Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
  • LUCA
  • ElevenPaths
  • IoT
    • The next big battle for energy efficiency … air conditioners AI, IoT and Blockchain: surfing the third wave
  • Big Data
    • LUCA Talk 2: Big Data as a Force for Good LUCA’s Sports Analytics Week in Movistar Centre Barcelona
  • Cybersecurity
    • Rock appround the clock, our research in DEFCON Popular Docker Images under Security Scrutiny
Think Big / Business
  • Big Data & AI
    • Ana Zamora

      LUCA Talk 2: Big Data as a Force for Good

      In the world of data, we tend to focus on how Big Data technology can optimize our organizations, maximize revenues and make our organizational processes more efficient. However, there is...
      Chema Alonso (CDO Telefónica), Elena Gil (CEO LUCA) and the LUCA team in Movistar Centre Barcelona
      LUCA

      LUCA’s Sports Analytics Week in Movistar Centre Barcelona

      The Mobile World Congress took place last week in Barcelona, and drawing upon this, Movistar Centre held a dynamic activity organized by LUCA, in collaboration with Movistar Team and...
    • Artificial Intelligence
      • Big Data & AI Tutorials
      • Aura, our AI
      • AI for all
      • AI & Big Data Applications
      • LUCA Events
    • Data Stories
      • LUCA Case Studies
      • LUCA Proofs of concept
  • IoT
    • Beatriz Sanz Baños

      The next big battle for energy efficiency … air conditioners

      “The growing demand for energy from air conditioners (ACs) is one of the critical points in the debate about energy and sustainability. It is necessary to reduce their energy...
      Ismael Rihawi

      AI, IoT and Blockchain: surfing the third wave

      Back in 1980, “futurologist” Alvin Toffler published The Third Wave, a book inspired by Steve Case to express his vision of the development of the information technology paradigm in...
    • Personal
      • Everyday life
      • Mobility
  • Cybersecurity
    • ElevenPaths

      Rock appround the clock, our research in DEFCON

      In the world of Threat Intelligence, determining the attacker’s geographical location of is one of the most valuable data for attribution techniques, even if not perceived like that, this...
      Popular Docker Images under Security Scrutiny
      Juan Elosua Tomé

      Popular Docker Images under Security Scrutiny

      Discover the research carried out by our TEGRA cybersecurity centre on this technology's images used in the development of applications.
    • Companies
      • ElevenPaths Team
      • Partners ElevenPaths
      • Reports
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

ElevenPaths

We are the global Cybersecurity Company of Telefónica. We believe a safer digital world is possible. We support our customers in their digital transformation, creating disruptive innovation, providing privacy and the necessary confidence in our daily digital life.



4 Tips to Secure Your Data
ElevenPaths

4 Tips to Secure Your Data

We surf the Internet on a daily basis. Many of us are already considered digital natives. Yes, it is almost an extension of us, but are we really aware...
Cyber Security Weekly Briefing January 16-22
ElevenPaths

Cyber Security Weekly Briefing January 16-22

SolarWinds Update New details have been released about the software supply chain compromise unveiled in December. FireEye researchers have published an analysis that puts the focus on the threat actor called...
Cyber Security Weekly Briefing January 9-15
ElevenPaths

Cyber Security Weekly Briefing January 9-15

Sunburst shows code matches with Russian-associated malware Kaspersky researchers have found that the Sunburst malware used during the SolarWinds supply chain attack is consistent in its characteristics with Kazuar, a...
Cyber Security Weekly Briefing January 2-8
ElevenPaths

Cyber Security Weekly Briefing January 2-8

SolarWinds Update To end the year, Microsoft published an update of its findings regarding the impact of the SolarWinds incident on its systems. In this release, it emphasizes that neither...
Cyber Security Weekly Briefing December 12-18
ElevenPaths

Cyber Security Weekly Briefing December 12-18

Supply Chain compromise: SolarWinds Orion FireEye researchers have unveiled a major global information theft and espionage operation that takes advantage of the supply chain to gain access to the systems...
ElevenPaths Radio English #5 - The Path After a Security Audit
ElevenPaths

ElevenPaths Radio English #5 – The Path After a Security Audit

What is the path for a company after a security audit? It is increasingly common for companies of all sizes to decide to carry out such analyses, but what...
Cyber Security Weekly Briefing December 5-11
ElevenPaths

Cyber Security Weekly Briefing December 5-11

Microsoft Security Newsletter On December 8, Microsoft published its monthly security update newsletter, which this time includes patches for 58 vulnerabilities and an advisory for various Microsoft products. Nine of...
ElevenPaths

Cyber Security Weekly Briefing 28 November – 4 December

New version of the TrickBot malware TrickBot botnet operators have added a new capability that allows them to interact with the BIOS or UEFI firmware of an infected computer. This...
Cybersecurity Weekly Briefing November 21-27
ElevenPaths

Cybersecurity Weekly Briefing November 21-27

Qbot as a prelude to Egregor ransomware infections Researchers at Group-IB security company have issued a statement claiming to have found activity linking the Qbot banking trojan (also known as...
From MSS to MDR and Beyond
ElevenPaths

From MSS to MDR and Beyond

Cybersecurity continues to evolve and, at ElevenPaths, we adapt to these changes. In our view, cybersecurity today is at a crossroads. Despite increased awareness, focus and investment, many organizations...

Navegación de entradas

Volver a portada
1 2 … 14
More articles
  • ElevenPaths
  • LUCA
  • IoT

Popular

Patrick Buckley
How IoT technology is helping candy producers make sweet profits!
From chocolate bars to lollipops, gumdrops to Haribos, the confectionary industry is now worth an estimated 210$ billion worldwide. With the industry experiencing strong growth, it is no surprise...
Curiosities About Windows XP Code Leak
ElevenPaths
Curiosities About Windows XP Code Leak
A few days ago, attention was focused on Reddit, within a community that is characterised by its conspiracy theories. According to the news it consisted of filtering 43 GBs...
Olivia Brookhouse
Can Artificial Intelligence understand emotions?
When John McCarthy and Marvin Minsky founded Artificial Intelligence in 1956, they were amazed how a machine could perform incredibly difficult puzzles quicker than humans. However, it turns out...
How the "antimalware" XProtect for MacOS works and why it detects poorly and badly
ElevenPaths
How the “antimalware” XProtect for MacOS works and why it detects poorly and badly
Recently, MacOS included a signature in its integrated antivirus, intended to detect a binary for Windows; but, does this detection make sense? We could think it does, as a...
  • IoT
  • LUCA
  • ElevenPaths
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility