Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Five keys of IoT in Industry 4.0 The “Cable Girls” of today
  • Big Data
    • ARTYficial Intelligence or just Artificial, can tech be creative? How do you capture clients on multiple channels?
  • Cybersecurity
    • Cyber Security Weekly Briefing, 25 February – 3 March Conti, the Fastest Ransomware in the West: 32 Parallel CPU Threads, but… What for?

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización sidebar: Telefonica Tech

Beatriz Sanz Baños

IoT Trends for 2018

AI of Things

Enrich your messages with the new SMS 2.0

Once upon a time, there was a ubiquitous mobile technology, which earned a high level of subscriber trust, and did this with just only 160 characters.  This fairy tale...
Beatriz Sanz Baños

IoT Trends for 2018, connectivity in the limelight

In 2017, we have seen the rise of technologies associated with Big Data, the popularization of VR and the emergence of autonomous cars. But much still remains to be...
AI of Things

The data-driven “green corridor” in Cali

The power of data has moved out of the confines of businesses and start-ups and has reached public circles and most notably, our cities. More and more local governments are hiring Big...
AI of Things

4 Brazilian cities using data to plan urban mobility

  Successful Urban Mobility Planning is a vital role of local governments around the world. In the EU, cities account for almost three quarters of the total population and since...
ElevenPaths

#CyberSecurityPulse: The Boom of JavaScript Miners

The most common question in recent months derived from the rebound in the value of numerous cryptocurrency is: Do I invest or not invest? However, as we know, there...
AI of Things

The best-bits of Changing the Game with Big Data Valencia!

Last Thursday, the 14th of December, the finished our schedule of yearly events with the latest edition of Changing the Game with Big Data. This conference was created with...
ElevenPaths

#CyberSecurityPulse: Army Launches Direct Commissioning Program for Civilian Cybersecurity Experts

The Army has approved a program to recruit experienced cybersecurity experts directly into the service as cyber officers in an attempt to bolster a growing field that military leaders...
AI of Things

Big Data: Revolutionizing Animal Conservation

Until recently not a topic that has captured the attention of many, animal conservation is a serious problem that needs addressing. Sustainable development goal number 15 from the United...
ElevenPaths

Breaking Out HSTS (and HPKP) on Firefox, IE/Edge and (possibly) Chrome. Our Black Hat research

We have been for a long time researching about HSTS, HPKP, certificate pinning and TLS technologies in general. As a collateral effect of this work, we have found some...

Navegación de entradas

Previous articles
1 … 100 101 102 … 123
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration