Results for

  • Blog
    October 25, 2022
    Often, there exists the need to perform one-time and regular reviews of Identity and Access Management (IAM) health to answer some of the basic, yet critical questions security professionals care about: Who is entitled to perform what actions against what resources? Are there orphan identities? Am I granting service access to identities that do not utilize them? Last accessed feature and…
  • Blog
    April 12, 2018
    ** Today’s post is provided by guest blogger Veronica, an Experienced Consultant in our Technology Consulting practice ** Last week, I was fortunate enough to attend the Women in Cybersecurity Conference (WiCyS) in Chicago! The event is a two day conference packed with information sessions, guest speakers and opportunities to network.  The conference was hugely impactful in…
  • Podcast Transcript
    July 25, 2022
    To kick off our 2022 Risky Women Radio podcast series, Kimberley Cole speaks with Senior Risk and Compliance Leaders at Protiviti, Carol Beaumier and Bernadine Reese about financial services industry compliance priorities for 2022.
  • Blog
    March 8, 2018
    Security researchers have identified a flaw, present in most computer processors, that allows unauthorized disclosure of information. The flaw, which affects most major processor manufacturers, is the first known instance of a security vulnerability at the processor level, and could be exploited in servers, workstations (including laptops), network infrastructure, mobile devices, IoT devices and…
  • Blog
    March 12, 2018
    Taking advantage of a user’s poor security practices is often a critical first step for malicious hackers or other cybercriminals seeking to compromise an organization’s systems and data. More than 80 percent of hacking-related breaches leveraged stolen or weak passwords, according to research for the 2017 Data Breach Investigations Report from Verizon. The report also says that about…
  • Blog
    March 14, 2018
    Undetected Breaches and Ransomware Change How We Think About Cybersecurity As new possibilities in information technology continue to transform organizations, they may outpace any cybersecurity protections already in place. Controls that seemed adequate yesterday might not be equal to the challenges presented by new technology and ever-evolving threats today. Our issue of Board Perspectives:…
  • Blog
    March 19, 2018
    As cloud adoption accelerates within well-established businesses and emerges across nearly all industries and company sizes, security executives have been presented with thematic challenges to managing cloud governance, security, and regulatory risk.  Protiviti recently held a roundtable of Chicago-area CISOs and Security Leaders to discuss the thematic challenges, share strategies, and gain…
  • Blog
    March 20, 2018
    First, a recap of the vulnerability For the first time, performance-enhancing features of most modern processors (known as out-of-order superscalar execution, speculative prediction, and HW caching) were discovered to contain (as a unit) a flaw that allows unauthorized disclosure of information. The fact that this flaw is at the processor level differentiates it from other potential…
  • Video
    September 7, 2020
    A line-up of eminent panelists in operational resilience discussed how organisations have responded to the COVID-19 pandemic and what it means for their operational resilience planning going forward, including the potential impact on critical third party vendors.
Loading...