Beatriz Sanz Baños Have you ever wondered where the energy comes from? Thousands of companies and households have already use solar energy, with the dual purpose of reducing the carbon footprint of the planet and actively control their consumption. Have you already joined...
Beatriz Sanz Baños Make your holidays run smoothly with IoT The arrival of summer holidays allows us to visit our favorite destinations, but who isn´t worried about losing their suitcase when travelling? Luckily, IoT help us to have everything...
Beatriz Sanz Baños New Business Opportunities with IoT IoT combines virtual and real worlds for smart devices to generate a wealth of information, such that objects can act without human intervention. One way or another, the development of...
Beatriz Sanz Baños The 6 key conclusions of the user experience of Internet of Things in Spain According to the study Things Matter 2019 the connected car is one of the engines of the IoT 87% of those who use IoT declare that they wouldn’t give up...
Beatriz Sanz Baños The emotions of IoT Understanding emotions is crucial in new marketing strategies. Due to the oversaturation of products and approaches, new formulas have to be found that help the retail sector sell an...
Beatriz Sanz Baños Fashion connected: the IoT revolution in the textile sector Although it seems straight out of a futuristic novel, already connected clothes do exist. Data exchange between these clothes and mobile devices makes them able to take calls, regulate body temperature,...
Beatriz Sanz Baños Blockchain opportunities for IoT Blockchain technology offers a wide variety of applications in different productive sectors. Financial services, informatics security, cryptocurrency or merchandise supply chains are some of them.
Cascajo Sastre María 5 amazing things at CES 2018 The largest technological show on the planet was just held in Las Vegas. Huge expectations are hanging on the ingenuity and the products and services of the big companies...
Mirian Martinez Varas The 10 best blogposts of 2017 The year 2017 has been prolifically successful and productive. With its memory still fresh in our minds, now seems a good time to survey the best articles published during...
Cascajo Sastre María The Future of Connected Vehicles and IoT Connected vehicles are increasingly becoming reality, and in fact, you may have even had the chance to drive one. A study carried out by PwC entitled The Bright Future of...
Beatriz Sanz Baños IoT Trends for 2018, connectivity in the limelight In 2017, we have seen the rise of technologies associated with Big Data, the popularization of VR and the emergence of autonomous cars. But much still remains to be...
Cascajo Sastre María Quantum computing in the future of IoT Connected devices, the people who use them, and the places that harbour them are growing at extraordinary rates. In order to maintain this current growth rate, we must look...
Beatriz Sanz Baños Chuck Martin: “The industry can anticipate consumers’ needs even before they feel that need. This is the future that awaits us on Internet of Things” Internet of Things has become a fixture of our daily lives. Currently, we are equipped with a set of technologies and uses, an ecosystem, that is alive and in full...
ElevenPaths Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry? When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick Who are you going to believe, me or your own eyes? The dilemma of managed security Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick New Tool: MicEnum, Mandatory Integrity Control Enumerator In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...