Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
  • LUCA
  • ElevenPaths
  • IoT
    • How to know how smart a Smart City is GSMA IoT Security Champion: Award to our IoT Security team
  • Big Data
    • How to learn Python: the most important skill for employers The 7 priorities of a company when adopting Blockchain
  • Cybersecurity
    • 4 Tips to Secure Your Data The Confirmation Bias: we seek the information that confirms our decisions, refusing their opposed evidences
Think Big / Business
  • Big Data & AI
    • Olivia Brookhouse

      How to learn Python: the most important skill for employers

      The application of Artificial Intelligence to optimize Big Data and provide Data Insights is becoming a necessity to all business processes, therefore programmers are in hot demand. Designing effective...
      LUCA

      The 7 priorities of a company when adopting Blockchain

      Last week I shared with the 101Blockchainscommunity of professionals and digital innovators the Blockchain vision we have at Telefónica and how companies can create value by adopting this technology. If...
    • Artificial Intelligence
      • Big Data & AI Tutorials
      • Aura, our AI
      • AI for all
      • AI & Big Data Applications
      • LUCA Events
    • Data Stories
      • LUCA Case Studies
      • LUCA Proofs of concept
  • IoT
    • Beatriz Sanz Baños

      How to know how smart a Smart City is

      Forbes illustrates the clear cut contrast bigger cities face. On one hand, cities are responsible for generating 80% of the world’s wealth but compared to other geographical spaces they...
      ElevenPaths

      GSMA IoT Security Champion: Award to our IoT Security team

      We have a lot to be happy about! Our IoT Security team, dedicated to cybersecurity specialized in the increasingly relevant world of the Internet of Things, has received a...
    • Personal
      • Everyday life
      • Mobility
  • Cybersecurity
    • 4 Tips to Secure Your Data
      ElevenPaths

      4 Tips to Secure Your Data

      We surf the Internet on a daily basis. Many of us are already considered digital natives. Yes, it is almost an extension of us, but are we really aware...
      ElevenPaths

      The Confirmation Bias: we seek the information that confirms our decisions, refusing their opposed evidences

      Imagine yourself in a lab over an experiment. You’re asked to analyze the following number sequence: 2, 4, 6 This sequence follows a rule. What do you think the rule is?...
    • Companies
      • ElevenPaths Team
      • Partners ElevenPaths
      • Reports
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Cybersecurity Trends

26 Reasons Why Chrome Does Not Trust the Spanish CA Camerfirma
Sergio De Los Santos

26 Reasons Why Chrome Does Not Trust the Spanish CA Camerfirma

From the imminent version 90, Chrome will show a certificate error when a user tries to access any website with a certificate signed by Camerfirma. Perhaps it is not...
Nonces, Salts, Paddings and Other Random Herbs for Cryptographic Salad Dressing
Gonzalo Álvarez Marañón

Nonces, Salts, Paddings and Other Random Herbs for Cryptographic Salad Dressing

The chronicles of the kings of Norway has it that King Olaf Haraldsson the Saint disputed the possession of the Hísing island with his neighbour the King of Sweden....
Rock, Paper, Scissors and Other Ways to Commit Now and Reveal Later
Gonzalo Álvarez Marañón

Rock, Paper, Scissors and Other Ways to Commit Now and Reveal Later

Have you ever played rock, paper, scissors? I bet you have. Well, let’s put the tin lid on it: how would you play through the phone? One thing is...
How Traditional CA's Are Losing Control of Certificates and Possible Reasons Why Chrome Will Have a New Root Store
Sergio De Los Santos

How Traditional CA’s Are Losing Control of Certificates and Possible Reasons Why Chrome Will Have a New Root Store

It’s all about trust. This phrase is valid in any field. Money, for example, is nothing more than a transfer of trust, because obviously we trust that for a...
Approaching Cybersecurity in Industry 4.0: The Age of Connected Machines
Gabriel Álvarez Corrada

Approaching Cybersecurity in Industry 4.0: The Age of Connected Machines

Don’t run away yet! This era is not about machines enslaving humanity (at least, not yet…) but about the introduction of elements (IOT devices, cloud environments, IA, Big Data, SIEM,...
Steps to move security solutions forward in the face of current world challenges
Alejandro Maroto

Steps to move security solutions forward in the face of current world challenges

Palo Alto Networks founder Nir Zuk recently addressed the Telefónica Global Security Summit with some thoughts to share on the direction of security and implications of the COVID-19 pandemic....
Redefining Cloud Security with SASE
Samuel Bonete

Redefining Cloud Security with SASE

Stop for a moment and think: what percentage of your Internet traffic ends up on websites or traditional browsing and what proportion on SaaS services? If we analyse it...
How to Track COVID-19 Infections, Discover Contacts On WhatsApp or Share Your Genes While Keeping Your Privacy
Gonzalo Álvarez Marañón

How to Track COVID-19 Infections, Discover Contacts On WhatsApp or Share Your Genes While Keeping Your Privacy

When you sign up for a new social network, such as WhatsApp, you are often asked if you want to find out who among your contacts is already part...
University and Industry: Talent Is Out There (III)
Innovation and Laboratory Area in ElevenPaths

University and Industry: Talent Is Out There (III)

Discover the two projects of the 3rd edition of the Master's Degree in Cybersecurity from the UCAM in collaboration with Telefónica.
Security and Privacy on the "Internet of Health”
Carlos Ávila

Security and Privacy on the “Internet of Health”

Health comes first, but first we must ensure that our medical data have the appropriate security mechanisms to be reliable.

Navegación de entradas

Volver a portada
1 2 3
More articles
  • ElevenPaths
  • LUCA
  • IoT

Popular

Detecting the Indicators of An Attack
Diego Samuel Espitia
Detecting the Indicators of An Attack
We always choose to implement prevention and deterrence rather than containment mechanisms in security. However, the implementation of these mechanisms is not always effective or simple to set up...
4 Tips to Secure Your Data
ElevenPaths
4 Tips to Secure Your Data
We surf the Internet on a daily basis. Many of us are already considered digital natives. Yes, it is almost an extension of us, but are we really aware...
#CyberSecurityReport20H2: Microsoft Corrects Many More Vulnerabilities, But Discovers Far Fewer
Innovation and Laboratory Area in ElevenPaths
#CyberSecurityReport20H2: Microsoft Corrects Many More Vulnerabilities, But Discovers Far Fewer
There are many reports on security trends and summaries, but at ElevenPaths we want to make a difference. From the Innovation and Laboratory team, we have just launched our...
Laboratory Information Management System (LIMS) and Its Mobile Applications
Carlos Ávila
Laboratory Information Management System (LIMS) and its Mobile Applications
For scientists and researchers, optimising time in a laboratory nowadays plays a key role in processing and delivering results. There are applications that have specialised capabilities for R&D laboratories,...
Olivia Brookhouse
Can Artificial Intelligence understand emotions?
When John McCarthy and Marvin Minsky founded Artificial Intelligence in 1956, they were amazed how a machine could perform incredibly difficult puzzles quicker than humans. However, it turns out...
  • IoT
  • LUCA
  • ElevenPaths
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility