Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Telefónica Activation Programme: Innovate with IoT What is the difference between M2M and IoT?
  • Big Data
    • SMASSA Success Story: Intelligent Parking Services CTGBCN: Solutions from the Catalan Capital
  • Cybersecurity
    • Cyber Security Weekly Briefing 1–7 january A Trillion-Dollar on Offer to the Puzzle Solver

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Destacados: Global

José Luis Núñez Díaz

The 7 priorities of a company when adopting Blockchain

Last week I shared with the 101Blockchains community of professionals and digital innovators the Blockchain vision we have at Telefónica and how companies can create value by adopting this technology....
Telefónica Tech

Cyber Security Weekly Briefing, 15-21 October

The Noname057(16) group attacks the Spanish Ministry of Defense Last Friday, threat actor Noname057(016) carried out an attack against the website of the Spanish Ministry of Defense, rendering them unavailable...
Photo: Miguel Bruna / Unsplash
Nacho Palou

World Energy Saving Day: Efficiency to drive progress

The 21st of October is World Energy Saving Day. During the last ten years, this day has raised awareness of the impact that energy consumption has on the environment...
Juan Carlos Vigo López

Secure Digital Workplace: chronicle of a foretold (and necessary) evolution

The changes that have taken place in the Digital Workplace lately have put some technological areas under stress, as we have had to adapt to the evolutions during and...
Photo: Gorodenkoff/Shutterstock
Telefónica Tech

Selecting a managed security service provider (MSSP): 5 key factors to keep in mind

An Managed Security Service Provider (MSSP) offers you a team of seasoned security experts that will work for you at a fraction of the cost of building your security...
Roberto García Esteban

Cloud market trends until 2025

All of us who work in Cloud services are aware that this market is still in a phase of accelerated growth and that more and more companies are taking...
Image from No Man's Sky video game
Javier Coronado Blazquez

Endless worlds, realistic worlds: procedural generation and artificial intelligence in video games

The video game No Man's Sky creates entirely visitable and different galaxies and planets at full-scale using a simple algorithm. How does it do it?
Photos: Jeshoots.com / Unsplash
Álvaro Alegría

Main challenges for the adoption of the metaverse

In a previous post dedicated to the metaverse, I explained what the metaverse -the ‘buzz word’ of the year- consists of and what opportunities it will offer companies. Today I...
Photo: Icons8 Team / Unsplash
Telefónica Tech

Attacking login credentials

An access credential is basically a username and password associated with a person and the access permissions granted to that person for an application, service or system. An access...
Billboards in the Theater District, New York City
Víctor Vallejo Carballo

AI of Things (V): Recommendation and optimisation of advertising content on smart displays

Learn about the benefits of technologies such as smart displays and Big Data for the outdoor advertising industry.

Navegación de entradas

Previous articles
1 … 13 14 15 … 27
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration