one of the most notable changes brought about by smart industry because it has increased productivity...
Photo: This is Engineering RAEng / Unsplash
Diego Samuel Espitia

What are operational technology (OT) security “Patch Tuesdays”?

In the cybersecurity world we are used to the release of packages that fix vulnerabilities detected in business software. One of the releases that has established a periodicity and...
Photo: ThisIsEngineering / Unsplash
Diego Samuel Espitia

Vulnerabilities, threats and cyber-attacks on industrial systems

Cybercriminals have increasingly targeted industrial environments
Woman working on a computer. Photo: Unsplash
Diego Samuel Espitia

Where is your company on the cybersecurity journey?

Although the cybersecurity path is not linear and each company has its own characteristics, experience has allowed us to classify companies into five levels of cybersecurity evolution. The existence of...
Diego Samuel Espitia

A practical approach to integrating MITRE’s ATT&CK and D3FEND

Businesses have become aware of the need to have mechanisms in place to ensure the protection of their information and how important it is to understand their weaknesses in...
TCP/IP
Diego Samuel Espitia

TCP/IP Stack Gruyere

In May 2020 during the most complicated phase of the global pandemic, we were told that the internet was broken as a result of bugs (called Ripple20) affecting millions...
Diego Samuel Espitia

Facebook affected by compromise of JavaScript development packages

Programming languages such as Python and JavaScript, which in 2021 are competing for the top spot according to programmer ratings, are found in the services that we find on...
Cyber Security
Diego Samuel Espitia

If you own any Apple devices, run to update them

On September 13, Apple surprised its users with a system update on iPhone, iWatch, iPad and macOS, something that doesn’t happen very often and less often comes with an...

Navegación de entradas

Volver a portada
1 2
More articles
  • Telefónica Tech

Popular

ElevenPaths
A Technical Analysis of the Cobalt phases, a nightmare for a bank’s internal network
A few days ago, a key member from a group of attackers known as Cobalt/Carbanak (or even FIN7 for some of them) was arrested in Alicante. This group has...
ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration