Remove Airlines Remove Authentication Remove Network
article thumbnail

How Southwest’s CIO modernized the airline through turbulent times

CIO Business Intelligence

Taking the helm as CIO is a major transition for any IT leader, but Lauren Woods’ experience at Southwest Airlines stands apart. I ended up leaning on my partners in the business and learning so much from them about how our airline worked and what it was like on the operational side,” she says. “It

Airlines 262
article thumbnail

Case in point: taking stock of the CrowdStrike outages

CIO Business Intelligence

In a lawsuit the airline filed in October, Delta claimed the faulty update was pushed out in an unsafe manner and CrowdStrike should pay for the losses. Akamai also has other measures in place to reduce the risk of problems third-party software causes, including microsegmentation and identity-based authentication and access controls.

CTO Hire 281
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

It's 2017 and changing other people's flight bookings is incredibly easy

Network World

The travel booking systems used by millions of people every day are woefully insecure and lack modern authentication methods. This allows attackers to easily modify other people's reservations, cancel their flights and even use the refunds to book tickets for themselves, according a team of researchers who analyzed this online ecosystem.

Hotels 170
article thumbnail

Building Identity Systems on the Sovrin Network

Phil Windley

Summary: An identity metasystem like the Sovrin Network provides the foundation for creating tens of millions of interoperable identity systems for every conceivable context and use. This metasystem is in effect a system of systems that exposes a unified interface much like a device driver or network socket does. Identity Systems.

System 87
article thumbnail

Washington lawmakers consider rules restricting robocalls and holding telecoms accountable

GeekWire

Gombosky noted that telecom companies are monitoring their networks for patterns such as large volumes and short duration calls to identify and report “bad actors” to enforcement agencies. Cell companies are also deploying caller ID authentication technology, he said.

article thumbnail

Fed Tech News Roundup 8 July 2015

CTOvision

The Army, therefore, is planning to further incorporate the open VICTORY network development standard. However, more recent network information going back to late May could be. Privileged user authentication and PKI are. Marine Corps, Interior Dept. The transparency.

Insurance 150
article thumbnail

What Is Disaster Recovery as a Service?

SecureWorld News

Modern DRaaS providers can allow clients to flexibly adjust the amount of resources they require such as RAM, CPU, storage space, data security, and network bandwidth, among other things. Moreover, the outage impacted 100% of the transportation and airlines sector, leading to flight and delivery delays.