Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Sort by: Relevance Date Filter Search Sort by RelevanceDate Order AscDesc Blog December 7, 2022 Predictive Maintenance: Why It Matters; How It Works There is nothing worse than unplanned downtime. Whether it’s your personal vehicle or a manufacturing plant, unplanned downtime is one of the most disruptive things that can occur delaying schedules and incurring significant costs. One of the other least favorite occurrences for someone that owns a physical asset is paying for maintenance when it’s not needed. What if we had a dynamic solution… Blog December 12, 2022 Taming Open Source Risk According to the annual Sonatype State of the Software Supply Chain Report, open source software (OSS) consumption is growing at an estimated 33% annually across the primary OSS ecosystems - namely, Java (Maven), .NET (nuget), Javascript (npmjs) and Python (PyPI). As such, it is important to understand the risks and benefits of using OSS and the role proper governance plays in enabling… Blog December 13, 2022 Digital Twin Applications in Manufacturing Depending on whom one asks, digital twin technology has been around since 1991, 2002 or 2010. In the past few years, however, interest in digital twins for manufacturing has intensified for two critical reasons: a scarcity of workers and a scarcity of raw materials. While digital twins have been gaining popularity for several years, businesses since the pandemic see these virtual representations… Blog December 14, 2022 For $62.59, the 8 Character Password is Still Dead Five years ago, we wrote a post called "The 8 Character Password is Dead,” which was an in-depth look at password cracking in 2017 and how eight-character passwords do not adequately protect organizations. In that analysis, we broke down the math and how quickly hardware purchased for under $5,000 could make an eight-character length irrelevant. Unfortunately, in just five years’ time, the… Blog December 15, 2022 What You Read Most: Top Five SAP Insights from 2022 This year, our leading experts came together to address some of the most game-changing topics in the SAP space. Here are Protiviti’s most popular SAP insights from 2022 as you look ahead to the new year. By and large, these topics will remain important for your success in 2023. Read our top five most-read pieces below. #1. Case Study: Selecting a Conversion Type for SAP BW/4HANA… Blog January 3, 2023 The Evolution of Attacker Behavior: 3 Case Studies Threat actors are an ever-evolving species. Portrayed in popular advertising as guys dressed in black, probably sporting a ski mask, the harsh reality is that these bad actors are everywhere and are getting more creative by the day. Just when an organization’s security systems have been upgraded to avoid the latest threats, new challenges appear on the horizon. Staying steps ahead of these… Blog January 4, 2023 Telling Your ESG Story: Five Data Considerations The first formal mention of environmental, social and governance (ESG) principles appeared some 18 years ago in the United Nations Global Compact initiative, which garnered support from financial institutions across the world. During the next decade-and-a-half, and without much notice, ESG slowly gained steam. But outcries to address climate change in recent years, as well as social and gender… Blog January 10, 2023 The Post-Quantum Cryptography Conundrum Business leaders may have heard of quantum computing, but many are not yet aware of its incipient threat to cryptography and cryptocurrency. When these machines reach a sufficient level of performance, they will be able to easily factor prime numbers, which poses a threat to RSA. Only a few realize that the time to prepare for the conundrum of post-quantum risk is now. In quantum computing, the… Blog January 11, 2023 Create to Execute: Managing the Fine Print of Sales Contracting In Protiviti’s recent post, Easy As CPQ: Launching A Successful Sales Cycle, we outlined the Configure, Price Quote phase of the Q2C process. The next critical step in a company’s quote-to-cash (Q2C) process, and one that helps solidify accurate revenue collection, reporting and a good customer experience, is contract creation and execution. During this phase, any prior negotiations are… Blog September 15, 2021 Establishing a Successful SAP Identity Access Governance Center of Excellence Often, companies are so focused on getting to an optimal and secured environment across their SAP business applications and information systems landscape, they overlook the importance of connecting the dots to a broader identity access strategy, establishing the appropriate governance policies and ongoing processes to meet business, legal, security, risk, compliance and other organizational needs… Load More