ElevenPaths Cyber Security Weekly Briefing 27 February – 5 March HAFNIUM attacks Microsoft Exchange servers with 0-day exploits Microsoft has detected the use of multiple 0-day exploits to carry out targeted attacks against on-premise versions of Microsoft Exchange Server (2013,...
Franco Piergallini Guida How to Trick Apps That Use Deep Learning for Melanoma Detection One of the great achievements of deep learning is image classification using convolutional neural networks. In the article “The Internet of Health” we find a clear example where this...
ElevenPaths Telefónica promotes the digital transformation towards ‘Industria Conectada 4.0’ * This post was translated and originally published here (Spanish) within the framework of the I Congreso de Industria Conectada taking place in Madrid the 21st of September. The...
ElevenPaths Keys to Implementing a 360 Corporate Digital Identity We analyze the identity management issues and the characteristics that a comprehensive solution of this kind must have in all organizations.
Juan Elosua Tomé New FARO Version: Create Your Own Plugin and Contribute to Its Evolution We are pleased to announce the latest version of FARO, our open-source tool for detecting sensitive information, which we will briefly introduce in the following post. Nowadays, any organisation can...
Innovation and Laboratory Area in ElevenPaths Telefónica Tech’s Cybersecurity Unit Becomes Part of The European Commission’s Cybersecurity Atlas Telefónica Tech’s Innovation and Laboratory Area in cyber security has been included as part of the European Commission’s Cybersecurity Atlas, a knowledge management platform that maps, classifies, visualises and...
Gonzalo Álvarez Marañón Rock, Paper, Scissors and Other Ways to Commit Now and Reveal Later Have you ever played rock, paper, scissors? I bet you have. Well, let’s put the tin lid on it: how would you play through the phone? One thing is...
Innovation and Laboratory Area in ElevenPaths 4th Anniversary of No More Ransom: ElevenPaths, Partner Entity with Two Tools Discover the tools we contribute to this important initiative launched by Europol to help ransomware victims.
ElevenPaths Cyber Security Weekly Briefing 27 February – 5 March HAFNIUM attacks Microsoft Exchange servers with 0-day exploits Microsoft has detected the use of multiple 0-day exploits to carry out targeted attacks against on-premise versions of Microsoft Exchange Server (2013,...
Innovation and Laboratory Area in ElevenPaths Telefónica Tech’s Cybersecurity Unit Becomes Part of The European Commission’s Cybersecurity Atlas Telefónica Tech’s Innovation and Laboratory Area in cyber security has been included as part of the European Commission’s Cybersecurity Atlas, a knowledge management platform that maps, classifies, visualises and...
Gabriel Álvarez Corrada Approaching Cybersecurity in Industry 4.0: The Age of Connected Machines Don’t run away yet! This era is not about machines enslaving humanity (at least, not yet…) but about the introduction of elements (IOT devices, cloud environments, IA, Big Data, SIEM,...
ElevenPaths ElevenPaths at RSA Conference 2020 Once again, we return to the RSA Conference, the reference event in the cybersecurity sector. From February 24 to 27 we will be presenting our proposal under the claim...
Telefónica and ElevenPaths announce new market leading security offering following key sector agreementsFlorence Broderick 8 October, 2015 In the context of the Company’s III Security Innovation Day Telefónica and ElevenPaths announce new market leading security offering following key sector agreements Telefónica signs agreements with partners including Alien Vault, BlueCoat, Intel Security, Palo Alto Networks, RSA y Vaultive to deliver new generation cybersecurity products ElevenPaths improves and optimises ist most powerful tools Sinfonier, Latch, SandaS o Metashield Protector thanks to these alliances, and offers unbeatable solutions for companies Follow the event live over the web at: https://securityinnovationday.elevenpaths.com/eventcontent/streaming Madrid, Thursday, 8 October 2015.- Telefónica and ElevenPaths present today the company’s new cybersecurity product lines at our third Security Innovation Day conference. The improved and expanded services are a result of Telefónica signing strategic alliances with major partners and key players in the security sector including Alien Vault, BlueCoat, Intel Security, Palo Alto Networks, RSA, and Vaultive. Thanks to the input and technological capabilities of the new partners, ElevenPaths has improved and optimised its most powerful tools including Sinfonier, Latch, SandaS or Metashield Protector. Alliances that reinforce ElevenPaths’ solutions Thanks to the agreement between Telefónica and BlueCoat, filtering systems used to access Proxy SG Internet will incorporate Metashield Protector technology –ElevenPaths’ solution preventing information leaks in all document environments–, meaning all files are scanned before publication in web services. All access information generated by Proxy SG systems is accessible from Telefónica’s SandaS platform, allowing companies real time access to IT