Results for

Sort by:
  • Blog
    September 12, 2019
    It’s a common scenario. Your organization has recently migrated to Microsoft Office 365 (O365). Laptop hardware and software has been updated. Your users are prepped and ready to start using a tool that will let them create and collaborate more efficiently. As the IT project leader and a power user, you think to yourself, “Great, now I can move all my OneNote files to my personal OneDrive!” You…
  • Blog
    September 20, 2019
    In order to enhance their approaches to cyber and other risks, many organizations are integrating security, privacy, policy and controls into their DevOps lifecycle, processes and tools. As the DevSecOps trend gains momentum, we anticipate more organizations will make threat modeling, risk assessment and security automation integral components of their product development initiatives, from…
  • Blog
    September 24, 2019
    The California legislature finished its 2019 session on Friday, September 13, marking the end of opportunities to make changes before the bill goes into effect on January 1, 2020. In sum, five of six CCPA amendments were passed during the 2019 legislative session.  Among the changes and clarifications included in the amendments, the most noteworthy include: 1) AB 25 exempts for one year the…
  • Blog
    September 27, 2019
    Remember how crazy things were last year at this time, when the world was wondering what impact the General Data Protection Regulation (GDPR) would have? The European Union regulation on data protection and privacy for all individual citizens of the European Union and the European Economic Area, which also addresses the transfer of personal data outside the EU and EEA areas was definitely top of…
  • Blog
    October 3, 2019
    By 2021, cybercrime is likely to cost the world $6 trillion each year. Cyber risk quantification helps businesses understand the real costs of not adequately preparing for and protecting against cyber threats. Cyber risk quantification uses industry-leading and highly-vetted probabilisitic models to more accurately describe the cybersecurity and technology-based risks facing an organization. This…
  • Blog
    October 11, 2019
    Enterprise reporting and analytics are constantly evolving, both as new technology is introduced, and as organizational requirements change. The need for an agile, flexible solution that can quickly deliver meaningful business value has never been more critical. Software vendors are addressing these requirements in various ways and, almost without exception, the infrastructure of choice is cloud…
  • Blog
    October 14, 2019
    The cybersecurity landscape is littered with failed data loss prevention (DLP) initiatives. Perhaps surprising to many, most of these failures are the result of positioning DLP as a tool. Let’s be clear: an effective DLP is not a feature. It’s not a product. It’s not a tool. Rather, it is an ecosystem, or a mindset around the number of people, processes and technologies that must be bound…
  • Blog
    March 2, 2020
    It seems as if we are in a constant race against time to ensure our software stays within the mainstream maintenance window – most notable as of late is the sunsetting of SAP ERP (ECC) 6.0. While organizations may be at varying steps on their S/4HANA journey, we encourage them to not lose sight of their GRC application reaching the end of its mainstream maintenance December 31 of this year (…
  • Blog
    March 3, 2020
    It’s a fairly typical scenario: a company’s executive team has agreed to make the move from Oracle E-Business Suite (EBS) to Oracle Cloud and all eyes turn to Finance and IT leadership to make it happen. A project this significant and complex can be overwhelming, and with so many critical tasks happening simultaneously, it is not uncommon to overlook key activities. To ensure organizations do not…
  • Blog
    March 4, 2020
    This was originally published as a Protiviti Flash Report on February 28, 2020. Researchers at Singapore University of Technology and Design uncover major security vulnerabilities that could expose thousands of IoT devices to cyberattack IoT Vulnerabilities on the Rise A recently discovered set of Bluetooth-related vulnerabilities could mean thousands of IoT devices are vulnerable to attack…
Loading...