Remove Airlines Remove Authentication Remove Systems Review
article thumbnail

Case in point: taking stock of the CrowdStrike outages

CIO

What happened In CrowdStrikes own root cause analysis, the cybersecurity companys Falcon system deploys a sensor to user machines to monitor potential dangers. In a lawsuit the airline filed in October, Delta claimed the faulty update was pushed out in an unsafe manner and CrowdStrike should pay for the losses. Clancy asks.

article thumbnail

How Southwest’s CIO modernized the airline through turbulent times

CIO

Taking the helm as CIO is a major transition for any IT leader, but Lauren Woods’ experience at Southwest Airlines stands apart. Focused on growth, the company’s leadership had deprioritized modernizing internal systems, hiring IT staff, and updating internal processes to keep pace with its growth agenda.

Airlines 157
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Airline Ticket Fraud and How Big Companies Avoid It

Altexsoft

The airline industry is no different. Over the past two decades, the airline industry – like many others – has become increasingly digital. If you’ve read an AltexSoft article on revenue integrity in airlines , you know that ticket manipulations are one of the main sources of revenue leakage.

article thumbnail

Managing an Online Travel Agency: How Back Office System of an OTA Works

Altexsoft

Being big complex systems, with tons of connectivity channels, providers, travelers and many solutions that have to be heavily managed, OTAs have a lot happening on the administrative side. The provider must issue a ticket (in case of airlines) or send a booking confirmation (hotels). is carefully documented in a CRM system.

Travel 89
article thumbnail

Fed Tech News Roundup 8 July 2015

CTOvision

Information Security: Cyber Threats and Data Breaches Illustrate Need for Stronger Controls across Federal Agencies, July 08, 2015 GAO Info Security (Today) - What GAO FoundFederal systems face an evolving array of cyber-based threats. Privileged user authentication and PKI are. Marine Corps, Interior Dept. The transparency.

article thumbnail

Biometric Data and Its Use for Person Authentication and Identification

Altexsoft

A password is only one of the standard security methods, a unique combination of characters you create and use as a key to authenticate yourself with. With the advances of biometric technologies, a new concept of authentication with “what you are” emerged, presenting a more secure and convenient way to validate a person.

article thumbnail

The Sony Hack in Context

CTOvision

So let’s take a step back and briefly review the big picture, economically, militarily and politically, in which the Sony attack resides. At most, this is perhaps 1% of the costs US companies will incur this year due to computer compromises. Economic Losses. By some estimates, the costs to Sony could stretch to as much as $100 million.

Security 153