Alberto García García-Castro TrustOS, the Swiss Army Knife of Blockchain Networks Did you know that there are currently dozens of public Blockchain networks and that, added to the private and consortium ones, there could be hundreds? Which of them would...
Santiago Morante Cendrero AI in Science Fiction Films: A Recurring Pattern of Fascination and Horror In today’s post we are going to explore how Hollywood films have dealt with the subject of technological advances, especially robotics and Artificial Intelligence. You will be surprised to...
Miguel Maroto How IoT solutions help us deal with rising energy prices? Households, businesses and industry can improve energy efficiency, reduce costs and combat climate change thanks to IoT technology.
Javier Coronado Blazquez Endless worlds, realistic worlds: procedural generation and artificial intelligence in video games The video game No Man's Sky creates entirely visitable and different galaxies and planets at full-scale using a simple algorithm. How does it do it?
Telefónica Tech Cyber Security Weekly Briefing, 8 — 19 August Google reports largest DDoS attack in history Google researchers have reported the largest DDoS attack ever recorded. Last 1 June, a Google Cloud Armor client received a series of HTTP...
Nacho Palou The artificial intelligence Dall-E turns any idea expressed in a sentence into an image Open AI shows some images generated by the Dall-E artificial intelligence when interpreting creative ideas expressed in natural language
Telefónica Tech Top 3 most read cybersecurity posts this year In our weekly summer compilation with the most relevant and most read contents of the Telefónica Tech blog since the beginning of this year, this time we bring you...
Telefónica Tech Cyber Security Weekly Briefing, 30 July – 5 August Possible link between Raspberry Robin malware and Evil Corp infections The Microsoft Threat Intelligence Center (MSTIC) team has published new information about the Raspberry Robin malware, first detected by the...
Telefónica Tech The 3 posts about Blockchain that you have to read Continuing with our series of posts on the most read content for each technology, this week we stop at Blockchain to learn more and better about it together with...
José Vicente Catalán You take a holiday, but your cybersecurity doesn’t: 5 tips to protect yourself this summer Holidays are a necessity, that’s for sure. Everyone needs to relax, to spend quality time with family and friends, to disconnect. But, ironically, in order to disconnect, we end...
Florence Broderick New tool: Maltego transforms for Tacyt If you are a Maltego user, you already know how intuitive and useful it is for researching and analyzing information. You may know as well that Maltego allows to...
Florence Broderick Eleven Paths Talks: WordPress in Paranoid Mode ¡Regístrate aquí! El próximo Jueves 30 de Junio nuestro compañero Pablo González impartirá una charla en la que se verá una prueba de concepto realizada en Eleven Paths. Pablo está en...
Florence Broderick ElevenPaths Talks: The ISF Standard of Good Practice for Information Security REGISTER HERE! On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick Mobile Connect winner of the 'Connected Life Awards' Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick Introducing Mobile Connect – the new standard in digital authentication The Mobile Operators hold the future of digital authentication in our hands, and so do our customers. The consumers will no longer need to create and manage multiple user...