Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • IoT Trends for 2018, connectivity in the limelight The Smart mining revolution
  • Big Data
    • TOP 5: The 5 most read posts of Synergic Partners Stanford University’s “Women in Data Science” to debut in Madrid
  • Cybersecurity
    • TCP/IP Stack Gruyere #CyberSecurityPulse: Monero and EternalRomance, the perfect formula
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Protection

ransomware
Martiniano Mallavibarrena

Understanding The Dynamics of Ransomware Security Incidents

The ransomware phenomenon If there is one term that has earned its way to the top of the headlines in the media over the last two years, ransomware is undoubtedly...
TCP/IP
Diego Samuel Espitia

TCP/IP Stack Gruyere

In May 2020 during the most complicated phase of the global pandemic, we were told that the internet was broken as a result of bugs (called Ripple20) affecting millions...
Cyber Security Briefing 5-12 November
Telefónica Tech

Cyber Security Weekly Briefing 6-12 November

​Microsoft’s security bulletin Microsoft has published its November security bulletin in which it has fixed a total of 55 bugs in its software, including six 0-day vulnerabilities, two of which...
Cristina del Carmen Arroyo Siruela

The human factor: a key element of cyber security

When it is said that a server needs to be bastioned, cybersecurity personnel have an idea of what it is and what it consists of. But what about securing...
Cyber Securiry Report 2H 21
Innovation and Laboratory Area in ElevenPaths

#CyberSecurityReport21H1: More than 246 million OT cyber security events detected in six months

There are many reports on security trends and summaries, but at Telefónica Tech we want to make a difference. From the Innovation and Lab team, we have just launched...
printnightmare
Sergio de los Santos

Frequently Asked Questions About Printnightmare (CVE-2021-34527)

We are going to try to clarify some common doubts about this vulnerability, since it has turned up with some confusing data about whether it was patched or not,...
Social Media Day
Marina Salmerón Uribes

What we should remind ourselves of on International Social Media Day

Today is the international day of social networks, tools that have changed our day-to-day personal and professional lives and from which we find it hard to detach ourselves. On...
Ransomware cyber security
Sergio de los Santos

What On Earth Is Going on With Ransomware And Why We Won’t Stop It Any Time Soon

In the last few months, it is not rare that every now and then we read about a large company that has fallen victim to ransomware, either brought to...
cyber security app iotm
Carlos Ávila

IoTM Mobile Applications and The Relevance Of Their Security

Almost a year ago in the article “Internet of Health“ I described how incredible is the amount of applications and devices that the medical industry has deployed and will...
ElevenPaths

DevSecOps: 7 Key Factors for Implementing Security in Devops

DevSecOps, also known as SecDevOps, is a software development philosophy that advocates the adoption of security throughout the software development lifecycle (SDLC). DevSecOps is more than just a specific...

Navegación de entradas

Volver a portada
1 2
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
Latch USB Monitor: New tool to monitor PNP devices with Latch
Latch USB Monitor is a tool that monitors Plug ‘n Play device (PNP) changes in Windows and gives the user the possibility of tracking incoming devices, and react accordingly...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration