article thumbnail

Averting turbulence in the air

CIO

The diversification of payment methods and gradual increase in the volume of online transactions have cast a spotlight on the need for payment security compliance within the airline industry. Understanding the business of the airline industry As previously mentioned, the revenue streams are becoming diversified in the airline sector.

Airlines 130
article thumbnail

Fed Tech News Roundup 8 July 2015

CTOvision

Information Security: Cyber Threats and Data Breaches Illustrate Need for Stronger Controls across Federal Agencies, July 08, 2015 GAO Info Security (Today) - What GAO FoundFederal systems face an evolving array of cyber-based threats. However, more recent network information going back to late May could be. Marine Corps, Interior Dept.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Modern GRC: What is Change and How to Adapt

Saviynt

Last week, at the Saviynt Converge Conference, I remembered how many things have changed in the past year, as with most year-end reviews. These types of reviews have been something that I have tried to comprehend and embrace. The review and change in policy actually had additional benefits to the company, beyond what was expected.

article thumbnail

Modern GRC: What is Change and How to Adapt

Saviynt

Last week, at the Saviynt Converge Conference, I remembered how many things have changed in the past year, as with most year-end reviews. These types of reviews have been something that I have tried to comprehend and embrace. The review and change in policy actually had additional benefits to the company, beyond what was expected.

article thumbnail

Biometric Data and Its Use for Person Authentication and Identification

Altexsoft

In this article, we’ll explore what biometrics are, which data is used for different types of biometric systems, and how to adopt one. Biometrics create a secure and reliable way to access a system or application as the data on your one-of-a-kind physical traits can’t be lost, replicated, or guessed. Biometric system operations.