Remove Airlines Remove Authentication Remove Systems Administration Remove Systems Review
article thumbnail

Averting turbulence in the air

CIO

The diversification of payment methods and gradual increase in the volume of online transactions have cast a spotlight on the need for payment security compliance within the airline industry. Understanding the business of the airline industry As previously mentioned, the revenue streams are becoming diversified in the airline sector.

Airlines 130
article thumbnail

Fed Tech News Roundup 8 July 2015

CTOvision

Information Security: Cyber Threats and Data Breaches Illustrate Need for Stronger Controls across Federal Agencies, July 08, 2015 GAO Info Security (Today) - What GAO FoundFederal systems face an evolving array of cyber-based threats. Privileged user authentication and PKI are. Marine Corps, Interior Dept. The transparency.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Modern GRC: What is Change and How to Adapt

Saviynt

Last week, at the Saviynt Converge Conference, I remembered how many things have changed in the past year, as with most year-end reviews. These types of reviews have been something that I have tried to comprehend and embrace. The review and change in policy actually had additional benefits to the company, beyond what was expected.

article thumbnail

Modern GRC: What is Change and How to Adapt

Saviynt

Last week, at the Saviynt Converge Conference, I remembered how many things have changed in the past year, as with most year-end reviews. These types of reviews have been something that I have tried to comprehend and embrace. The review and change in policy actually had additional benefits to the company, beyond what was expected.

article thumbnail

Biometric Data and Its Use for Person Authentication and Identification

Altexsoft

A password is only one of the standard security methods, a unique combination of characters you create and use as a key to authenticate yourself with. With the advances of biometric technologies, a new concept of authentication with “what you are” emerged, presenting a more secure and convenient way to validate a person.