Remove Airlines Remove Authentication Remove Information Security
article thumbnail

Case in point: taking stock of the CrowdStrike outages

CIO Business Intelligence

In a lawsuit the airline filed in October, Delta claimed the faulty update was pushed out in an unsafe manner and CrowdStrike should pay for the losses. Akamai also has other measures in place to reduce the risk of problems third-party software causes, including microsegmentation and identity-based authentication and access controls.

CTO Hire 292
article thumbnail

United Airlines CISO Deneen DeFiore on elevating cyber’s value to the business

CIO Business Intelligence

Deneen DeFiore is a Hall of Fame technology executive who currently serves as vice president and chief information security officer at United Airlines, where she leads the cybersecurity and digital risk organization to ensure the company is prepared to prevent, detect, and respond to evolving cyber threats. What are they?

Airlines 278
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Fed Tech News Roundup 8 July 2015

CTOvision

Information Security: Cyber Threats and Data Breaches Illustrate Need for Stronger Controls across Federal Agencies, July 08, 2015 GAO Info Security (Today) - What GAO FoundFederal systems face an evolving array of cyber-based threats. Privileged user authentication and PKI are. Marine Corps, Interior Dept.

Insurance 150
article thumbnail

The Sony Hack in Context

CTOvision

Similarly, notwithstanding numerous intelligence warnings of a major pending terrorist attack, nothing was done to strengthen airline or border security, much less go on the offensive against Al Qaeda, until America suffered the loss of over 3000 lives and the destruction of the World Trade Towers on September 11 th , 2001.

article thumbnail

Want to change the world? ‘Secure’ the Next Killer App in IoT

The Investing Edge

For example, data off airline engines is collected to predict – and prevent – anomalies in the engine throughout the flight. Given the massive amount of data that is being collected today (Merritt says this has grown from terabytes to petabytes daily) how do we keep information secure and who owns it is once it is collected?

Security 119