Martiniano Mallavibarrena Understanding The Dynamics of Ransomware Security Incidents The ransomware phenomenon If there is one term that has earned its way to the top of the headlines in the media over the last two years, ransomware is undoubtedly...
Diego Samuel Espitia TCP/IP Stack Gruyere In May 2020 during the most complicated phase of the global pandemic, we were told that the internet was broken as a result of bugs (called Ripple20) affecting millions...
Telefónica Tech Cyber Security Weekly Briefing 6-12 November Microsoft’s security bulletin Microsoft has published its November security bulletin in which it has fixed a total of 55 bugs in its software, including six 0-day vulnerabilities, two of which...
Cristina del Carmen Arroyo Siruela The human factor: a key element of cyber security When it is said that a server needs to be bastioned, cybersecurity personnel have an idea of what it is and what it consists of. But what about securing...
Innovation and Laboratory Area in ElevenPaths #CyberSecurityReport21H1: More than 246 million OT cyber security events detected in six months There are many reports on security trends and summaries, but at Telefónica Tech we want to make a difference. From the Innovation and Lab team, we have just launched...
Sergio de los Santos Frequently Asked Questions About Printnightmare (CVE-2021-34527) We are going to try to clarify some common doubts about this vulnerability, since it has turned up with some confusing data about whether it was patched or not,...
Marina Salmerón Uribes What we should remind ourselves of on International Social Media Day Today is the international day of social networks, tools that have changed our day-to-day personal and professional lives and from which we find it hard to detach ourselves. On...
Sergio de los Santos What On Earth Is Going on With Ransomware And Why We Won’t Stop It Any Time Soon In the last few months, it is not rare that every now and then we read about a large company that has fallen victim to ransomware, either brought to...
Carlos Ávila IoTM Mobile Applications and The Relevance Of Their Security Almost a year ago in the article “Internet of Health“ I described how incredible is the amount of applications and devices that the medical industry has deployed and will...
ElevenPaths DevSecOps: 7 Key Factors for Implementing Security in Devops DevSecOps, also known as SecDevOps, is a software development philosophy that advocates the adoption of security throughout the software development lifecycle (SDLC). DevSecOps is more than just a specific...
Gonzalo Fernández Rodríguez What is a Cloud-Native Application? The term Cloud Native is something that goes beyond moving applications on-premises, i.e. hosted directly in a data centre to an infrastructure from a Cloud provider, whether public or...
Alberto García García-Castro Incentives in business blockchain networks: a new approach It has always been a fundamental part of the technology to use incentives that reward collaboration and good practices among participants in a blockchain network. So much so that...
New Markets Team Human Factors in Cybersecurity: Protect Yourself Download the last report from Telefónica Tech Cyber & Cloud New Markets Team aimed at fighting disinformation and raising awareness about Cybersecurity
Roberto García Esteban Cloud market trends until 2025 All of us who work in Cloud services are aware that this market is still in a phase of accelerated growth and that more and more companies are taking...
Javier Coronado Blazquez Endless worlds, realistic worlds: procedural generation and artificial intelligence in video games The video game No Man's Sky creates entirely visitable and different galaxies and planets at full-scale using a simple algorithm. How does it do it?