Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • How can we bring Internet of Things to the rural world? Road safety and IoT
  • Big Data
    • LUCA at #HackForGood Artificial Intelligence vs Cognitive Computing: What’s the difference?
  • Cybersecurity
    • COVID-19, Insight from the Telco Security Alliance #CyberSecurityReport21H1: More than 246 million OT cyber security events detected in six months

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Martiniano Mallavibarrena

Attention: Data leak! (In search of lost data)

We have been hearing about “data leaks” on a regular basis for years, both in the media and in our professional or even personal environment. The concept actually covers...
Ismael Rihawi

Artificial Intelligence, IoT, and Blockchain: surfing the “Third Wave”

Back in 1980, futurologist Alvin Toffler published The Third Wave, a book inspired by Steve Case to express his vision of the development of the information technology paradigm in...
Photo: Jenny Ueberberg / Unsplash
Mark Skelton

The Formula for Successful Hybrid Working

Optimising cloud-based technologies and enabling a seamless blend between remote and office work will be the key to hybrid working success. To achieve this, any effective hybrid working formula...
Telefónica Tech

Cyber Security Weekly Briefing, 21-28 October

Campaigns spreading ERMAC malware  A team of Cyble researchers recently discovered a mass phishing campaign aimed at spreading the ERMAC banking trojan. The infection method is based on downloading fake...
Photo: Leti Kugler Y / Unsplash
María Teresa Nieto Galán

What was traced first in Blockchain, the chicken or the egg?

Globalisation has become part of our daily lives in all economic activity areas. Some of those areas where change has been most visible are the agricultural, poultry and livestock...
Photo: Benjamin Child / Unsplash
Estevenson Solano

What is the Fifth Domain and what is its strategic importance?

In recent years, conflict and stability in cyberspace have become a growing concern for many countries and organisations that consider cyberspace as a strategic domain and have strengthened their...
Photo: Christina Wocintechchat / Unsplash
Antonio Pita Lozano

Pillars of a data-driven organization and how not to fail in the selection of use cases

The selection of use cases is a common approach to the data-driven transformation of companies, but in most cases these use cases do not achieve the expected result, generating...
José Luis Núñez Díaz

The 7 priorities of a company when adopting Blockchain

Last week I shared with the 101Blockchains community of professionals and digital innovators the Blockchain vision we have at Telefónica and how companies can create value by adopting this technology....
Telefónica Tech

Cyber Security Weekly Briefing, 15-21 October

The Noname057(16) group attacks the Spanish Ministry of Defense Last Friday, threat actor Noname057(016) carried out an attack against the website of the Spanish Ministry of Defense, rendering them unavailable...
Photo: Miguel Bruna / Unsplash
Nacho Palou

World Energy Saving Day: Efficiency to drive progress

The 21st of October is World Energy Saving Day. During the last ten years, this day has raised awareness of the impact that energy consumption has on the environment...

Navegación de entradas

Previous articles
1 … 11 12 13 … 120
More articles
  • Telefónica Tech

Popular

Florence Broderick
New tool: Maltego transforms for Tacyt
If you are a Maltego user, you already know how intuitive and useful it is for researching and analyzing information. You may know as well that Maltego allows to...
Florence Broderick
Eleven Paths Talks: WordPress in Paranoid Mode
  ¡Regístrate aquí!   El próximo Jueves 30 de Junio nuestro compañero Pablo González impartirá una charla en la que se verá una prueba de concepto realizada en Eleven Paths. Pablo está en...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Introducing Mobile Connect – the new standard in digital authentication
The Mobile Operators hold the future of digital authentication in our hands, and so do our customers. The consumers will no longer need to create and manage multiple user...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration