Blog library

A collection of Protiviti blogs. 

Blogs

December 5, 2024

Low-code applications yield high value, big change in less time

The urgent need to develop a successful competitive strategy and align your supply chain to it has become apparent in recent years. So why haven’t successful implementations of enterprise technology systems kept pace to support this critical need? The issue is that many of the core characteristics of enterprise applications – complex configurations, lengthy...
I am often asked, with all the investments in data management and infrastructure over the last 50 years, why are we still not great with governing data? To put it simply and directly – it’s hard! Data governance programmes are easy to envision conceptually, difficult to implement, and without proper care, impossible to sustain. Often data governance investments have a long ‘time to value’ ROI, making…
Microsoft Dynamics 365 Finance and Supply Chain Management (D365 F&SCM) publishes security changes with new code releases. These changes are automatically applied to out-of-the-box security roles, duties and privileges when the code is upgraded in a given environment. However, manual migrations between development, test and production environments are required when maintaining a customised security design that…
Technical debt is no longer just a “technical” problem. As recent, widely publicised events have shown, it is a business problem that can have serious consequences for organisations. The government and Congress are taking notice of unfair consumer experiences, and it is crucial for businesses to address their technical debt and minimise the risk of negative press, government fines and damaged reputations.
Leaders of energy and utilities (E&U) businesses are becoming increasingly focused on the business impacts of rapidly evolving technology. According to Protiviti’s latest Executive Perspectives on Top Risks Survey, many of these leaders see their companies struggling over the next decade to adopt digital technologies effectively, use data analytics and “big data” to drive competitive advantage, and keep…
China is poised, and perhaps more determined than ever, to make the metaverse central to its economy in the future. China wants to expand the VR industry output to 350 billion yuan (U.S. $48 billion) by 2026 — six times the level of 2021 — showing it aims to become a world leader in the emerging metaverse economy.
Process Mining
March 10, 2023
AI Learning To Reconstruct How Your Business Processes Actually Perform Process Mining uses AI and machine learning to extract existing data from an organisation’s IT systems to visually reconstruct how processes actually perform. The data shows what is actually happening and creates a complete process map, capturing the “core” process flow and every variant to the core process flow. It identifies areas of…
Organisations have grown more productive by embracing the scalability and performance of cloud computing. As they’ve become more sensitive to matters of sustainability, however, organisations will place greater focus on the sustainability of cloud computing models from an overall environmental, social and governance (ESG) standpoint. This is true globally, whether ESG goals are driven by regulations, stakeholder…
A global survey conducted by University of Oxford and Protiviti in the second quarter of 2022 reveals that business leaders worldwide agree ESG (environmental, social and governance) will be either extremely or somewhat important to their business success over the next decade. Executives were evenly split—50/50—on whether ESG would be “extremely important” or “somewhat important” to their business in 2032. No…
This blog post was authored by Mike Ortlieb, Director, Security and Privacy and Chris Porter, Associate Director, Security and Privacy on The Technology Insights Blog. Threat actors are an ever-evolving species. Portrayed in popular advertising as guys dressed in black, probably sporting a ski mask, the harsh reality is that these bad actors are everywhere and are getting more creative by the day. Just…
Five years ago, we wrote a post called “The 8 Character Password is Dead,” which was an in-depth look at password cracking in 2017 and how eight-character passwords do not adequately protect organisations. In that analysis, we broke down the math and how quickly hardware purchased for under $5,000 could make an eight-character length irrelevant. Unfortunately, in just five years’ time, the numbers have gotten worse…
Loading...