Javier Coronado Blazquez Big Data in basic research: from elementary particles to black holes The Big Data paradigm has profoundly penetrated all the layers of our society, changing the way in which we interact with each other and technological projects are carried out....
Telefónica Tech Cyber Security Weekly Briefing, 13–20 May VMware fixes critical vulnerabilities in several of its products VMware has issued a security advisory to fix a critical authentication bypass vulnerability affecting several of its products. Identified as CVE-2022-22972...
Jennifer González What is the digital footprint and the importance of knowing it to protect children using the Internet Following on from my previous article on cyber-victimisation of children and its annual increase, today I would like to talk about the importance of raising awareness of the digital...
Víctor Vallejo Carballo AI of Things (V): Recommendation and optimisation of advertising content on smart displays Learn about the benefits of technologies such as smart displays and Big Data for the outdoor advertising industry.
Telefónica Tech Cyber Security Weekly Briefing, 7–13 May Vulnerability in BIG-IP exploited to erase data On May 4th, F5 fixed, among others, a vulnerability affecting BIG-IP devices (CVE-2022-1388 CVSSv3 9.8), which could allow an unauthenticated attacker with network...
Santiago Morante Cendrero AI in Science Fiction Films: A Recurring Pattern of Fascination and Horror In today’s post we are going to explore how Hollywood films have dealt with the subject of technological advances, especially robotics and Artificial Intelligence. You will be surprised to...
David García The new end of passwords Password, password, password... How many can you remember if you don't use a password manager? In fact, do you even use a password manager?
Marta Mª Padilla Foubelo Dark Markets in the internet age What are Dark Markets or Black Markets? This concept has been in the news for a long time as a consequence of clandestine sales. The markets for drugs and...
Telefónica Tech Cyber Security Weekly Briefing, 24 April – 6 May TLStorm 2 – Vulnerabilities in Aruba and Avaya switches Researchers at Armis have discovered five vulnerabilities in the implementation of TLS communications in multiple models of Aruba and Avaya switches....
Diego Samuel Espitia Where is your company on the cybersecurity journey? Although the cybersecurity path is not linear and each company has its own characteristics, experience has allowed us to classify companies into five levels of cybersecurity evolution. The existence of...
Olivia Brookhouse Can Artificial Intelligence understand emotions? When John McCarthy and Marvin Minsky founded Artificial Intelligence in 1956, they were amazed how a machine could perform incredibly difficult puzzles quicker than humans. However, it turns out...
Alexandre Maravilla Web3 and the evolution of Internet Identity The recent rise of Web3; the new evolution of the Internet to make it decentralised through Blockchain, is also bringing a lot of talk about decentralised identity schemes and...
Paloma Recuero de los Santos Artificial Intelligence or Cognitive Intelligence? The buzz words of business (Original post in Spanish: ¿Inteligencia artificial o cognitiva?) Artificial Intelligence in the last 5 years has become the biggest buzz word with various spin offs including “Cognitive Intelligence”, “Smart Technologies”...
AI of Things 5 AI uses in Photography On our blog, we enjoy sharing the applications of Big Data and Artificial Intelligence in sectors that may surprise you. Previously, in “Dining with Data” we saw how customers...
AI of Things Coca-Cola’s use of AI to stay at the top of the drinks market Coca-Cola is the largest beverage company in the world serving over 1.9 billion drinks daily across its 500 brands. Being such a large conglomerate active in so many countries...