AI of Things Cycling in the city? Analysing Cyclist Safety in Madrid with Excel Written by Paloma Recuerdo, original post in Spanish In this post we will see an example of how we can perform simple descriptive analytics on a set of data, without...
AI of Things How much do London firefighters spend on saving helpless kittens? The Open Data answers Original post in Spanish by Paloma Recuerdo In this second post, a continuation of “Smart Cities: Squeezing Open Data with Power BI”, we will analyse the problem and understand the measures...
AI of Things Smart Cities: Pushing Open Data with Power BI In this article, which will consist of two posts, we will talk about Smart Cities and how they can use their data to be more “smart.” We will work...
Florence Broderick Quick and dirty shellcode to binary python script https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
José Luis Núñez Díaz Towards a smarter supply chain One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths Mum, I want to be a hacker The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick ElevenPaths Talks: The ISF Standard of Good Practice for Information Security REGISTER HERE! On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick Mobile Connect winner of the 'Connected Life Awards' Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....