Results for

Sort by:
  • Blog
    December 7, 2022
    There is nothing worse than unplanned downtime. Whether it’s your personal vehicle or a manufacturing plant, unplanned downtime is one of the most disruptive things that can occur delaying schedules and incurring significant costs. One of the other least favorite occurrences for someone that owns a physical asset is paying for maintenance when it’s not needed. What if we had a dynamic solution…
  • Blog
    December 12, 2022
    According to the annual Sonatype State of the Software Supply Chain Report, open source software (OSS) consumption is growing at an estimated 33% annually across the primary OSS ecosystems - namely, Java (Maven), .NET (nuget), Javascript (npmjs) and Python (PyPI). As such, it is important to understand the risks and benefits of using OSS and the role proper governance plays in enabling…
  • Blog
    December 13, 2022
    Depending on whom one asks, digital twin technology has been around since 1991, 2002 or 2010. In the past few years, however, interest in digital twins for manufacturing has intensified for two critical reasons: a scarcity of workers and a scarcity of raw materials. While digital twins have been gaining popularity for several years, businesses since the pandemic see these virtual representations…
  • Blog
    December 14, 2022
    Five years ago, we wrote a post called "The 8 Character Password is Dead,” which was an in-depth look at password cracking in 2017 and how eight-character passwords do not adequately protect organizations. In that analysis, we broke down the math and how quickly hardware purchased for under $5,000 could make an eight-character length irrelevant. Unfortunately, in just five years’ time, the…
  • Blog
    December 15, 2022
    This year, our leading experts came together to address some of the most game-changing topics in the SAP space. Here are Protiviti’s most popular SAP insights from 2022 as you look ahead to the new year. By and large, these topics will remain important for your success in 2023. Read our top five most-read pieces below. #1. Case Study: Selecting a Conversion Type for SAP BW/4HANA…
  • Blog
    January 3, 2023
    Threat actors are an ever-evolving species. Portrayed in popular advertising as guys dressed in black, probably sporting a ski mask, the harsh reality is that these bad actors are everywhere and are getting more creative by the day. Just when an organization’s security systems have been upgraded to avoid the latest threats, new challenges appear on the horizon. Staying steps ahead of these…
  • Blog
    January 4, 2023
    The first formal mention of environmental, social and governance (ESG) principles appeared some 18 years ago in the United Nations Global Compact initiative, which garnered support from financial institutions across the world. During the next decade-and-a-half, and without much notice, ESG slowly gained steam. But outcries to address climate change in recent years, as well as social and gender…
  • Blog
    January 10, 2023
    Business leaders may have heard of quantum computing, but many are not yet aware of its incipient threat to cryptography and cryptocurrency. When these machines reach a sufficient level of performance, they will be able to easily factor prime numbers, which poses a threat to RSA. Only a few realize that the time to prepare for the conundrum of post-quantum risk is now. In quantum computing, the…
  • Blog
    January 11, 2023
    In Protiviti’s recent post, Easy As CPQ: Launching A Successful Sales Cycle, we outlined the Configure, Price Quote phase of the Q2C process. The next critical step in a company’s quote-to-cash (Q2C) process, and one that helps solidify accurate revenue collection, reporting and a good customer experience, is contract creation and execution. During this phase, any prior negotiations are…
  • Blog
    September 15, 2021
    Often, companies are so focused on getting to an optimal and secured environment across their SAP business applications and information systems landscape, they overlook the importance of connecting the dots to a broader identity access strategy, establishing the appropriate governance policies and ongoing processes to meet business, legal, security, risk, compliance and other organizational needs…
Loading...