Remove Airlines Remove Authentication Remove Internet Remove Network
article thumbnail

Averting turbulence in the air

CIO Business Intelligence

The diversification of payment methods and gradual increase in the volume of online transactions have cast a spotlight on the need for payment security compliance within the airline industry. Since Erin has a limited budget, one of the first things she might do is go to the internet and browse through meta-search engines looking for a deal.

article thumbnail

Want to change the world? ‘Secure’ the Next Killer App in IoT

The Investing Edge

“What’s the next killer app in the Internet of Things?”. to iWatch: The Internet of Things” suggested several groundbreaking ideas that might be in the running. For example, data off airline engines is collected to predict – and prevent – anomalies in the engine throughout the flight. Pick one: this is a requirement.

Security 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Fed Tech News Roundup 8 July 2015

CTOvision

The Army, therefore, is planning to further incorporate the open VICTORY network development standard. However, more recent network information going back to late May could be. Privileged user authentication and PKI are. Marine Corps, Interior Dept. The transparency.

Insurance 150
article thumbnail

10 emerging innovations that could redefine IT

CIO Business Intelligence

Physical security of digital systems When most IT people think of computer security, they think of clever hackers who infiltrate their systems through the internet. They worry about protecting the digital data that’s stored in databases, networks, or servers. Chance of succeeding: It’s already here but only in cryptocurrency worlds.

Tools 140
article thumbnail

Building Identity Systems on the Sovrin Network

Phil Windley

Summary: An identity metasystem like the Sovrin Network provides the foundation for creating tens of millions of interoperable identity systems for every conceivable context and use. Perhaps the most familiar example of a metasystem is the internet. I've spoken about the Sovrin Network as an identity metasystem before.

System 87
article thumbnail

Generative Identity

Phil Windley

This article describes the implementation self-sovereign identity through protocol-mediated credential exchange on the self-sovereign internet, examines its properties, and argues for it generative nature from those properties. The self-sovereign internet is labeled "Layer Two" in this figure. Verifiable Credentials.

article thumbnail

The Sony Hack in Context

CTOvision

As this case so amply demonstrates, even a single network breach can have profound impacts on national security. It’s far easier to target and penetrate corporate networks, via email, web exploits, and other means, than it is to penetrate and manipulate infrastructure systems, but the effort to do so is ongoing.