AI of Things From Automation To Inclusion: Why Banks Are Embracing Sponsored Data Content Written by David Nowicki CMO and Head of Business Development at Datami and published through LinkedIn. A wave of Sponsored Data deployments from leading retail banks is the latest in a...
Paloma Recuero de los Santos What are the 5 principles of joined-up data? The definition and principles of ‘open data’ are quite clear and simple but the principles of joined-up data are less clear. Can you enunciate five principles of joined-up data...
AI of Things Brand Sponsored Data: A creative tool for satisfying customers while meeting tangible customer needs Normal 0 false false false EN-US ZH-CN AR-SA /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; ...
AI of Things Entrevista: Angela Shen-Hsieh desmitifica“la caja negra” del Big Data Angela Shen-Hsieh es Directora de Predicción del Comportamiento Humano en la Innovación de Productos de Telefónica. En esta función, se encarga de liderar la innovación interna. Antes de unirse a...
AI of Things The new Spain: redrawing the country using mobility data One of the most exciting fields that the use of data opens up is the study of networks. Our societies, communications, infrastructure, businesses and many other areas of life...
ElevenPaths Wannacry chronicles: Messi, korean, bitcoins and ransomware last hours It is hard to say something new about Wannacry, (the ransomware itself, not the attack). But it is worth investigating how the attacker worked during last hours before the...
ElevenPaths ElevenPaths announces that its security platform complies with the new european data protection regulation one year earlier than required The European regulations will enter into force in May 2018, when entities that do not comply can be penalized with fines of up to 4% of their annual turnover. ElevenPaths...
AI of Things A World-Changing Combination: Dr. Claire Melamed on Big Data, Collaboration and the SDGs Dr. Claire Melamed is the Executive Director of Global Partnership for Sustainable Development Data (GPSDD), where she leads efforts to collaborate on leveraging data to meet the UN’s Sustainable...
ElevenPaths Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry? When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
AI of Things Mum, when I grow up I want to be a hacker The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? A...
Innovation Marketing Team Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths) Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick How does blacklisting work in Java and how to take advantage of it (using whitelisting) Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick Quick and dirty shellcode to binary python script https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...