article thumbnail

United Airlines CISO Deneen DeFiore on elevating cyber’s value to the business

CIO Business Intelligence

Deneen DeFiore is a Hall of Fame technology executive who currently serves as vice president and chief information security officer at United Airlines, where she leads the cybersecurity and digital risk organization to ensure the company is prepared to prevent, detect, and respond to evolving cyber threats. What are they?

article thumbnail

Averting turbulence in the air

CIO Business Intelligence

The diversification of payment methods and gradual increase in the volume of online transactions have cast a spotlight on the need for payment security compliance within the airline industry. Understanding the business of the airline industry As previously mentioned, the revenue streams are becoming diversified in the airline sector.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Passwords Are Ruining the Web

Phil Windley

Chances are, if you're like me, that you pick up your phone and use a biometric authentication method (e.g. Then, if you use multi-factor authentication (and you should), you get to open up your phone, find the 2FA app, get the code, and type it in. This experience is replicated on any web site that requires authentication.

article thumbnail

How Southwest’s CIO modernized the airline through turbulent times

CIO Business Intelligence

Taking the helm as CIO is a major transition for any IT leader, but Lauren Woods’ experience at Southwest Airlines stands apart. I ended up leaning on my partners in the business and learning so much from them about how our airline worked and what it was like on the operational side,” she says. We’re a better airline for it,” she says.

article thumbnail

10 emerging innovations that could redefine IT

CIO Business Intelligence

The main constituency: Any developer who will happily trade a bit of precision for a big savings in electricity. Reliable computing Trustworthy systems have always been the goal for developers but lately some high-profile events are convincing some IT managers that better architectures and practices are necessary.

Tools 130
article thumbnail

NASCO data breach exposes 800k users

Dataconomy

Understanding the MOVEit hack and its widespread impact This security breach was carried out through a zero-day exploit, a cyberattack taking advantage of a vulnerability unknown to software developers or antivirus providers. Moreover, using two-factor authentication and employing reputable antivirus software adds an extra layer of security.

Data 80
article thumbnail

Want to change the world? ‘Secure’ the Next Killer App in IoT

The Investing Edge

Mike Helfrich of Blue Force Development , a company that does a lot of work with the Department of Defense, has been deploying data-collecting and data-sharing devices on the battlefield. For example, data off airline engines is collected to predict – and prevent – anomalies in the engine throughout the flight.

Security 119