Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Click & Go, the multipurpose button Take control of your vehicles with Fleet Optimise
  • Big Data
    • How IoT and Big Data is elevating Energy Management World Health Day: Using Big Data to address depression
  • Cybersecurity
    • Cyber Security Weekly Briefing, 21–27 May We are now live! Discover the new Telefónica Tech website

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Stefan Leadbeater

How Big Data & Artificial Intelligence are having a positive impact in the sport of Rugby Union

The use of big data and data analytics is not something which has only just become apparent in sport, in fact it has been around for a long time....
#CyberSecurityReport19H1: 45,000 apps removed from Google Play, 2% of them detected by antiviruses
Innovation and Laboratory Area in ElevenPaths

#CyberSecurityReport19H1: 45,000 apps removed from Google Play, 2% of them detected by antiviruses

Currently, there are a number of reports addressing trends and summaries on security. However, at ElevenPaths we want to make a difference. Our Innovation and Labs team has just...
Fernando Menéndez-Ros

The expansion and future of Aura, Telefónica’s AI

A few years ago, Telefónica began a digital transformation process with the aim of seeking simplification, adaptation and the comprehensive digitalisation of the Company through the design and implementation...
Richard Benjamins

Artificial Intelligence for warfare or for maintaining peace

On July 3, 2019, I attended an event organized by the Spanish Center for National Defense Studies (CESEDEN) and the Polytechnic University of Madrid (UPM) on the impact of AI...
A government is known by the Apple data it requests
Sergio de los Santos

A government is known by the Apple data it requests

Sometimes, governments need to be underpinned by huge corporations to carry out their work. When a threat depends on knowing the identity or gaining access to a potential attacker...
Sergio de los Santos

The attack against OpenPGP infrastructure: consequences of a SOB’s actions

What is happening with the attack against OpenPGP infrastructure constitutes a disaster, according to the affected people who maintain the protocol. Robert J. Hansen, who communicated the incident, has...
Facebook Libra coin blockchain
Alfonso de la Rocha Gómez-Arevalillo

The truth behind Libra, Facebook’s new cryptocurrency

It’s been almost a week since Facebook’s public release of Libra Blockchain, a decentralized programmable database promoted by Facebook to support a low-volatility cryptocurrency. Opiniated rivers of ink have...
Antonio Pita Lozano

The data-driven transformation of businesses, a matter of survival

Written by Antonio Pita During the Digital Enterprise Show (#TelefónicaEmpresasDES) celebrated in Madrid at the end of last month we had the opportunity to look at the state-of-the-art disciplines which surround the...
Anshul Kudal

How do you capture clients on multiple channels?

Have you heard of the word omnichannel? It is a word which is used a lot in the world of marketing. Like its name indicates, it refers to multiple...
Cristina de la Cruz

Hacker Women are driving Aura, Telefónica’s Artificial Intelligence

Telefónica is the pioneer telco in introducing Artificial Intelligence (AI), through Aura, to facilitate communication with its customers. Behind this initiative, one of the Company’s most ambitious, the profiles...

Navegación de entradas

Previous articles
1 … 64 65 66 … 120
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration