Remove Airlines Remove Authentication Remove Development Remove Network
article thumbnail

Averting turbulence in the air

CIO Business Intelligence

The diversification of payment methods and gradual increase in the volume of online transactions have cast a spotlight on the need for payment security compliance within the airline industry. Understanding the business of the airline industry As previously mentioned, the revenue streams are becoming diversified in the airline sector.

article thumbnail

How Southwest’s CIO modernized the airline through turbulent times

CIO Business Intelligence

Taking the helm as CIO is a major transition for any IT leader, but Lauren Woods’ experience at Southwest Airlines stands apart. I ended up leaning on my partners in the business and learning so much from them about how our airline worked and what it was like on the operational side,” she says. We’re a better airline for it,” she says.

Airlines 104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

NASCO data breach exposes 800k users

Dataconomy

Understanding the MOVEit hack and its widespread impact This security breach was carried out through a zero-day exploit, a cyberattack taking advantage of a vulnerability unknown to software developers or antivirus providers. Moreover, using two-factor authentication and employing reputable antivirus software adds an extra layer of security.

Data 80
article thumbnail

10 emerging innovations that could redefine IT

CIO Business Intelligence

The main constituency: Any developer who will happily trade a bit of precision for a big savings in electricity. They worry about protecting the digital data that’s stored in databases, networks, or servers. Now developers need to take this to the next level by adding even better protections.

Tools 145
article thumbnail

Fed Tech News Roundup 8 July 2015

CTOvision

The Army, therefore, is planning to further incorporate the open VICTORY network development standard. However, more recent network information going back to late May could be. Privileged user authentication and PKI are. Marine Corps, Interior Dept. The transparency.

Insurance 150
article thumbnail

Want to change the world? ‘Secure’ the Next Killer App in IoT

The Investing Edge

Mike Helfrich of Blue Force Development , a company that does a lot of work with the Department of Defense, has been deploying data-collecting and data-sharing devices on the battlefield. For example, data off airline engines is collected to predict – and prevent – anomalies in the engine throughout the flight.

Security 119
article thumbnail

Building Identity Systems on the Sovrin Network

Phil Windley

Summary: An identity metasystem like the Sovrin Network provides the foundation for creating tens of millions of interoperable identity systems for every conceivable context and use. This metasystem is in effect a system of systems that exposes a unified interface much like a device driver or network socket does. Identity Systems.

System 87