ElevenPaths announces that its security platform complies with the new european data protection regulation one year earlier than required

Wednesday, May 31, 2017

  • The European regulations will enter into force in May 2018, when entities that do not comply can be penalized with fines of up to 4% of their annual turnover. 
  • ElevenPaths introduces new technology integrations with strategic partners such as Check Point and OpenCloud Factory, with Michael Shaulov, Director of Check Point Product, Mobile Security and Cloud, who will be the special guest of ElevenPaths annual event. ElevenPaths also works with Wayra, Telefónica's corporate start-up accelerator.
  • ElevenPaths collaborates with the CyberThreat Alliance to improve and advance the development of solutions that fight cybercrime. 

Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?

Thursday, May 18, 2017



When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or more importantly in this case, by ransomware. Best practice involves first tracking where the information is located and then starting the data clean up, both for Wannacry and other future incidents:
  • Files that are not encrypted were not affected by the malware because the malware did not have time to affect them. There are ways to partially recover files affected by Wannacry, which will be shown throughout the course of this article.
  • It is important to always have backups and security copies that are available offline.
  • Information surrounding the shared units and the cloud units.
  • Information from Office365 email and the data units.
  • Information from removable devices, i.e. Pen drives.
  • Temporary Office files (Word, Excel, PowerPoint). If the infection was present when a document was open, a temporary file will also have been generated. These files will not be on the radar of Wannacry, meaning these files will not become encrypted. Once the files have been cleaned up, Office files can be recovered to the point they were at when Wannacry started. Once the system has been cleaned up, the temporary files generated at the time of infection can be restored.

Security Day 2017_ Cyber Security beats

Tuesday, May 9, 2017





The motto of the fourth edition of our Security Day is Cybersecurity Beats. A conference about security and technology where this year we will teach how our security tools get a feel for your company’s information systems. Some of the topics we have chosen for this day are the mandatory compliance with the GDPR regulations as of May 25, 2018, and how to be prepared with our SandaS GRC platform, the latest additions to the ElevenPaths alliances and partners program, and the integration of security solutions to help companies fight cyber attacks against their technological infrastructures. In addition, some of our partners will actively take part, with whom we will be on stage to show you the latest integrations that we have jointly carried our, for example with Check Point MTP and Tacyt. This year, as new features, we will present our Path6 (it finally has a name!), which we will unveil to you, some of the cyberattacks in which we have taken part this year, awards ceremony of the winning plugins and hacks of our annual Latch Plugins Contest, hosted by Chema Alonso and much more.

Mum, I want to be a hacker

Friday, May 5, 2017

Mum, I want to be a hacker


The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We could find the reason in this passionate and lively TED talk given by Christopher Bell, media studies scholar and father of a Star Wars-obsessed daughter, who addresses the alarming lack of female superheroes in the toys and products marketed to children, and how this impacts their view of the world. In the same way, according to various studies, at the age of 11 many girls feel drawn towards technology, science and mathematics, but they lose interest when they turn 15.

In response to this challenge, from Telefónica, throughout the Chief Data Office (CDO) led by Chema Alonso, which includes Aura (Cognitive Intelligence), ElevenPaths (Cybersecurity) and LUCA (Big Data), we thought about this recurring trend and we have decided to "hack" diversity.

ElevenPaths and the University of Piraeus in Greece work together using Tacyt as an educational and research unit

Monday, May 1, 2017

ElevenPaths and the Department of Informatics of the University of Piraeus in Greece work together using Tacyt as an educational and research unit. ElevenPaths and the Department of Informatics of the University of Piraeus in Greece start a joint collaboration which aims to perform studies and research activities on mobile applications. In addition, providing an educational platform for researchers and students.