Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Discover the Connected Pool The Ultimate Evolution Towards the Digitisation of Industry
  • Big Data
    • The data-driven “green corridor” in Cali Warning About Normalizing Data
  • Cybersecurity
    • #CyberSecurityPulse: Last Update About Bad Rabbit Ransomware Technically analysing a SIEM… are your logs secure?

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
A computer and a coffee cup. Photo: Lauren Mancke / Unsplash
Marta Mª Padilla Foubelo

Dark Markets in the internet age

What are Dark Markets or Black Markets? This concept has been in the news for a long time as a consequence of clandestine sales. The markets for drugs and...
Laptop, cup of coffee, notepad and mobile on a desk
Telefónica Tech

Cyber Security Weekly Briefing, 24 April – 6 May

TLStorm 2 – Vulnerabilities in Aruba and Avaya switches Researchers at Armis have discovered five vulnerabilities in the implementation of TLS communications in multiple models of Aruba and Avaya switches....
Woman working on a computer. Photo: Unsplash
Diego Samuel Espitia

Where is your company on the cybersecurity journey?

Although the cybersecurity path is not linear and each company has its own characteristics, experience has allowed us to classify companies into five levels of cybersecurity evolution. The existence of...
People working at a distribution center. Photo: Adrian Sulyok / Unsplash
Roberto García Esteban

Cloud Computing as a key player in the future of the logistics sector

Why cloud computing is key for logistics companies to meet the growing demand in e-commerce.
Girl using a tablet
Jennifer González

Children as victims from a cybersecurity perspective

Parenting a teenager while studying for a master’s degree in cybercrime makes you consider a lot of dangers that, if I didn’t have a 14-year-old child, wouldn’t even have...
Computer. Photo: Unsplash
Telefónica Tech

Cyber Security Weekly Briefing 22–29 April

New malicious RedLine distribution campaign Researchers at BitDefender have published a report on a new RedLine malware distribution campaign. According to the analysts, malicious actors are using the RIG Exploit...
An Ether coin, Ethereum's cryptocurrency
Jorge Ordovás

Rethinking consensus for a more sustainable Blockchain: from PoW to PoS

Keeping a record of information on public Blockchain networks (such as Bitcoin, Ethereum or others) involves solving the so-called “Byzantine Fault”: several contingents of the same army surround an...
A man using Chrome browser in a laptop
Sergio de los Santos

0days in numbers: Chrome, Windows, Exchange… What are attackers and manufacturers looking for?

Very interesting data from Google’s Project Zero, which tries to catalogue, find and disseminate 0days. They do not discover them directly, but “detect” them in any manufacturer when they...
Woman shoping in a mall
Mariano Banzo Martínez

AI of Things (IV): You can already maximise the impact of your campaigns in the physical space

Knowledge of customer profiles and the environment thanks to technology and big data makes possible to have an impact on the business
Travelers waiting at the airport to onboard
Martiniano Mallavibarrena

‘Insiders’ in Cybersecurity: “Catch me if you can”

Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...

Navegación de entradas

Previous articles
1 … 3 4 5 … 105
More articles
  • Telefónica Tech

Popular

A computer and a coffee cup. Photo: Lauren Mancke / Unsplash
Marta Mª Padilla Foubelo
Dark Markets in the internet age
What are Dark Markets or Black Markets? This concept has been in the news for a long time as a consequence of clandestine sales. The markets for drugs and...
Olivia Brookhouse
Can Artificial Intelligence understand emotions?
When John McCarthy and Marvin Minsky founded Artificial Intelligence in 1956, they were amazed how a machine could perform incredibly difficult puzzles quicker than humans. However, it turns out...
Alexandre Maravilla
Web3 and the evolution of Internet Identity
The recent rise of Web3; the new evolution of the Internet to make it decentralised through Blockchain, is also bringing a lot of talk about decentralised identity schemes and...
AI of Things
5 AI uses in Photography
On our blog, we enjoy sharing the applications of Big Data and Artificial Intelligence in sectors that may surprise you. Previously, in “Dining with Data” we saw how customers...
cocacola
AI of Things
Coca-Cola’s use of AI to stay at the top of the drinks market
Coca-Cola is the largest beverage company in the world serving over 1.9 billion drinks daily across its 500 brands. Being such a large conglomerate active in so many countries...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration