Quantcast
Channel: ElevenPaths for companies Archives - Think Big
Browsing all 166 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Cybersecurity Weekly Briefing October 10-16

Coalition of IT Companies Tries to Eliminate TrickBot Botnet A technology business conglomerate including Microsoft, FS-ISAC, ESET, Lumen’s Black Lotus Labs, NTT, and Symantec, have participated in...

View Article


Image may be NSFW.
Clik here to view.

Steps to move security solutions forward in the face of current world challenges

Palo Alto Networks founder Nir Zuk recently addressed the Telefónica Global Security Summit with some thoughts to share on the direction of security and implications of the COVID-19 pandemic. Many...

View Article


Image may be NSFW.
Clik here to view.

ElevenPaths approaches the cyber security paradigm shift and the new era’ s...

Telefónica Tech’s cyber security company is holding its 8th Security Innovation Days, this time in a virtual format and extending from one to three half-days, on October 20th, 21st and 22nd.Among the...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity Weekly Briefing October 17-23

New banking trojan called Vizom IBM Security Trusteer’s research team has published a report analysing the new “Brazilian family” banking Trojan called Vizom. This malicious software uses similar...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity and Business in the New Era: Security Innovation Days 2020 (Day 1)

First day of the Security Innovation Days 2020 completed with more than 1500 people connected from all over the world. If you missed the first day of our cybersecurity innovation event, don’t you...

View Article


Image may be NSFW.
Clik here to view.

New Capabilities for the Future of Cybersecurity: Security Innovation Days...

Second day of the Security Innovation Days 2020, focusing on the new capabilities we have acquired as a cybersecurity company from Telefónica Tech. A few weeks ago, we announced the purchase of two...

View Article

Image may be NSFW.
Clik here to view.

Innovation and New Cybersecurity Tools: Security Innovation Days 2020 (Day 3)

This was the 8th edition of the Security Innovation Days 2020 so far. Three intense days in which innovation in cybersecurity and the digital transformation have been the essence of the event. For the...

View Article

Image may be NSFW.
Clik here to view.

Pay When You Get Infected by Ransomware? Many Shades of Grey

The Internet is full of articles explaining why ransomware should not be paid. And they are probably right, but if you don’t make a difference between the type of ransomware and who is affected, the...

View Article


Image may be NSFW.
Clik here to view.

Approaching Cybersecurity in Industry 4.0: The Age of Connected Machines

Don’t run away yet! This era is not about machines enslaving humanity (at least, not yet…) but about the introduction of elements (IOT devices, cloud environments, IA, Big Data, SIEM, IDS…) into...

View Article


Image may be NSFW.
Clik here to view.

Are You Crypto-Agile to Respond Quickly to Changing Cyberthreats?

A business is considered agile if it is able to respond quickly to market changes, adapt to maintain stability. However, without cryptography there is no security and without security there is no...

View Article

Image may be NSFW.
Clik here to view.

Cybersecurity Weekly Briefing October 24-30

Critical vulnerability in Hewlett Packard Enterprise SSMC Hewlett Packard Enterprise has fixed a critical authentication evasion vulnerability (CVE-2020-7197, CVSS 10) affecting its StoreServ...

View Article

Image may be NSFW.
Clik here to view.

Telefónica, Gradiant and Incibe Improve Companies’ Cyber Security

The agreement boosts knowledge transfer to the private sectorTEGRA continues on the path to consolidate Galicia’s position as a major player in the European field of cyber security Telefónica,...

View Article

Image may be NSFW.
Clik here to view.

ZoomEye: Extending TheTHE With More Plugins

Those who follow the developments carried out by the Innovation and Laboratory team will be familiar with our theTHE platform, which specialises in Threat Hunting, IoC analysis and is very useful...

View Article


Image may be NSFW.
Clik here to view.

Homeworking and Pandemics: a Practical Analysis on BlueKeep Vulnerability in...

“It is not the strongest of the species that survives, not the most intelligent that survives. It is the one that is the most adaptable to change”.Charles Darwin One of the greatest and most rapid...

View Article

Image may be NSFW.
Clik here to view.

¿Ransomware in Pandemic or Ransomware Pandemic?

No one imagined what could happen in the field of cyber security during the Covid-19 pandemic. Perhaps some colleagues were visionary, or others were basically guided by the statistics of recent years...

View Article


Image may be NSFW.
Clik here to view.

ElevenPaths Radio English #4 – Privacy and Personal Data Protection

Privacy and personal data protection are two of the greatest concerns today due to the large amount of information leaking out to the media every day. Practically all big companies today have large...

View Article

Image may be NSFW.
Clik here to view.

5G Connectivity and its Impact on Industry 4.0: Maturity and Evolution

One of the factors that indicates the maturity of some branches of technology is the incorporation of improvements as this technology evolves, which are different from those considered at the...

View Article


Image may be NSFW.
Clik here to view.

Cybersecurity Weekly Briefing November 7-13

Links between Vatet, PyXie and Defray777 Researchers from Palo Alto Networks have investigated the families of malware and operational methodologies used by a threat agent that has managed to go...

View Article

Image may be NSFW.
Clik here to view.

Rock, Paper, Scissors and Other Ways to Commit Now and Reveal Later

Have you ever played rock, paper, scissors? I bet you have. Well, let’s put the tin lid on it: how would you play through the phone? One thing is clear: the first one to reveal his choice loses for...

View Article

Image may be NSFW.
Clik here to view.

The Challenge of Online Identity (I): Identity Is the New Perimeter

We often find ourselves in situations where we are faced with a mission and, as the mission goes on, we realise that the first choices we made were not good. At that point, we have two options: start...

View Article
Browsing all 166 articles
Browse latest View live