Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Cloud Computing, the great ally for the digitalisation of the sports sector (and for athletes) Firefighting drones
  • Big Data
    • 7 Big Data events in May LUCA’s first 70 days
  • Cybersecurity
    • Using Development Libraries to Deploy Malware Cyber Security Weekly Briefing December 12-18

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Nacho Palou

What is AI-winter and how to avoid it

Are we on the verge of the next AI winter? What factors could contribute to it? Fear, restrictive legislation, or lack of progress can impact AI's future.
Nacho Palou

The power of sustainable digitalization in the fight against climate change

Climate change is considered the greatest challenge of our time. Its effects range from desertification and droughts to floods and rising sea levels. Some of its most visible consequences...
Telefónica Tech

Cyber Security Weekly Briefing, 27 May – 2 June

Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
Nacho Palou

How language puts business Cybersecurity at risk

Cybersecurity is crucial for businesses and organizations of all sizes and sectors. Cyberattacks can have severe or even fatal consequences for businesses, such as data loss, operational disruptions, or...
Carlos Rebato

Cryptography, a tool for protecting data shared on the network 

Cyber Security is nowadays an essential element in companies. However, new ways of undermining it are emerging every day. Many have asked themselves: how can companies securely store their...
Roberto García Esteban

ChatGPT and Cloud Computing: A happy marriage 

ChatGPT (you may not know that it stands for Chat Generative Pre-Trained Transformer) has become the talk of the town for its impressive ability to generate text that looks...
Telefónica Tech

The importance of access control: is your company protected?

By David Prieto and Rodrigo Rojas In an increasingly digitalized and complex world, information security is critical for businesses. As companies adopt more cloud technologies and services or allow access...
Telefónica Tech

Cyber Security Weekly Briefing, 22 – 26 May

GitLab patches a critical vulnerability GitLab has addressed a critical vulnerability affecting GitLab Community Edition (CE) and Enterprise Edition (EE) in version 16.0.0. This security flaw has been reported as...
David García

Will Rust save the world? (II)

We saw in the previous article the problems of manual memory management, but also the pitfalls of automatic memory management in languages like Java. But what if there was...
Olivia Brookhouse

Can Artificial Intelligence understand emotions?

When John McCarthy and Marvin Minsky founded Artificial Intelligence in 1956, they were amazed how a machine could perform incredibly difficult puzzles quicker than humans. However, it turns out...

Navegación de entradas

Previous articles
1 2 3 … 120
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
Latch USB Monitor: New tool to monitor PNP devices with Latch
Latch USB Monitor is a tool that monitors Plug ‘n Play device (PNP) changes in Windows and gives the user the possibility of tracking incoming devices, and react accordingly...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration