Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Telefónica Tech was Present at Advanced Factories 2021 With Its Proposal For The Industrial Sector What is the difference between M2M and IoT?
  • Big Data
    • Deep Learning vs Atari: train your AI to dominate classic videogames (Part II) Improving intent to purchase with mobile advertising: Success Story of Milpa Real
  • Cybersecurity
    • Anti-Coronavirus Cryptography Adversarial Attacks: The Enemy of Artificial Intelligence

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Destacados: Global

Telefónica Tech

Affordable fleet management for Spanish SMEs

We live in a fast-changing environment. Spanish SMEs have sharpened their wits to stay in the business after the pandemic. Most of them have begun a process of digitalisation...
María Teresa Nieto Galán

Facts and lies about the famous concept of NFTs

The NFT concept is becoming more and more popular, in fact, one could even say that it is trendy. And it is certainly no wonder, as the NFT market...
Telefónica Tech

Cyber Security Weekly Briefing 19-25 March

Privilege escalation vulnerability in Western Digital Independent security researcher Xavier Danest has reported a privilege escalation vulnerability in EdgeRover. It should be mentioned that EdgeRover is a software developed by storage products...
Mark Skelton

3 Key Cyber Security Considerations

To tackle cyber security effectively, we need to find new ways to meet the cyber challenges facing all of us. As CTO for Telefónica Tech UK&I, I regularly speak...
Sandra Tello

Towards a green digital transformation

COVID-19 has created challenges that were previously unimaginable, but it has also given us an incredible opportunity to reinvent and rebuild ourselves. In my last blog post we saw...
ElevenPaths

Cyber Security Weekly Briefing 12-18 March

Vishing by impersonating Microsoft The Office of Internet Security (OSI) has issued a security advisory to report an increase, in recent weeks, of fraudulent calls in which a supposed Microsoft...
Telefónica Tech's Innovation and Laboratory Area

#CyberSecurityReport2021H2: Log4Shell, the vulnerability that has exposed the software’s reliance on altruistically maintained libraries and their enormous security impact.

There are many reports on security trends and security summaries, but Telefónica Tech wants to make a difference. The Innovation and Lab team has just launched our own report...
Francisco Ibáñez González

AI of Things (II): Water, a sea of data

Water management companies have been adapting the way they manage their processes according to the evolution, costs and availability of technology in each part of their value chain. It...
Fly
Lucía López Sánchez

Are airlines companies as safe as they seem?

Recently, the number of news reporting cybersecurity incidents involving airlines companies worldwide has increased; cybercriminals are targeting airlines more and more often. Some examples of these incidents are the...
Telefónica Tech

Telefónica Tech at Mobile Word Congress 2022

MWC 2022 was undoubtedly one of the busiest in recent years. With the post-pandemic halt and the rescheduling of MWC 2021, even though it was only 6 months since...

Navegación de entradas

Previous articles
1 … 16 17 18 … 27
More articles
  • Telefónica Tech

Popular

Florence Broderick
ElevenPaths announced its new strategic alliances in the third Security Day
In the third Security Day the new alliance with Fortinet and ElevenPaths’s new product integrations with Check Point and Spamina solutions to evolve their technologies were presented. Madrid, 26th May....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to use Metashield protector for Client and why using it
Metashield is an Eleven Paths product that allows to clean up metadata from most of office documents. It tries to cover a gap where there seems not to exist any...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration