José Luis Núñez Díaz The 7 priorities of a company when adopting Blockchain Last week I shared with the 101Blockchains community of professionals and digital innovators the Blockchain vision we have at Telefónica and how companies can create value by adopting this technology....
Telefónica Tech Cyber Security Weekly Briefing, 15-21 October The Noname057(16) group attacks the Spanish Ministry of Defense Last Friday, threat actor Noname057(016) carried out an attack against the website of the Spanish Ministry of Defense, rendering them unavailable...
Nacho Palou World Energy Saving Day: Efficiency to drive progress The 21st of October is World Energy Saving Day. During the last ten years, this day has raised awareness of the impact that energy consumption has on the environment...
Juan Carlos Vigo López Secure Digital Workplace: chronicle of a foretold (and necessary) evolution The changes that have taken place in the Digital Workplace lately have put some technological areas under stress, as we have had to adapt to the evolutions during and...
Telefónica Tech Selecting a managed security service provider (MSSP): 5 key factors to keep in mind An Managed Security Service Provider (MSSP) offers you a team of seasoned security experts that will work for you at a fraction of the cost of building your security...
Roberto García Esteban Cloud market trends until 2025 All of us who work in Cloud services are aware that this market is still in a phase of accelerated growth and that more and more companies are taking...
Javier Coronado Blazquez Endless worlds, realistic worlds: procedural generation and artificial intelligence in video games The video game No Man's Sky creates entirely visitable and different galaxies and planets at full-scale using a simple algorithm. How does it do it?
Álvaro Alegría Main challenges for the adoption of the metaverse In a previous post dedicated to the metaverse, I explained what the metaverse -the ‘buzz word’ of the year- consists of and what opportunities it will offer companies. Today I...
Telefónica Tech Attacking login credentials An access credential is basically a username and password associated with a person and the access permissions granted to that person for an application, service or system. An access...
Víctor Vallejo Carballo AI of Things (V): Recommendation and optimisation of advertising content on smart displays Learn about the benefits of technologies such as smart displays and Big Data for the outdoor advertising industry.
José Luis Núñez Díaz Towards a smarter supply chain One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry? When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick Mobile Connect winner of the 'Connected Life Awards' Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick Information leakage in Data Loss Prevention leader companies Gartner has released a study that classifies the most important companies that offer Data Loss Prevention (DLP) solutions depending on their position, strategy, effectiveness, and market leadership. We have made...