The latest company news coming from Blueliv headquarters in Barcelona. Find detail around product updates to our modular cyberthreat intelligence solutions, company bulletins and partnership announcements.
Blueliv has been selected by Everis (an NTT Data Company) as one of the 10 companies to pitch to a selected group of companies both in Barcelona and Madrid. The focus of the event is opening a dialogue where companies and organisations can develop projects with disrupting technologies. Today...
We are excited to share that Blueliv’s US Sales Manager, Dennis Lee will be attending SC Magazine’s Congress 2014 tomorrow in New York City. Aside from being our Sales manager, Dennis is also the co-founder (along with David Raviv) of the New York Information Security (NYIS) Meetup group. NYIS is...
Today Blueliv launches a new corporate identity complemented by a new logo and graphical profile. By doing this we are aligning our business goals with our ambition to be a global market brand in the cyber security field. Our new logo is a bold step in this direction, and...
These days part of Blueliv’s team will be attending the IT-SA security congress in Nuremberg. The congress lasts three days in which we expect to attend interesting keynotes and exchange knowledge with other security experts. The congress has three open forums and around 240 expert presentations. Moreover, there is a...
The Gartner Security and Risk Summit was held over two days, with over 150 leading blue chip companies in attendance. The hot topics for the event was topped by Cyber Security with a large number of those attending speaking with Blueliv around how to best address this issue without...
Some weeks ago we attended the Gartner Security and Innovation Summit in Washington and now we are attending the event in London. This summit will last two days, two really complete days in which we are going to meet other security experts and share knowledge and impressions with them. The...
A written by Jen Miller of CIO magazine describes the importance for Cyber Security for small to midsize businesses. The article highlights how many smaller businesses can suffer from the same attacks that plague large enterprises to even attacks which specifically target them. These organizations could be using the...
Tomorrow Blueliv will attend the Innovation Summit 2014, in New York City. The event is organized by SINET and connects America’s three most powerful epicenters and evangelizes the importance of industry, government and academic collaboration on joint research initiatives regarding Cybersecurity. If you are also planning to attend and are interested in...
Learn how Blueliv minimizes the consequences of Credit Card thefts. PF Chang’s is a very popular restaurant option for professionals looking to impress their customers with enjoyable Chinese food. Therefore, John at XYZ corporate takes his client there to discuss renewing a services contract that’s about to expire.John uses...
En Publico.es han entrevistado a Daniel Solís, CEO de Blueliv. Aquí tenéis un extracto y os invitamos a leer la entrevista completa en el medio. Cada día, cada hora, cada minuto que pasa se inventan en cualquier parte del mundo nuevas amenazas en Internet dirigidas a particulares o...
In two weeks from now, some of us will be attending the Gartner Security & Risk Management Summit in National Harbor, MD (Washington, D. C. Area). This summit will be a really interesting event, as you can see in the agenda, which is full of useful and valuable...
As m-commerce grows, recent research reveals that security is a major concern for consumers making payments by smartphone. The security threats against the mobile channel are growing; using the example of a recent malware attack on the mobile services of a bank in the Middle East, we analyze the...
Do you want to find out how our technology Blueliv works? We’re going to explain you, step by step, how we hunt the Cyber Crime with Blueliv Cyber Threat Intelligence. The process starts with the analysis of different malware samples gathered from the Internet so, what happens then?...
Mundo Hacker, the successful TV show of Discovery Max, Spain, is organizing the Mundo Hacker Day Congress, addressed to Cyber Security professionals. The congress, which aims to gather 750 attendees, counts on the support of major Spanish companies in the sector among its sponsors and speakers. ...
Once again, Blueliv will be at Securmática, the Spanish Congress of Information Security organized by SIC magazine. This year is especially important, as Securmática will turn 25. SIC magazine betted on Information Security when this was an almost unknown world and has had a big influence in...
Kibo Ventures, through the Amerigo Investment fund, Telefónica Ventures, the venture capital arm of Telefónica, and the entrepreneur Roger Casals, have invested 2.5 million euros in the cyber security company Blueliv, to develop new products and fund the firm’s international expansion. This makes Blueliv the first example of joint...
Desde hoy mismo, es posible descargarse la distribución forense que, junto con Aedel, venimos desarrollando desde https://www.blueliv.com/ad-Quiere/ad-Quiere_i386_v0.9.iso y su correspondiente checksum en https://www.blueliv.com/ad-Quiere/checksum_v0.9.txt La lista de cambios introducidos son: Se ha añadido Volatility, pasa a formar parte de la colección de herramientas. Se ha añadido el menú “Forensics” para...
