Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • 5 reasons why everyone wants to learn Python 5G – The Key Technology for the development of IoT
  • Big Data
    • Boosting Peru’s Tourism Industry with Big Data Is AI key to successful Real Estate investment?
  • Cybersecurity
    • Cybersecurity Weekly Briefing November 21-27 New tool: “Web browsers HSTS entries eraser”, our Metasploit post exploitation module

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización sidebar: Telefonica Tech

Beatriz Sanz Baños

The emotions of IoT

Understanding emotions is crucial in new marketing strategies. Due to the oversaturation of products and approaches, new formulas have to be found that help the retail sector sell an...
AI of Things

Which country will lead the race for AI dominace?

Every January, the World Economic Forum meets in the Swiss mountain resort of Davos, bringing together politicians, economists, business leaders and more to discuss the key issues of the...
AI of Things

A closer look at the GRAMMY Awards 2018

Now that January is here, it is time to look forward to one of the year’s standout events, the GRAMMYs 2018. This year, the prestigious event will be held...
Pablo Alarcón Padellano

Managed Detection & Response: Prevention is Not Enough, You Need to Become Cyber-Resilient

You want your organization to be cyber-resilient but you have no means? You have advanced security solutions in place, but you lack skilled staff trained to take advantage of them? You...
AI of Things

5 jobs that you didn’t know used Data Science

Content originally written by Ane Urain Gurruchaga, LUCA Brand Awareness. From taking the metro, to choosing a film that best fits your tastes, the presence of data is undeniable in...
ElevenPaths

#CyberSecurityPulse: Guess Riddle… How Is Information Stored In a Bitcoin Address?

As we have seen in previous post on ElevenPaths blog, the OP_RETURN field of a Bitcoin transaction is used to store a small portion of information (up to 80...
AI of Things

Enhancing customer experiences with Smart Digits.

On November 21st 2017, we hosted a webinar about accelerating the digital transformation with LUCA’s Smart Digits product portfolio. Smart Digits is a B2B platform and set of secure...
Beatriz Sanz Baños

Fashion connected: the IoT revolution in the textile sector

Although it seems straight out of a futuristic novel, already connected clothes do exist. Data exchange between these clothes and mobile devices makes them able to take calls, regulate body temperature,...
Beatriz Sanz Baños

Blockchain opportunities for IoT

Blockchain technology offers a wide variety of applications in different productive sectors. Financial services, informatics security, cryptocurrency or merchandise supply chains are some of them.
Cascajo Sastre María

5 amazing things at CES 2018

The largest technological show on the planet was just held in Las Vegas. Huge expectations are hanging on the ingenuity and the products and services of the big companies...

Navegación de entradas

Previous articles
1 … 98 99 100 … 123
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration