Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • IoT to save the environment The potential of IoT devices in education
  • Big Data
    • Data Transparency Lab looks for new projects on privacy and data transparency Big Data Week 2016: Forget Big Data, Artificial Intelligence is the new kid on the block
  • Cybersecurity
    • IoT Device Search Engines: Why Choose if We Can Use All of Them? The risks of not having controlled exposure to information (I)
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Cybersecurity

University and Industry: Talent Is Out There (III)
Innovation and Laboratory Area in ElevenPaths

University and Industry: Talent Is Out There (III)

Discover the two projects of the 3rd edition of the Master's Degree in Cybersecurity from the UCAM in collaboration with Telefónica.
Security and Privacy on the "Internet of Health”
Carlos Ávila

Security and Privacy on the “Internet of Health”

Health comes first, but first we must ensure that our medical data have the appropriate security mechanisms to be reliable.
Challenges and Business Opportunities of Post Quantum Cryptography
Gonzalo Álvarez Marañón

Challenges and Business Opportunities of Post Quantum Cryptography

Sooner or later we'll have to make the leap to post-quantum cryptography. Discover this new system and prepare your organization for change.
Cybersecurity Weekly Briefing July 11-17
ElevenPaths

Cybersecurity Weekly Briefing July 11-17

Combining Citrix vulnerabilities to steal user sessions On July 7th, Citrix published a security bulletin to correct up to 11 vulnerabilities. A few days later, a report was released with...
Securing your Cloud Native Applications in AWS in the New Normal
Pablo Alarcón Padellano

Securing your Cloud Native Applications in AWS in the New Normal

The New Cloud Adoption Reality Yes, we are facing a New Normal, and we are living a new cloud adoption reality as well. Enterprise cloud adoption accelerates in face of...
New ElevenPaths DoH Server (Beta) That Filters Out Malicious Domains
Innovation and Laboratory Area in ElevenPaths

New ElevenPaths DoH Server (Beta) That Filters Out Malicious Domains

Discover the DoH server that filters out malicious domains in your browser thanks to our intelligence system.
Cybersecurity Weekly Briefing July 4-10
ElevenPaths

Cybersecurity Weekly Briefing July 4-10

RCE Vulnerability in F5’s BIG-IP (CVE-2020-5902) Last Wednesday a new critical Remote Code Execution vulnerability (CVE-2020-5902 CVSSv3 10)  was published for F5’s Traffic Management User Interface (TMUI). This vulnerability allows...
How to Protect Yourself from Pandemic Cyberattacks Using Free Tools
Diego Samuel Espitia

How to Protect Yourself from Pandemic Cyberattacks Using Free Tools

Find out which free tools you can use to protect your computer from common cyberthreats and how to configure them correctly.
ElevenPaths Radio English #1 - Skills of a Cybersecurity Professional
ElevenPaths

ElevenPaths Radio English #1 – Skills of a Cybersecurity Professional

In this first episode, our CSA Deepak Daswani discusses what a true cybersecurity professional must have to be valuable to companies.
Adversarial Attacks: The Enemy of Artificial Intelligence
Franco Piergallini Guida

Adversarial Attacks: The Enemy of Artificial Intelligence

What happens when the data used by artificial intelligence to predict behaviour is manipulated? Is this an attack vector?

Navegación de entradas

Previous articles
1 … 37 38 39 … 55
More articles
  • Telefónica Tech

Popular

Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Florence Broderick
HookMe, a tool for intercepting communications with API hooking
HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration