article thumbnail

Averting turbulence in the air

CIO

The diversification of payment methods and gradual increase in the volume of online transactions have cast a spotlight on the need for payment security compliance within the airline industry. With the new, recently onboarded Payment Card Industry Data Security Standard (PCI DSS) v4.0, she wonders. The PCI DSS v4.0,

Airlines 130
article thumbnail

Fed Tech News Roundup 8 July 2015

CTOvision

Information Security: Cyber Threats and Data Breaches Illustrate Need for Stronger Controls across Federal Agencies, July 08, 2015 GAO Info Security (Today) - What GAO FoundFederal systems face an evolving array of cyber-based threats. Securities and. announced that its holding company, SRA Companies, Inc.,

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Modern GRC: What is Change and How to Adapt

Saviynt

On the plane ride home, I picked up the Southwest Airlines Magazine and saw this concept being discussed by the CEO of Southwest, Gary Kelly. Putting these controls in place are not considered improvements, but by evaluating individual behaviors through periodic reviews will determine the effectiveness of your overall security.

article thumbnail

Oracle January 2022 Critical Patch Update Addresses 266 CVEs

Tenable

This CPU contains fixes for 266 CVEs in 497 security updates across 39 Oracle product families. Out of the 497 security updates published this quarter, 6.6% Medium severity patches accounted for the bulk of security patches at 46.5%, followed by high severity patches at 41.9%. Get more information.

Retail 52
article thumbnail

Modern GRC: What is Change and How to Adapt

Saviynt

On the plane ride home, I picked up the Southwest Airlines Magazine and saw this concept being discussed by the CEO of Southwest, Gary Kelly. Putting these controls in place are not considered improvements, but by evaluating individual behaviors through periodic reviews will determine the effectiveness of your overall security.

article thumbnail

Biometric Data and Its Use for Person Authentication and Identification

Altexsoft

A password is only one of the standard security methods, a unique combination of characters you create and use as a key to authenticate yourself with. With the advances of biometric technologies, a new concept of authentication with “what you are” emerged, presenting a more secure and convenient way to validate a person. Vein pattern.