Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Blogs December 16, 2022 A New Value Chain Paradigm: Microsoft’s New Supply Chain Platform Protiviti was very pleased to announce its exclusive partnership with Microsoft as the launch of the new Microsoft Supply Chain Platform was unveiled. As a platform that integrates the value chain beyond an enterprise’s four walls, the Microsoft Supply Chain Platform enables collaborations with upstream and downstream partners to deliver transparency and orchestrate the… Blogs February 23, 2024 The importance of dark web monitoring In today’s interconnected world, where adversaries seem to always be one step ahead, companies face an increasingly complex threat landscape. One of the most challenging and often overlooked threats is the dark web, an intentionally hidden part of the internet where threat actors can operate with a greater sense of anonymity. To adequately protect assets, companies need to do more than merely… Blogs April 6, 2023 Migrating Security from Microsoft Dynamics 365 Finance and Supply Chain Management This blog post was authored by Julia Artzi - Consultant, Sarah Guthrie - Senior Consultant, Enterprise Application Solutions on The Technology Insights Blog. Microsoft Dynamics 365 Finance and Supply Chain Management (D365 F&SCM) publishes security changes with new code releases. These changes are automatically applied to out-of-the-box security roles,… Podcast Transcript March 28, 2023 Transcript | Future of Crypto Innovation and Regulation Over the past year, as one crypto organisation after another has been beset by fraud or declared bankruptcy, countless headlines have surfaced warning of the death of the crypto industry. Yet the damage has been largely contained. The developments have raised many questions about digital assets, cryptocurrency and blockchain technology as well as regulation and other factors that may help the… Blogs July 14, 2023 A fresh take on cloud transformation Cloud transformation is a process of moving applications, data and infrastructure to the cloud. Such simple definitions lack any sense of the business drivers or anticipated benefits that transformation strategies ought to encompass. After undertaking a “transformation” according to these simpler definitions, businesses are left operating in the same old way, making use of the same… Blogs November 22, 2023 Thinking beyond the 7Rs of cloud migration In a recent blog, we introduced the drivers for cloud migration, the strategies and the most common types of cloud migrations available to organisations. Today, we take a closer look at what drives a successful cloud migration and think beyond the 7Rs of migration to embrace a transformative approach to modern cloud migrations. Blogs April 6, 2023 Why Data Governance Programmes Are Easy to Envision, Difficult to Sustain I am often asked, with all the investments in data management and infrastructure over the last 50 years, why are we still not great with governing data? To put it simply and directly – it’s hard! Data governance programmes are easy to envision conceptually, difficult to implement, and without proper care, impossible to sustain. Often data governance investments have a long ‘time to… Podcast September 12, 2023 Podcast | The Evolution of SOX: Tech Adoption and Cost Focus Amid Business Changes, Cyber and ESG Mandates In this episode, we dive into SOX compliance – specifically, the findings of and key takeaways from Protiviti’s latest Sarbanes-Oxley Compliance Survey. The results of our research are featured in our just-released report, The Evolution of SOX: Tech Adoption and Cost Focus Amid Business Changes, Cyber and ESG Mandates.The 2024 - Empowering the progress of SOX innovation is out now. Read now.… Blogs January 11, 2023 For $62.59, the 8 Character Password is Still Dead Five years ago, we wrote a post called “The 8 Character Password is Dead,” which was an in-depth look at password cracking in 2017 and how eight-character passwords do not adequately protect organisations. In that analysis, we broke down the math and how quickly hardware purchased for under $5,000 could make an eight-character length irrelevant. Unfortunately, in just five years’ time, the… Blogs April 21, 2023 Enhancing cyber capabilities using a threat-driven strategy Senior leaders focused on cybersecurity recognise there is considerable guidance, best practices, frameworks, regulations and varied opinions on how programmes should design defensive capabilities. In addition, depending on the day, the various pressures in the organisation’s macro-environment may be greater or lesser and invite different priorities for time, team and budget. Despite these… Load More