Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • GSMA IoT Security Champion: Award to our IoT Security team The benefits of energy efficiency: Much more than savings
  • Big Data
    • 4 times Big Data invaded the world of Fashion Big Data joins the fight against cancer
  • Cybersecurity
    • Mathematics against cyber-crime: how to detect fraud, manipulation and cyber-attacks using Benford’s Law Cyber Security Weekly Briefing 11-17 September
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Martiniano Mallavibarrena

Former Global Head Incident Response and Threat Hunting at TCCT. Telecommunications Degree from EUITT & Master's Degree in IT management (IDE-CESEM) and in Criminal Analysis and Investigation (UDIMA). More than 30 years of experience in multinationals in the ICT sector.



Travelers waiting at the airport to onboard
Martiniano Mallavibarrena

‘Insiders’ in Cybersecurity: “Catch me if you can”

Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
Martiniano Mallavibarrena

Cybersecurity in films: myth vs. reality with 10 examples

The multiple aspects of cybersecurity (attacks, investigations, defence, disloyal employees, negligence, etc.) have been part of the plot of countless movies and TV series for years. In today’s society,...
ransomware
Martiniano Mallavibarrena

Understanding The Dynamics of Ransomware Security Incidents

The ransomware phenomenon If there is one term that has earned its way to the top of the headlines in the media over the last two years, ransomware is undoubtedly...
Martiniano Mallavibarrena

Attention: Data leak! (In search of lost data)

We have been hearing about “data leaks” on a regular basis for years, both in the media and in our professional or even personal environment. The concept actually covers...
shopping " securely " on the Internet
Martiniano Mallavibarrena

Are we really shopping ” securely ” on the Internet?

Once Black Friday, Singles’ Day (if you have Chinese roots or any kind of relationship to it) and Christmas are over, I’m sure the vast majority of us have...
Black Friday Social
Martiniano Mallavibarrena

Technology and social psychology applied to Internet consumption: The ” Black Friday” case

No one will be surprised if we suggest that social networks and other large Internet platforms base their business model on advertising and that all of them, in some...
The New Digital Workforce and The Risks Around Robotics Process Automation (RPA)
Martiniano Mallavibarrena

The New Digital Workforce and The Risks Around Robotics Process Automation (RPA)

In recent years, many companies in different sectors have chosen to base their digital transformation on RPA – Robot Process Automation, which has facilitated the creation of hundreds of...

Navegación de entradas

Volver a portada
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration