Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Smart Stadiums: How 5G is revolutionising live Sports 5 AI uses in Photography
  • Big Data
    • The Data Transparency Lab Conference 2016 kicks off tomorrow Artificial Intelligence converts thoughts into speech
  • Cybersecurity
    • Challenges and Business Opportunities of Post Quantum Cryptography Mobile Malware, part of the Generation Z

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain
Nacho Palou

What is AI-winter and how to avoid it

Are we on the verge of the next AI winter? What factors could contribute to it? Fear, restrictive legislation, or lack of progress can impact AI's future.
Nacho Palou

The power of sustainable digitalization in the fight against climate change

Climate change is considered the greatest challenge of our time. Its effects range from desertification and droughts to floods and rising sea levels. Some of its most visible consequences...
Telefónica Tech

Cyber Security Weekly Briefing, 27 May – 2 June

Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
Nacho Palou

How language puts business Cybersecurity at risk

Cybersecurity is crucial for businesses and organizations of all sizes and sectors. Cyberattacks can have severe or even fatal consequences for businesses, such as data loss, operational disruptions, or...
Carlos Rebato

Cryptography, a tool for protecting data shared on the network 

Cyber Security is nowadays an essential element in companies. However, new ways of undermining it are emerging every day. Many have asked themselves: how can companies securely store their...
Roberto García Esteban

ChatGPT and Cloud Computing: A happy marriage 

ChatGPT (you may not know that it stands for Chat Generative Pre-Trained Transformer) has become the talk of the town for its impressive ability to generate text that looks...
Telefónica Tech

The importance of access control: is your company protected?

By David Prieto and Rodrigo Rojas In an increasingly digitalized and complex world, information security is critical for businesses. As companies adopt more cloud technologies and services or allow access...
Telefónica Tech

Cyber Security Weekly Briefing, 22 – 26 May

GitLab patches a critical vulnerability GitLab has addressed a critical vulnerability affecting GitLab Community Edition (CE) and Enterprise Edition (EE) in version 16.0.0. This security flaw has been reported as...
David García

Will Rust save the world? (II)

We saw in the previous article the problems of manual memory management, but also the pitfalls of automatic memory management in languages like Java. But what if there was...
Olivia Brookhouse

Can Artificial Intelligence understand emotions?

When John McCarthy and Marvin Minsky founded Artificial Intelligence in 1956, they were amazed how a machine could perform incredibly difficult puzzles quicker than humans. However, it turns out...

Navegación de entradas

Previous articles
1 2 3 … 123
More articles
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick
HookMe, a tool for intercepting communications with API hooking
HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
(re) Introducing Evil Foca (DEFCON Edition)
Evil Foca was introduced in early April, as a tool to make local networks pentesters and auditors life easier. In a simple way and with a very simple interface too, it allows...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration