Remove Airlines Remove Authentication Remove Software Development
article thumbnail

How Southwest’s CIO modernized the airline through turbulent times

CIO Business Intelligence

Taking the helm as CIO is a major transition for any IT leader, but Lauren Woods’ experience at Southwest Airlines stands apart. I ended up leaning on my partners in the business and learning so much from them about how our airline worked and what it was like on the operational side,” she says. We’re a better airline for it,” she says.

Airlines 262
article thumbnail

Amazon's Latest Data Breach a Ripple Effect of MOVEit

SecureWorld News

MOVEit, a file transfer software developed by Progress Software, was exploited by the Cl0p ransomware group, which used a Zero-Day vulnerability to steal sensitive data from organizations using the software. Shortly after the attacks, the SEC launched an investigation into Progress Software.

Data 117
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Two Reasons Why Apache Cassandra Is the Database for Real-Time Applications

CIO Business Intelligence

Think of the modern applications and workloads that have to be reliable, like online banking services, or those that operate at huge, distributed scale, such as airline booking systems or popular retail apps. If acting quickly on business data is where an organization needs to be, then Cassandra can help get there.

article thumbnail

Why enterprise CIOs need to plan for Microsoft gen AI

CIO Business Intelligence

For many enterprises, Microsoft provides not just document and email storage, but also the root of enterprise identity for those data sources, as Vadim Vladimirskiy, CEO of software developer Nerdio, points out. Virgin Atlantic VP technology and transformation Gary Walker suggests organizations start there.

Microsoft 340
article thumbnail

NASCO data breach exposes 800k users

Dataconomy

Understanding the MOVEit hack and its widespread impact This security breach was carried out through a zero-day exploit, a cyberattack taking advantage of a vulnerability unknown to software developers or antivirus providers. This exploit allows attackers to spot and exploit system vulnerabilities before they are addressed.

Data 80
article thumbnail

10 emerging innovations that could redefine IT

CIO Business Intelligence

Reliable computing Trustworthy systems have always been the goal for developers but lately some high-profile events are convincing some IT managers that better architectures and practices are necessary. Developers are re-evaluating their microservice and massive monolayers with an eye toward understanding how and when they collapse.

Tools 363
article thumbnail

26 essential book recommendations by and for IT leaders

CIO Business Intelligence

Next time you settle into your airline seat, it might be worth setting aside the reports and spreadsheets and instead turn this time into an opportunity for big-picture thinking. It is imperative for technology leaders to be authentic, honest, candid, and transparent — in the pursuit of being trusted.”

CTO Hire 342