Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Your children’s toys are now connected IoT and Big Data, essential technologies for Rugby Union
  • Big Data
    • Datacloud Europe is nearly here! Big Data – Driving the Future of the Automobile Industry
  • Cybersecurity
    • Introducing the New ElevenPaths Chief Security Envoys (CSEs) for 2020 Cyber Security Weekly Briefing, 21–27 May
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Susana Alwasity

Criminologist and Cyber Threat Intelligence analyst in the Digital Risk Protection team at Telefónica Tech. Experienced in security analysis for strategic sectors and detection of cyber threats in a digitally globalised world. Specialised in international security, OSINT and Cyber-HUMINT research. Interested in the world of digital privacy, geopolitics and cyber intelligence outreach.



Susana Alwasity

Cybersecurity: “black swan“ events in a connected world

In today’s society, technology has transformed the way we live, work and interact. A greater risk of cyber threats has arisen with the increased use of internet-connected devices and...
The risks of not having controlled exposure to information (III)
Susana Alwasity

The risks of not having controlled exposure to information (III)

Finally comes the last and long-awaited post in this series on the risks of uncontrolled information overexposure. As we saw in the previous post, we know how to minimise...
The risks of not having controlled exposure to information
Susana Alwasity

The risks of not having controlled exposure to information (I)

Welcome to the digital era. This is an era in which we embrace technology, with what it offers us in almost every sphere of our lives. From carrying a...
The risks of not having controlled exposure to information (II)
Susana Alwasity

The risks of not having controlled exposure to information (II)

As promised last week in the first post of this series, this time we will talk about how to minimise the risks of our digital footprint. ¿ How to minimise...

Navegación de entradas

Volver a portada
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
ElevenPaths
How to cause a DoS in Windows 8 explorer.exe
We have discovered by accident how to cause a Denial of Service (DoS) in Windows 8. It’s a little bug that is present in the last version of the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration