Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog December 7, 2022 Predictive Maintenance: Why It Matters; How It Works There is nothing worse than unplanned downtime. Whether it’s your personal vehicle or a manufacturing plant, unplanned downtime is one of the most disruptive things that can occur delaying schedules and incurring significant costs. One of the other least favorite occurrences for someone that owns a physical asset is paying for maintenance when it’s not needed. What if we had a dynamic solution… Blog December 12, 2022 Taming Open Source Risk According to the annual Sonatype State of the Software Supply Chain Report, open source software (OSS) consumption is growing at an estimated 33% annually across the primary OSS ecosystems - namely, Java (Maven), .NET (nuget), Javascript (npmjs) and Python (PyPI). As such, it is important to understand the risks and benefits of using OSS and the role proper governance plays in enabling… Blog December 13, 2022 Digital Twin Applications in Manufacturing. Depending on whom one asks, digital twin technology has been around since 1991, 2002 or 2010. In the past few years, however, interest in digital twins for manufacturing has intensified for two critical reasons: a scarcity of workers and a scarcity of raw materials. While digital twins have been gaining popularity for several years, businesses since the pandemic see these virtual representations… Blog December 14, 2022 For $62.59, the 8 Character Password is Still Dead Five years ago, we wrote a post called "The 8 Character Password is Dead,” which was an in-depth look at password cracking in 2017 and how eight-character passwords do not adequately protect organizations. In that analysis, we broke down the math and how quickly hardware purchased for under $5,000 could make an eight-character length irrelevant. Unfortunately, in just five years’ time, the… Podcast January 11, 2023 Podcast | Preventing Hacking with Quantum Computing and other InfoSec Topics – with Mark Carney from Quantum Village We’ve talked about how quantum computers are enabling extraordinary use cases now, long before the machines will threaten cryptography. Some of these applications can even help companies protect against immediate security threats and vulnerabilities. We explore one such exciting experiment: Using quantum to stop kill chains that allow network exploitation and the Chinese paper causing all the… Newsletter January 12, 2023 The Top Risks for 2023: A Global View The global survey of C-level executives and directors, focused on macroeconomic, strategic and operational risks, highlights the influence of the economy, people and culture issues, supply chain risks, and technology impacts on the 2023 risk landscape. The survey was conducted online in the September — October 2022 time frame to capture perspectives on 38 risks on the minds of business leaders as… News January 9, 2023 United Nations Executive Secretary Talks with Protiviti: ‘We Need Private Sector Engagement, Investment to Solve Environmental Crises’ Client Story January 6, 2023 Cloud-based Healthcare Analytics Company Expands Solutions and Customers d2i is a cloud-based healthcare analytics solutions firm that’s on the move. The company provides an unparalleled data analytics application that aggregates, harmonizes and enriches diverse data sources to some of the largest hospital emergency departments (ED) in the United States. The company currently extracts Electronic Health Record (EHR) data into their environment for over 240 hospitals.… Landing Page Top Risks 2023 CTA ESG Landing Page Top risks 2023 CTA Talent and Culture Load More