Insight Search

Sort by:
  • Blogs

    April 6, 2023
    With so many changes to contend with in what feels like a never-ending series of unforeseeable events impacting people, processes, innovation, infrastructure and industries the world over, it’s a time of heightened risk and change on so many levels. Globally, banks are faced with increasing regulatory scrutiny that has in some cases resulted in a pivot to the organisational strategy, resource…
  • Blogs

    May 15, 2022
    Microsoft Dynamics 365 Finance & Operations provides a database logging feature that can be used to track insert, update, delete, and rename key operation changes made to tables and fields in the application. Database logging is a valuable feature of Microsoft Dynamics 365 used to provide a chronological record of changes that occur within the application. Each record contains details of the…
  • Client Story

    December 19, 2022
    Governmental agencies can be seen as slow to adopt new processes, but when the COVID-19 pandemic hit, this foreign defense agency needed to make a quick shift to remote working for both civilian and non-civilian employees while maintaining a high level of readiness. They urgently rolled out Microsoft 365 to enable remote work and communication for approximately 60,000 of their approximately 150,…
  • Blogs

    December 12, 2022
    This blog post was authored by Anthony Hodgkinson, Director and Forensic Leader, Asia-Pacific, Protiviti Forensic, Australia on The Protiviti View.The festive season is a time for fun and good cheer. Your business is celebrating the end of the calendar year and staff are counting down the days before their extended holidays begin. But be warned – the holidays are also a peak season for…
  • Whitepaper

    October 22, 2020
    Contrary to popular belief, criminals — insiders or outsiders — are not the most common cause of major operational failures. Technology is the biggest culprit. The rapid adoption of artificial intelligence (AI), blockchain, robotic process automation (RPA), cloud computing and other technologies continues to transform finance. It has created a mix of technological risks that frequently disrupt…
  • Whitepaper

    November 21, 2022
    We are in unusual economic times. While making predictions may be a fool’s errand, the aggressive posturing among central banks to fight runaway inflation implies that we will soon be — if not already are — in the late stage of the economic cycle. However, considering the past several months of mixed economic data, the outcome of the downturn and the developments that drive it are likely to look…
  • Podcast

    June 12, 2024
    When Richard Feynman proposed the idea of a quantum simulator or computer in 1981, he was frustrated by the limitations of classical systems. He logically suggested that if we live in a quantum world, we need a quantum device to simulate all the interactions of particles that make up reality. An excellent example of such a transistor-choking calculation is the quantum many-body problem. Have…
  • Newsletter

    December 11, 2020
    Emerging risks are newly developing risks that cannot yet be fully assessed but could, in the future, affect the viability of an organisation’s strategy and business model. A risk-savvy culture sometimes needs an informal adhocracy to identify emerging risks in a timely manner. While every organisation has a risk assessment process, we often hear that the process as it exists now is too static…
  • Podcast Transcript

    July 27, 2023
    ChatGPT is the talk of the town today. But as we all know, generative AI is much more than this one tool. Gen AI represents a new frontier of promise, productivity and capabilities for organisations around the world. But it also comes with risks that these organisations must understand and manage if they’re going to capitalise successfully on these new technologies.In this episode, we talk all…
  • Blogs

    September 9, 2021
    Over the July 4, 2021 weekend, the Russia-based REvil hacker group perpetrated a ransomware attack on Kaseya software. The software is used by managed service providers (MSPs) to operate their clients’ networks. This attack reportedly shut down 800-1,500 small-to-mid-size clients of around 50 Kaseya MSP customers. The attack illustrates the evolution of ransomware. Historically,…
Loading...