security information. Moreover, along with GIN –BlueCoat’s IP reputation service–, SandaS can run filters or blockers in http/https accesses from a single point. With a continuously escalating threat landscape pushing cybersecurity further up the list of concerns for boardrooms and millennials alike, Palo Alto Networks is leading the charge in putting an end to successful data breaches. Within the category of cybersecurity services, Telefónica has teamed with Palo Alto Networks to develop a service that can discover mobile malware through integration with three industry-leading technologies: Palo Alto Networks next-generation security platform, which includes the WildFire – cloud-based malware analysis and prevention service-, Tacyt -the innovative cyberintelligence tool for mobile threats developed by ElevenPaths-, and Sinfonier, -the open system for real-time processing of information sources-. Through this integration, customers will be protected from malicious mobile applications on both the network and on mobile devices. Telefónica has also partnered with RSA, and now this company’s solution, Security Analytics, will admit connection with SandaS, providing a holistic view of companies’ security and the external threats and vulnerabilities that may affect them as well as risk, governance and compliance. For this purpose, Telefónica has partnered with Intel Security and now this company’s security event management and correlation system NITRO will be able to connect with SandaS and SandaS GRC. SandaS can also be connected to Alien Vault’s USM platform to improve its analysis and risk control capabilities, thus increasing those capabilities already existing in the integration with earlier versions. Telefónica, through ElevenPaths has joined Vaultive to integrate the encryption proxy service developed by the company. This protects the confidentiality of companies’ information in SaaS platforms, especially in Microsoft Office 365, with the Latch tool. This allows mobile device authorization and access to all Office 365 devices. ElevenPaths has recently acquired GesConsultor, the technology solution specialising in management and compliance systems (Governance, Risk & Compliance, or GRC), which from now on is integrated as SandaS GRC within its product portfolio. The Telefónica subsidiary has also acquired the intellectual property of the “Handwritten Signature Capture and Verification Development System in Mobile Platforms” software, which is linked to research work with the Carlos III University of Madrid. Telefónica is working to develop new services and security capabilities that help their clients’ businesses to be better protected against threats in the environments in which they operate. In the past year, the Company has undertaken a transformation process based on innovation through technology. br/> As a result Telefónica España is the leading company in billing, managed devices and implemented projects. Spain’s top companies, public bodies and law enforcement forces and agencies rely on them for their cyber security. The event will be streamed live to all Telefónica offices and will be accessible over the web at: https://securityinnovationday.elevenpaths.com/eventcontent/streaming More information on www.elevenpaths.com » Download press release Click & Go, the multipurpose buttonNew "Insecurity in the Internet of Things" report
ElevenPaths Cyber Security Weekly Briefing 27 February – 5 March HAFNIUM attacks Microsoft Exchange servers with 0-day exploits Microsoft has detected the use of multiple 0-day exploits to carry out targeted attacks against on-premise versions of Microsoft Exchange Server (2013,...
Juan Elosua Tomé New FARO Version: Create Your Own Plugin and Contribute to Its Evolution We are pleased to announce the latest version of FARO, our open-source tool for detecting sensitive information, which we will briefly introduce in the following post. Nowadays, any organisation can...
Innovation and Laboratory Area in ElevenPaths Telefónica Tech’s Cybersecurity Unit Becomes Part of The European Commission’s Cybersecurity Atlas Telefónica Tech’s Innovation and Laboratory Area in cyber security has been included as part of the European Commission’s Cybersecurity Atlas, a knowledge management platform that maps, classifies, visualises and...
Franco Piergallini Guida How to Trick Apps That Use Deep Learning for Melanoma Detection One of the great achievements of deep learning is image classification using convolutional neural networks. In the article “The Internet of Health” we find a clear example where this...
ElevenPaths Cyber Security Weekly Briefing February 13-19 Privilege escalation vulnerability in Windows Defender SentinelLabs researcher Kasif Dekel has discovered a new vulnerability in Windows Defender that could have been active for more than twelve years. The flaw,...
Gonzalo Álvarez Marañón Functional Cryptography: The Alternative to Homomorphic Encryption for Performing Calculations on Encrypted Data — Here are the exact coordinates of each operative deployed in the combat zone.— How much?— 100.000.— That is too much.— And a code that displays on screen the...