Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Robot Waiters – The future or just a gimmick? Connected Health, or IoT as your best lifeline
  • Big Data
    • The AI Hunger Games – Why is modern Artificial Intelligence so data hungry? (Part II) Semi-Supervised Learning… the great unknown
  • Cybersecurity
    • Cyber Security Weekly Briefing, 29 April – 5 May Cyber Security Weekly Briefing 1–8 April

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Photo: Markus Winkler / Unsplash
Roberto García Esteban

6 common mistakes when quoting for a Cloud project

There is no doubt that Cloud Computing technology brings with it enormous opportunities for companies, but its financial particularities need to be well understood. Traditionally, the IT model was about...
Telefónica Tech

Cyber Security Weekly Briefing, 1 — 7 October

Lazarus targets Dell via new FudModule rootkit  ESET researchers have reported a new Lazarus campaign targeting a Dell hardware driver using a new rootkit called FudModule. The rootkit uses a...
Photo: Aditya Chinchure / Unsplash
Olivia Brookhouse

How to build a Smart City: with IoT and Big Data

A smart city is defined as a high-performance urban environment, where the aim is to optimize the use of resources and access to services. Smart cities take advantage of technological...
Photo: National Cancer Institute / Unsplash
Roberto García Esteban

Cloud Computing is the future of the healthcare sector

Healthcare is a sector that is continuously generating a large amount of data. To put it in numbers, every year our National Health System manages 234 million medical consultations...
Photo: Mae Mu / Unsplash
Nacho Palou

How digitalisation makes it possible to accurately identify and meet the needs of an organic cherry farm

Before tackling the digitalisation of their organic cherry orchard, the Vicente brothers, the caretakers of the Frutas Mifra cherry farm, had to ride around the entire farm on a...
Photo: Thought Catalog / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 24 — 30 September

Two 0-day vulnerabilities exploited in Microsoft Exchange The Vietnamese cybersecurity team GTSC reported two 0-day vulnerabilities in Microsoft Exchange three weeks ago through the Zero Day Initiative (ZDI) that are...
Photo: Mika Baumeister / Unsplash
Javier Coronado Blazquez

AI of Things (X) 10-minute delivery: how Artificial Intelligence optimises delivery routes

Nowadays, speed and immediacy is a necessity for almost any company, especially for those in the logistics sector dedicated to the transport and delivery of goods. Due to the...
Photo: Linkedin Sales Solutions / Unsplash
Marta Mallavibarrena

Human factor key in cyber security

Dozens of vulnerabilities are discovered every day in the current landscape (an average of 50 in 2021), and attackers are finding new and ingenious ways to exploit them. It...
Photo: Artem Beliaikin / Unsplash
Telefónica Tech

Big Data and Artificial Intelligence solutions for the tourism industry

Big Data technologies and Artificial Intelligence techniques offer an infinite world of opportunities in all sectors of the economy, and especially in tourism. We are talking about having the...
Photo: Christina Wocintechchat.com
ElevenPaths

Cyber Security Weekly Briefing, 17 — 23 September

Quantum and BlackCat ransomware use Emotet as entry vector Researchers at AdvIntel have published the results of an investigation reporting that ransomware operators Quantum and BlackCat have adopted the use...

Navegación de entradas

Previous articles
1 … 14 15 16 … 120
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
Latch USB Monitor: New tool to monitor PNP devices with Latch
Latch USB Monitor is a tool that monitors Plug ‘n Play device (PNP) changes in Windows and gives the user the possibility of tracking incoming devices, and react accordingly...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration