Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Discover the Connected Pool Bed time will never be the same
  • Big Data
    • LUCA at Big Data Spain 2016: Our Full Roundup Come and play sports with Telefonica, and take on the best!
  • Cybersecurity
    • Facebook signed one of its apps with a private key shared with other Google Play apps since 2015 Bestiary of a Poorly Managed Memory (III)
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Susana Alwasity

Criminologist and Cyber Threat Intelligence analyst in the Digital Risk Protection team at Telefónica Tech. Experienced in security analysis for strategic sectors and detection of cyber threats in a digitally globalised world. Specialised in international security, OSINT and Cyber-HUMINT research. Interested in the world of digital privacy, geopolitics and cyber intelligence outreach.



Susana Alwasity

Cybersecurity: “black swan“ events in a connected world

In today’s society, technology has transformed the way we live, work and interact. A greater risk of cyber threats has arisen with the increased use of internet-connected devices and...
The risks of not having controlled exposure to information (III)
Susana Alwasity

The risks of not having controlled exposure to information (III)

Finally comes the last and long-awaited post in this series on the risks of uncontrolled information overexposure. As we saw in the previous post, we know how to minimise...
The risks of not having controlled exposure to information
Susana Alwasity

The risks of not having controlled exposure to information (I)

Welcome to the digital era. This is an era in which we embrace technology, with what it offers us in almost every sphere of our lives. From carrying a...
The risks of not having controlled exposure to information (II)
Susana Alwasity

The risks of not having controlled exposure to information (II)

As promised last week in the first post of this series, this time we will talk about how to minimise the risks of our digital footprint. ¿ How to minimise...

Navegación de entradas

Volver a portada
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
ElevenPaths
ElevenPaths creates an addon to make Firefox compatible with Certificate Transparency
Certificate Transparency will be mandatory in Chrome for new certificates in late 2017. This means that the webpages will show an alert if protected by certificates not present in...
Florence Broderick
Now you can use Latch with Dropbox, Facebook and others digital services
Many of you have asked us which services you can use Latch with, regretting that so far it could not be used in the more common services, such as...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration