Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • AI of Things (XI) Preventive maintenance on sensors: anticipating sensor failures, predicting battery replacement IoT Solutions World Congress
  • Big Data
    • The data-driven transformation of businesses, a matter of survival Our Christmas Lip Sync
  • Cybersecurity
    • What is the Fifth Domain and what is its strategic importance? Detecting the Indicators of An Attack

Think Big / Business

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Photo: Markus Winkler / Unsplash
Roberto García Esteban

6 common mistakes when quoting for a Cloud project

There is no doubt that Cloud Computing technology brings with it enormous opportunities for companies, but its financial particularities need to be well understood. Traditionally, the IT model was about...
Telefónica Tech

Cyber Security Weekly Briefing, 1 — 7 October

Lazarus targets Dell via new FudModule rootkit  ESET researchers have reported a new Lazarus campaign targeting a Dell hardware driver using a new rootkit called FudModule. The rootkit uses a...
Photo: Aditya Chinchure / Unsplash
Olivia Brookhouse

How to build a Smart City: with IoT and Big Data

A smart city is defined as a high-performance urban environment, where the aim is to optimize the use of resources and access to services. Smart cities take advantage of technological...
Photo: National Cancer Institute / Unsplash
Roberto García Esteban

Cloud Computing is the future of the healthcare sector

Healthcare is a sector that is continuously generating a large amount of data. To put it in numbers, every year our National Health System manages 234 million medical consultations...
Photo: Mae Mu / Unsplash
Nacho Palou

How digitalisation makes it possible to accurately identify and meet the needs of an organic cherry farm

Before tackling the digitalisation of their organic cherry orchard, the Vicente brothers, the caretakers of the Frutas Mifra cherry farm, had to ride around the entire farm on a...
Photo: Thought Catalog / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 24 — 30 September

Two 0-day vulnerabilities exploited in Microsoft Exchange The Vietnamese cybersecurity team GTSC reported two 0-day vulnerabilities in Microsoft Exchange three weeks ago through the Zero Day Initiative (ZDI) that are...
Photo: Mika Baumeister / Unsplash
Javier Coronado Blazquez

AI of Things (X) 10-minute delivery: how Artificial Intelligence optimises delivery routes

Nowadays, speed and immediacy is a necessity for almost any company, especially for those in the logistics sector dedicated to the transport and delivery of goods. Due to the...
Photo: Linkedin Sales Solutions / Unsplash
Marta Mallavibarrena

Human factor key in cyber security

Dozens of vulnerabilities are discovered every day in the current landscape (an average of 50 in 2021), and attackers are finding new and ingenious ways to exploit them. It...
Photo: Artem Beliaikin / Unsplash
Telefónica Tech

Big Data and Artificial Intelligence solutions for the tourism industry

Big Data technologies and Artificial Intelligence techniques offer an infinite world of opportunities in all sectors of the economy, and especially in tourism. We are talking about having the...
Photo: Christina Wocintechchat.com
ElevenPaths

Cyber Security Weekly Briefing, 17 — 23 September

Quantum and BlackCat ransomware use Emotet as entry vector Researchers at AdvIntel have published the results of an investigation reporting that ransomware operators Quantum and BlackCat have adopted the use...

Navegación de entradas

Previous articles
1 … 14 15 16 … 120
More articles
  • Telefónica Tech

Popular

Florence Broderick
ElevenPaths announced its new strategic alliances in the third Security Day
In the third Security Day the new alliance with Fortinet and ElevenPaths’s new product integrations with Check Point and Spamina solutions to evolve their technologies were presented. Madrid, 26th May....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to use Metashield protector for Client and why using it
Metashield is an Eleven Paths product that allows to clean up metadata from most of office documents. It tries to cover a gap where there seems not to exist any...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration