Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • AI in Policing, how technology is helping to keep us safe Your children’s toys are now connected
  • Big Data
    • AI will enable doctors to spend more time with their patients 5 medical uses of Virtual Reality
  • Cybersecurity
    • Cyber Security Weekly Briefing, 31 December – 6 January #CyberSecurityPulse: The Boom of JavaScript Miners
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Diego Samuel Espitia

Electronic Engineer, Network Security Specialist, HEC, ISO27000 Auditor, RHCT. Chief Security Ambassador - CSA of ElevenPaths in Colombia.



PackageDNA
Diego Samuel Espitia

PackageDNA Our Development Package Analysis Framework That Made Its Debut at Blackhat

After several months of research and development, during the BlackHat USA 2021 Arsenal event, you saw our deep analysis tool for development packages called PackageDNA, in the talk “Scanning...
industrial cyber criminals
Diego Samuel Espitia

Are industrial control systems the new criminal target?

A few days ago we published the cyber security report of the first half of the year, where you can find a special chapter about the threats in the...
blog-cybersecurity-tech
Diego Samuel Espitia

New Threat, Old Techniques

For some years now, the techniques used by malware developers have focused on evading detection mechanisms, finding that obfuscated macros and the use of Windows proprietary tools are an...
Fireless Malware
Diego Samuel Espitia

Fileless Malware: A Growing but Controllable Attack

For some years now, WatchGuard has been generating a report on the security situation detected on the Internet. Following the acquisition of Panda, this report has become even more...
Detecting the Indicators of An Attack
Diego Samuel Espitia

Detecting the Indicators of An Attack

We always choose to implement prevention and deterrence rather than containment mechanisms in security. However, the implementation of these mechanisms is not always effective or simple to set up...
Using Development Libraries to Deploy Malware
Diego Samuel Espitia

Using Development Libraries to Deploy Malware

Cybercriminals seek strategies to achieve their objectives: in some cases, it is users’ information; in others, connections; sometimes they generate networks of computers under their control (botnets), etc. Any...
When Preventing a Cyberattack Becomes a Vital Decision
Diego Samuel Espitia

When Preventing a Cyberattack Becomes a Vital Decision

In recent years, the number of incidents in critical infrastructure networks and industrial systems has increased significantly. There have been attacks with a high degree of complexity and knowledge...
How to Protect Yourself from Pandemic Cyberattacks Using Free Tools
Diego Samuel Espitia

How to Protect Yourself from Pandemic Cyberattacks Using Free Tools

Find out which free tools you can use to protect your computer from common cyberthreats and how to configure them correctly.
Business Continuity Plan: From Paper to Action
Diego Samuel Espitia

Business Continuity Plan: From Paper to Action

How many Business Continuity Plans considered a global pandemic among the possible causes of business blockage?
TypoSquatting: Using Your Brain to Trick You
Diego Samuel Espitia

TypoSquatting: Using Your Brain to Trick You

Our brain capacity is outstanding but it also creates some cybersecurity risks. Discover why in this post.

Navegación de entradas

Volver a portada
1 2
  • Telefónica Tech

Popular

Florence Broderick
ElevenPaths announced its new strategic alliances in the third Security Day
In the third Security Day the new alliance with Fortinet and ElevenPaths’s new product integrations with Check Point and Spamina solutions to evolve their technologies were presented. Madrid, 26th May....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to use Metashield protector for Client and why using it
Metashield is an Eleven Paths product that allows to clean up metadata from most of office documents. It tries to cover a gap where there seems not to exist any...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration