Remove Authentication Remove Security Remove Systems Administration Remove Technology
article thumbnail

53 Questions Developers Should Ask Innovators

TechEmpower CTO

Do you have a custom algorithm or other technology? What’s the state of those systems? Registration Do you plan to support Google Sign-In, Facebook Connect, or similar 3rd-party authentication? If so, will you also have your own account system? Are members contributing content or only system administrators?

article thumbnail

Averting turbulence in the air

CIO

The diversification of payment methods and gradual increase in the volume of online transactions have cast a spotlight on the need for payment security compliance within the airline industry. With the new, recently onboarded Payment Card Industry Data Security Standard (PCI DSS) v4.0, she wonders. Well not exactly. The PCI DSS v4.0,

Airlines 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Security for Big Data Designs: Examining best practices with security architect Eddie Garcia

CTOvision

The breakfast event focused on security for big data designs and featured the highly regarded security architect Eddie Garcia. Eddie Garcia is chief security architect at Cloudera , a leader in enterprise analytic data management. Combined with Cloudera technology, it becomes a secure and powerful enterprise architecture.

Big Data 119
article thumbnail

Thank You to Our Customers: Tenable Recognized as a March 2019 Gartner Peer Insights Customers’ Choice

Tenable

Thank you to all the customers who took the time to share your experience working with Tenable, and for trusting us to help you understand and reduce your cybersecurity risk. We've used the system to help figure out any possible security holes that we've had opened on our app and db layers along with using it for PCI compliance.”

article thumbnail

9 Types of Phishing and Ransomware Attacks—And How to Identify Them

Ivanti

End users are easily coaxed into divulging their precious personal information because of attention-grabbing headlines and authentic-looking, obfuscated or shortened hyperlinks. Pharming employs authentic-looking hyperlinks in phishing emails that redirect end users from a specific, legitimate site to a malicious one?by

article thumbnail

Fed Tech News Roundup 8 July 2015

CTOvision

Information Security: Cyber Threats and Data Breaches Illustrate Need for Stronger Controls across Federal Agencies, July 08, 2015 GAO Info Security (Today) - What GAO FoundFederal systems face an evolving array of cyber-based threats. Securities and. Privileged user authentication and PKI are. LATEST NEWS.

article thumbnail

Insider Threat: A perspective on how to address the increasing risk

CTOvision

Cyber security is one of the highest priority topics for organizations today. However, in June of 2013, a systems administrator at the National Security Agency (NSA) reminded us of the threat that already exists within an organization, behind the protection of its sophisticated, complex perimeter security.