Remove Airlines Remove Infrastructure Remove Internet Remove Security
article thumbnail

Cathay Pacific to take cloud journey to new heights

CIO

Instead, the publicly held operator of Cathay Pacific Airlines and HK Express is shifting from migration to optimization mode in an effort to wrest additional benefits from its all-in cloud transformation. Often the issue when you’re on the infrastructure side is that one doesn’t really understand the customer pain point,” Nair says.

Airlines 298
article thumbnail

The 4 pillars of the Zscaler Zero Trust Exchange: Customers share their successes

CIO

We’ve all heard this mantra: “Secure digital transformation requires a true zero trust architecture.” As the zero trust platform provider of choice for 40% of the Fortune 500, Zscaler has long been recognized as the leader in zero trust and, by extension, cloud security. But what exactly does that mean? Zero trust has come a long way.

Security 357
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Averting turbulence in the air

CIO

The diversification of payment methods and gradual increase in the volume of online transactions have cast a spotlight on the need for payment security compliance within the airline industry. With the new, recently onboarded Payment Card Industry Data Security Standard (PCI DSS) v4.0, she wonders. Well not exactly.

Airlines 130
article thumbnail

Airline Ticket Fraud and How Big Companies Avoid It

Altexsoft

The airline industry is no different. Over the past two decades, the airline industry – like many others – has become increasingly digital. If you’ve read an AltexSoft article on revenue integrity in airlines , you know that ticket manipulations are one of the main sources of revenue leakage.

article thumbnail

Aviation security is taking off—and taking after car security

The Parallax

Twenty-nine years later, such a Hollywood storyline remains a fantasy, security researchers say. At the Aviation Village, which is largely modeled on DefCon’s Car Hacking Village , hackers explored avionics systems while chatting with systems manufacturers, and government and airline representatives. READ MORE FROM DEFCON 27.

article thumbnail

Stand By For Reporting From the Intelligence and National Security Summit 18-19 Sep 2014 #Intelligence2014

CTOvision

For the next two days in DC over 1000 key leaders from the national security community will be converging in a dynamic examination of intelligence and national security issues at the Intelligence and National Security Summit. National Security Agency. Deputy Assistant to the President and Deputy Homeland Security Advisor.

Security 110
article thumbnail

Timatic by IATA: Travel Requirements Database, Explained

Altexsoft

The biggest challenge here is creating a standardized, universally accepted, and easily implemented way for travelers, airlines, and airport staff to use in their current workflow. According to ICAO , almost all airlines are already using Timatic. A standard source of travel information data – Timatic Mainframe.

Travel 85