Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Take control of your vehicles with Fleet Optimise Quantum computing in the future of IoT
  • Big Data
    • The 2 types of learning in Machine Learning: supervised and unsupervised AI, Data and IT – how do they live together?
  • Cybersecurity
    • Cyber Security Weekly Briefing, 6 – 10 June Functional Cryptography: The Alternative to Homomorphic Encryption for Performing Calculations on Encrypted Data

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
AI of Things

It’s raining data: How Big Data is changing weather forecasting

Be it is crazy hot Madrid summers or the ever-changing nature of British weather, the weather is a constant topic of conversation for people around the world. Historically, the...
ElevenPaths

New tool: PySCTChecker

This is a “Quick and dirty” Python script for checking if a domain properly implements Certificate Transparency. If so, it is possible to observe how Certificate Transparency is implemented...
AI of Things

Brand Sponsored Data: A creative tool for satisfying customers while meeting tangible customer needs

Normal 0 false false false EN-US ZH-CN AR-SA /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; ...
AI of Things

Entrevista: Angela Shen-Hsieh desmitifica“la caja negra” del Big Data

Angela Shen-Hsieh es Directora de Predicción del Comportamiento Humano en la Innovación de Productos de Telefónica. En esta función, se encarga de liderar la innovación interna. Antes de unirse a...
AI of Things

The new Spain: redrawing the country using mobility data

One of the most exciting fields that the use of data opens up is the study of networks. Our societies, communications, infrastructure, businesses and many other areas of life...
Figure 1: The Royal Palace is one of Madrid's top tourist attractions.
AI of Things

Case Study: LUCA Tourism and Royal Palace Visitors Analysis

Madrid receives almost 6 million international tourists annually, who come to the city to see the history, soak up the sunshine and experience the culture. In addition to this...
ElevenPaths

The Intelligent MSSP

During years, Managed Security Services (MSS) have been the most effective strategy to tackle the increasing and changing threat landscape. Otherwise, some disruptive factors are compelling a new approach...
Figure 1: DK Management have decided to use LUCA Store.
AI of Things

Case Study: LUCA Store and DK Management, driving footfall and increasing convertion

In case you didn’t already know one of the many products from our business portfolio is LUCA Store. This post will take a look at our collaboration with DK...
ElevenPaths

ElevenPaths and BitSight deliver enhanced visibility into supply chain risk with continuous monitoring

Security Ratings Market Leader Expands Global Reach with New Strategic Alliance CAMBRIDGE, MA—June 13, 2017. ElevenPaths, Telefónica Cibersecurity Unit specialized in the development of innovative security solution, and BitSight, the Standard...
ElevenPaths

Wannacry chronicles: Messi, korean, bitcoins and ransomware last hours

It is hard to say something new about Wannacry, (the ransomware itself, not the attack). But it is worth investigating how the attacker worked during last hours before the...

Navegación de entradas

Previous articles
1 … 92 93 94 … 120
More articles
  • Telefónica Tech

Popular

Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Information leakage in Data Loss Prevention leader companies
Gartner has released a study that classifies the most important companies that offer Data Loss Prevention (DLP) solutions depending on their position, strategy, effectiveness, and market leadership. We have made...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration