Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Cloud Computing, the great ally for the digitalisation of the sports sector (and for athletes) The Ultimate Evolution Towards the Digitisation of Industry
  • Big Data
    • How the fashion industry is applying Big Data and AI Finding the next festival headliner using Big Data
  • Cybersecurity
    • The risks of not having controlled exposure to information (I) Meet #LadyHacker Jess Woods, Cloud expert at Telefónica Tech

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización sidebar: Telefonica Tech

Sergio de los Santos

Four cyber security milestones that shaped the future of malware

A journey through the 15 years Microsoft has spent consolidating a strategy that has impacted cybersecurity globally
Telefónica Tech

Cyber Security Weekly Briefing, 15 – 19 May

Vulnerabilities in cloud platforms Otorio’s team of researchers found 11 vulnerabilities affecting different cloud management platform providers. Sierra Wireless, Teltonika Networks and InHand Networks are the affected companies. The security flaws...
Telefónica Tech

Automation, Connectivity and Augmented Intelligence at the service of a competitive, disruptive and sustainable reindustrialization

Por Javier Martínez Borrguero I am back for the second consecutive year to participate in the Advanced Factories (AF 2023), the largest exhibition and professional congress dedicated to Industry 4.0...
Nacho Palou

Google’s Passkey is just another nail in the password coffin

Google’s Passkey offers users the possibility of using an access key to identify themselves on websites or apps without typing their username and password. Google explains that the passkeys replace...
Telefónica Tech

Cyber Security Weekly Briefing, 6 – 12 May

Security updates vulnerabilities in Fortinet products Fortinet has announced a set of security updates that fix up to a total of 9 vulnerabilities, 2 of which are considered high severity...
Sergio de los Santos

Pay When You Get Infected by Ransomware? Many Shades of Grey

The Internet is full of articles explaining why ransomware should not be paid. And they are probably right, but if you don’t make a difference between the type of ransomware and...
Nacho Palou

Raspberry Pi for Edge AI: Artificial Intelligence at the Edge for Everyone

Raspberry Pi is a popular computer widely used among developers, students and fans of computing, robotics, and gadgetry. Among its virtues are its low cost (a basic kit costs...
Telefónica Tech

Cyber Security Weekly Briefing, 29 April – 5 May

Critical vulnerability in Zyxel firewalls Network equipment manufacturer Zyxel has released security patches for a critical vulnerability affecting its firewalls. The vulnerability, which was discovered and reported by the TRAPA...
David García

Will Rust save the world? (I)

How Rust, the security-focused open source programming language, improves the outlook for memory error-based vulnerabilities
Marina Domínguez

The three revolutions of the Contact Center: apple pies, convertibles, and social media

Every business relationship begins with a “match”. Since the foundation of any business, no matter how small it may be, one of its main objectives is to make itself...

Navegación de entradas

Previous articles
1 2 3 4 … 123
More articles
  • Telefónica Tech

Popular

Florence Broderick
Now you can use Latch with Dropbox, Facebook and others digital services
Many of you have asked us which services you can use Latch with, regretting that so far it could not be used in the more common services, such as...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Florence Broderick
Latch, new ElevenPaths' service
During the time we’ve been working in ElevenPaths we’ve faced many kind of events internally, buy one of the most exciting and awaited is the birth of Latch. It’s a technology of our...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration