Are the programmes we run secure? Will the software that is in the process of development be secure? The only certainty we have is that all software can contain weaknesses or vulnerabilities. These cracks can allow a person with unwanted intentions to gain access to the program. He or she could, for example, malfunction it […]
Gradiant is part of the BIECO project that is developing different tools for vulnerability detection, that arises from the need to address the increase detected in cybersecurity attacks in recent years. The boost in teleworking has provided attackers with a vast field to act in id, in most cases, insufficiently protected. Clear examples of […]
Quantum technology is one of the areas with the greatest potential for growth. Although its development and use is still in its incipient stage, the possibilities and solutions it will provide are still unimaginable. Andrea Rodríguez Blanco, head of quantum technologies at Gradiant, shares in this GRD Tech a very clarifying simile: just as […]
On the Día das Letras Galegas we bring you the story of the Galician technologist María Wonenburger, who had to confront her father and her time to devote herself to mathematics.
Valida allows an effective response in the fight against document and identity fraud. This solution is being used by companies from financial sector, banking, insurance and public organizations.
We are immersed in an environment in which we continually hear about Industry 4.0 and the application of technologies such as IoT or Artificial Intelligence to solve multiple problems and use cases that may arise in a manufacturing environment. Typical examples may be defect reduction and prescription of industrial process parameters, logistics optimization, or even […]
If we think about the information that large companies such as Facebook or Amazon handle daily, probably one concept will come to mind: Big Data. With the increase of computational power and the decrease of storage costs, and the recent developments in fields such as cloud computing or the Internet of Things, Big Data […]
The possibilities offered by 5G technologies are practically endless, but it is necessary to know from the inside all the advantages that these technologies provide to companies. The work we are developing within the framework of the Open-VERSO National Network of Excellence allows us to specialize in 5G enabling technologies.
The current industrial modernization requires a deployment of communication networks that allow the operation and monitorization of diverse processes, such as water distribution or electricity generation. This cluster of neworks belongs to what is commonly known as Operation Technology (OT), which is sensible to suffer from different kinds of cyberattacks that may cause security breaches, […]
Today we can find monuments, restaurants or shops in one click, but are these technologies safe for our privacy? In this post we will review Geo-indistinguishability, one of the anonymization techniques used to anonymize the geographic location of an individual.
How many times have we heard about 5G? A new technology that will change the way we communicate, some say. We explain it in this article.
Xunqueira Ézara is from Redondela (Pontevedra). After some time working hard in several projects, she has proven to be a key player in her team. Her colleagues highlight both, her sense of humour and her work capacity, as well as being really competent in the field. Xunqueira studied Aerospace Engineering at UC3M, in order to […]