Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The increasing importance of Big Data in eCommerce Energy efficiency switches to the Smart side
  • Big Data
    • Responsible data usage for effective advertising Blockchain technology
  • Cybersecurity
    • Name the malware you have, and I’ll tell you which botnet you belong to The new end of passwords
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Diego Samuel Espitia

Electronic Engineer, Network Security Specialist, HEC, ISO27000 Auditor, RHCT. Chief Security Ambassador - CSA of ElevenPaths in Colombia.



Diego Samuel Espitia

Cybersecurity in OT: a need with differences

Cyber incidents in industrial environments have been increasing significantly since 2010, but it is undoubtedly in the 2020s that these incidents have affected the general population or made the...
Photo: Adem Ay / Unsplash
Diego Samuel Espitia

How to protect your social media accounts

Companies and individuals use social networks today to generate new revenue or to sell their services and products, much more than just to communicate with other people or to...
Photo: Lenny Kuhne / Unsplash
Diego Samuel Espitia

Wireless attacks on OT

Wireless networks are now present in all types of industries. It is undoubtedly one of the most notable changes brought about by smart industry because it has increased productivity...
Photo: This is Engineering RAEng / Unsplash
Diego Samuel Espitia

What are operational technology (OT) security “Patch Tuesdays”?

In the cybersecurity world we are used to the release of packages that fix vulnerabilities detected in business software. One of the releases that has established a periodicity and...
Photo: ThisIsEngineering / Unsplash
Diego Samuel Espitia

Vulnerabilities, threats and cyber-attacks on industrial systems

Cybercriminals have increasingly targeted industrial environments
Woman working on a computer. Photo: Unsplash
Diego Samuel Espitia

Where is your company on the cybersecurity journey?

Although the cybersecurity path is not linear and each company has its own characteristics, experience has allowed us to classify companies into five levels of cybersecurity evolution. The existence of...
Diego Samuel Espitia

A practical approach to integrating MITRE’s ATT&CK and D3FEND

Businesses have become aware of the need to have mechanisms in place to ensure the protection of their information and how important it is to understand their weaknesses in...
TCP/IP
Diego Samuel Espitia

TCP/IP Stack Gruyere

In May 2020 during the most complicated phase of the global pandemic, we were told that the internet was broken as a result of bugs (called Ripple20) affecting millions...
Diego Samuel Espitia

Facebook affected by compromise of JavaScript development packages

Programming languages such as Python and JavaScript, which in 2021 are competing for the top spot according to programmer ratings, are found in the services that we find on...
Cyber Security
Diego Samuel Espitia

If you own any Apple devices, run to update them

On September 13, Apple surprised its users with a system update on iPhone, iWatch, iPad and macOS, something that doesn’t happen very often and less often comes with an...

Navegación de entradas

Volver a portada
1 2
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration