Remove page i
article thumbnail

United Airlines CISO Deneen DeFiore on elevating cyber’s value to the business

CIO Business Intelligence

What I try to do, again, is focus on the outcomes, because if you’re aligned on the outcome, then you can really start to unpack what the issues are around the disconnects. That’s kind of the way I do it. I also make sure that I’m the facilitator and orchestrator, but it’s not my idea. I think that’s the key to success as well.

Airlines 111
article thumbnail

Averting turbulence in the air

CIO Business Intelligence

She is also mindful of security: “Is it too adventurous to book the ticket through an unfamiliar travel agency, or should I book through the airline itself?” is asking all merchants to have an “automated” technical solution for their public-facing web applications—meaning a web-based application firewall (WAF) is now a must.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

I’ve spoken about this before, about managed service providers or MSPs. I want to talk more about the privileged position they have when it comes to these larger threat. MUSIC} VAMOSI: In EP 49, I talked with Huntress, a managed service provider that discovered the ransomware affecting customers of Keysea.

article thumbnail

CIOs Want To Know: How Secure Is Your Mobile Phone?

The Accidental Successful CIO

I have an excellent example for you to ponder. Should mobile phone users be concerned about relying on their mobile phones for text messaging based two-factor authentication? All this talk of ways that mobile phones can be attacked can get people to start thinking “should I be doing something to protect myself?”

Mobile 246
article thumbnail

SeanDaniel.com [tech]: How to use your Home Server as an AirPrint.

Sean Daniel

As I move more and more of my computing and data to the Cloud with services like SkyDrive. I am reducing the amount of computing power I have in my house. I have an iPad (v1), a Laptop, and of course my Windows Home Server. But obviously, I have iOS5 on all my devices, so that wasn’t an option.

How To 64
article thumbnail

CIOs Need To Know Why Antivirus Software Can Create False Security

The Accidental Successful CIO

This is part of the reason that Microsoft went so far as to incorporate a security firewall into the Windows 10 operating system. Antivirus software can prevent common attacks such as phishing emails that try to get users to click on a bad link or an infected banner ad on a web page. Antivirus software can only detect known viruses.

Software 127
article thumbnail

How to Protect Your WooCommerce Site from Hackers and Secure Your Customer Data?

Galido

How Can I Secure My WooCommerce Store? Brute force attacks occur when hackers have access to a pre-guessed database of millions of user IDs and passwords, which they set to automatically apply on a website’s login page with the use of bots until the correct login credential and password combination is found.