ElevenPaths The base rate fallacy or why antiviruses, antispam filters and detection probes work worse than what is actually promised Before starting your workday, while your savoring your morning coffee, you open your favorite cybersecurity newsletter and an advertisement on a new Intrusion Detection System catches your attention: THIS IDS...
AI of Things AI will enable doctors to spend more time with their patients The technical revolution within the NHS suggested in this report could not have come at a better time. We have doctors and GPs overburdened with more and more patients...
ElevenPaths If you want to change your employees’ security habits, don’t call their will, modify their environment instead You’re in a coffee bar and you need to connect your smartphone to a Wi-Fi, so you check your screen and see the following options. Imagine that you know...
Rubén Granados Reinforcement learning…. the new player Here, we would like to present a ´new´ guest, reinforcement learning (RL). Not as new, because it has been with us since the 80s. We will quickly go over the classic approximations, that...
Diego Martín Moreno What are Blockchain and Smart Contracts? Blockchain is the new technology for the treatment of data that everyone speaks about, but what is blockchain? Blockchain is a chain of blocks in which we have stored information,...
ElevenPaths Don’t confuse the frequency of an incident with the ease you remember it Imagine that there have been a few robberies in two parks of your town that have got all the attention for days. This afternoon you would like to go...
AI of Things Blockchain and IoT predictions for 2019 Blockchain and IoT have been dominant players in the technology industry over the last 5 years, with their popularity and reputation growing in line with the explosion of Big...
ElevenPaths GSMA IoT Security Champion: Award to our IoT Security team We have a lot to be happy about! Our IoT Security team, dedicated to cybersecurity specialized in the increasingly relevant world of the Internet of Things, has received a...
Paloma Recuero de los Santos Python for all (5): Finishing your first Machine Learning experiment with Python We have finally come to the last part of the Machine Learning experiment with Python for all. We have been taking it step by step, and in this last...
AI of Things The Forrester Wave™: Specialized Insights Service Providers 2018 was an excellent year for us, in which we were recognised as a leader amongst specialized insights service providers by Forrester. The independent review highlights the importance of...
ElevenPaths Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry? When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick Who are you going to believe, me or your own eyes? The dilemma of managed security Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick New Tool: MicEnum, Mandatory Integrity Control Enumerator In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...