Remove Authentication Remove Mobile Remove System Remove Systems Administration
article thumbnail

53 Questions Developers Should Ask Innovators

TechEmpower - Information Technology

” or “Are you developing for desktop, tablet, mobile, or all three?” Can you provide specific examples of different types of customers, what they need, and what the system will do for them? What’s the state of those systems? Are you targeting desktop, tablet, or mobile? Who are the customers?

article thumbnail

Ciena takes aim at the ‘ticket-less’ call center

CIO Business Intelligence

Ciena CIO Craig Williams has an ambitious mission: to deliver a ticket-less help desk experience to the networking systems, services, and software company’s 11,000 customers, employees, and contractors. Our goal is to be ticket-less, and we really didn’t have the tooling to get us there,” says Williams. “If

Cloud 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fed Tech News Roundup 8 July 2015

CTOvision

Information Security: Cyber Threats and Data Breaches Illustrate Need for Stronger Controls across Federal Agencies, July 08, 2015 GAO Info Security (Today) - What GAO FoundFederal systems face an evolving array of cyber-based threats. Privileged user authentication and PKI are. Marine Corps, Interior Dept.

Insurance 150
article thumbnail

FBI: Credential Stuffing Leads to Millions in Fraudulent Transfers

SecureWorld News

Here are two more examples cited in the recent FBI Private Industry Notification: "Between June 2019 and January 2020, a NY-based investment firm and an international money transfer platform experienced credential stuffing attacks against their mobile APIs, according to a credible financial source. Detecting credential stuffing attacks.

Banking 57
article thumbnail

Averting turbulence in the air

CIO Business Intelligence

Loyal customers are likely to book their flight tickets directly through the airline website or mobile app, whereas sporadic customers have a plethora of options, such as third-party websites, travel agencies and even the airport counter. But what if they do not store any cardholder data?

article thumbnail

For Top Cyber Threats, Look in the Mirror

Cloud Musings

When this is done, the credentials of a user accessing network resources can be instead transmitted to the attacker’s system. The next big no-no is when system administrators all use the same Local Admin password. Microsoft Windows operating systems have another embedded password weakness.

IBM 70