Antes de iniciar el descanso estival hemos decidido cambiar el sitio y el diseño de nuestro web, dándole un toque más marino y fresco. A partir de ahora encontraréis nuestro blog en: bluelog.blueliv.com, por lo que por favor actualizar vuestros lectores de feeds. Esperemos que este sea de vuestro agrado...
Las actuales distribuciones forenses se están moviendo desde formatos abiertos y gratuitos a formatos de pago. Dichas herramientas forenses empiezan con buenas ideas e intenciones y finalmente, se apoderan de ellas empresas con ánimo de lucro, perdiendo así su filosofía GNU. Por estos motivos, blueliv y AEDEL lanzan AD|QUIERE...
Mucho han cambiado las cosas desde finales de la década de los 80, en que los hackers no se movían por objetivos económicos sino más bien por filosofía, por ganarse el reconocimiento de otros o como protesta, culminando en movimientos hacktivistas. Algunos afirman que el termino se acuñó para...
Internet se ha convertido en una enorme base de datos de información distribuida y accesible a través de toda una serie de servicios y utilidades que han ido apareciendo: RSS, buscadores Web, redes sociales, foros de noticias, redes P2P, etc. Por otro lado, y como posible evolución, La Web...
Dentro del marco de la solución sýnap-link, la propuesta de blueliv para la gestión de la Seguridad de la Información en formato 24×7, es un factor clave mantenerse actualizado acerca de nuevas vulnerabilidades que afectan a diferentes fabricantes y productos. Del mismo modo, es esencial mantener una base de...
En este proyecto, el cual arrancamos con toda la ilusión y motivación posible, nos gustaría explicarte de dónde viene nuestro nombre. Desde que empezamos a pensar en las forma en que queríamos cambiar el mundo de la Seguridad de la Información, nos vino a la cabeza aquello que nos...
A User does not have the obligation to accept Cookies and may voluntarily opt-out, but without accepting them the User may experience reduced Site functionality. If the User should wish to reject the cookies it should read the information contained in User’s browser software to see how to turn-off the automatic download feature. For more information about cookies, including how to set the internet browser to reject cookies, User is invited to access the following website: www.allaboutcookies.org.
BLUELIV is currently using the following Cookies in accordance with the instructions and information specified herein:
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
The cookie is used by cdn services like CloudFare to identify individual clients behind a shared IP address and apply security settings on a per-client basis. It does not correspond to any user ID in the web application and does not store any personally identifiable information.
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
This cookie is used for the function of Google Analytics. The cookie store the visitor-level custom variable data.
This cookie is installed by Google Analytics. The cookie is used to calculate visitor, session, campaign data and keep track of site usage for the site's analytics report. The cookies store information anonymously and assign a randomly generated number to identify unique visitors.
This cookie is installed by Google Analytics. The cookie is used to store information of how visitors use a website and helps in creating an analytics report of how the website is doing. The data collected including the number visitors, the source where they have come from, and the pages visted in an anonymous form.
This is set by Hotjar to identify a new user’s first session. It stores a true/false value, indicating whether this was the first time Hotjar saw this user. It is used by Recording filters to identify new user sessions.
This cookie is set by Hotjar. This cookie is set when the customer first lands on a page with the Hotjar script. It is used to persist the random user ID, unique to that site on the browser. This ensures that behavior in subsequent visits to the same site will be attributed to the same user ID.
1 year 1 month
The cookie is set by addthis.com to determine the usage of Addthis.com service.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
This cookie is a browser ID cookie set by Linked share Buttons and ad tags.
1 year 24 days
Used by Google DoubleClick and stores information about how the user uses the website and any other advertisement before visiting the website. This is used to present users with ads that are relevant to them according to the user profile.
1 year 1 month
This cookie is set by Addthis. This is a geolocation cookie to understand where the users sharing the information are located.
This cookie is set by twitter.com. It is used integrate the sharing features of this social media. It also stores information about how the user uses the website for tracking and targeting.
This cookie is set by doubleclick.net. The purpose of the cookie is to determine if the user's browser supports cookies.
5 months 27 days
This cookie is set by Youtube. Used to track the information of the embedded YouTube videos on a website.