Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • 5 reasons why everyone wants to learn Python IoT and Big Data in football to enable intelligent decision making
  • Big Data
    • Hackathons are not just for developers Will GDPR’s “right to data portability” change the data industry forever?
  • Cybersecurity
    • Cybersecurity Weekly Briefing July 11-17 Chronicle Of the Attack on A Youtuber Who Knew About Cyber Security

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización cabecera: Telefónica Tech

Cyber Security Weekly Briefing 10-16 July
Telefónica Tech

Cyber Security Weekly Briefing 10-16 July

Kaseya VSA Incident Update After news of the attack by the REvil ransomware group using Kaseya VSA on July 2nd, on Sunday July 11th, Kaseya released the patch for its...
Acens header
Telefónica Tech

Success Story: AWS by Acens, The Solution Chosen by Forcemanager for its CRM for Sales Team Management

Telefónica Tech integrates acens into its ecosystem, a pioneering company in the development of Cloud solutions. This completes the value proposition of IT services for small and medium-sized companies. Acens...
Fernando Navarro

New AI and Blockchain Solutions Are Arriving to Businesses

As many businesses digitally transform to drive new revenue streams and increase customer satisfaction, they are also adopting more and more advanced cloud-based technologies such as AI and Blockchain....
Social Media blog
Telefónica Tech

We’re talking about technology, will you join the conversation?

It is increasingly common to come across concepts such as Big Data, Artificial Intelligence, Internet of Things, Cyber Security, Cloud or Blockchain in any field and any conversation, disruptive...
Telefónica Tech

Cyber Security Weekly Briefing 3-9 July

Kaseya VSA incident On Friday July 2nd, the Revil ransomware group compromised third party companies by exploiting a 0day vulnerability in Kaseya VSA. Kaseya VSA is a remote system monitoring...
printnightmare
Sergio de los Santos

Frequently Asked Questions About Printnightmare (CVE-2021-34527)

We are going to try to clarify some common doubts about this vulnerability, since it has turned up with some confusing data about whether it was patched or not,...
People and technology
Raúl Hernáinz Ortega

Technology and people living together through change

Today I would like to start this article by referring to one of the 8 steps that, according to John P. Kotter, a researcher in the field of digital...
Recap MWC21
Andrés Escribano

MWC21: 5G and digital technologies, a reality for the post-covid recovery

This year’s edition of MWC21 has been a very important step towards post-pandemic Face-to-Face events. The attendees came with a clear vision of establishing new relationships, pushing new businesses,...
Cyber Security Weekly Briefing
Telefónica Tech

Cyber Security Weekly Briefing June 19- July 2

New activity of the threat actor Nobelium Microsoft has issued an update on the activities of the Russian threat actor known as Nobelium (aka APT29), which is credited with compromising...
Social Media Day
Marina Salmerón Uribes

What we should remind ourselves of on International Social Media Day

Today is the international day of social networks, tools that have changed our day-to-day personal and professional lives and from which we find it hard to detach ourselves. On...

Navegación de entradas

Previous articles
1 … 34 35 36 … 123
More articles
  • Telefónica Tech

Popular

Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration