Blog library

A collection of Protiviti blogs. 

Blogs

December 5, 2024

Low-code applications yield high value, big change in less time

The urgent need to develop a successful competitive strategy and align your supply chain to it has become apparent in recent years. So why haven’t successful implementations of enterprise technology systems kept pace to support this critical need? The issue is that many of the core characteristics of enterprise applications – complex configurations, lengthy...
Microsoft Dynamics 365 Finance & Operations provides a database logging feature that can be used to track insert, update, delete, and rename key operation changes made to tables and fields in the application. Database logging is a valuable feature of Microsoft Dynamics 365 used to provide a chronological record of changes that occur within the application. Each record contains details of the date and time stamp…
Companies face multiple threats as the security landscape continues to evolve. But how can they get to grips with the cyber risks they face and a record number of data breaches? Taken together, all areas of risk and security are essential in modern businesses: from IT and physical systems to cybersecurity and personal protection. But if they aren’t implemented correctly, they all have the potential to cause problems…
As corporations are trying to return to some semblance of “normal,” whatever that definition may look like now, and are concurrently dealing with the lingering impacts of a global pandemic and implementing digital transformation, many challenges face the C-suite. Putting people and culture and how to adapt to the significant changes that have taken place in the workforce since 2020 may very well be at the top of…
The Potential of Machine Learning (ML) to deliver value to banks has created something of a gold rush in adopting this methodology for banking applications. ML can produce immense benefits when applied to complex nonlinear problems where there is a large amount of data, particularly unstructured data. Use cases for incorporating machine learning in banking include asset management, fraud detection, credit risk…
Several Key Policies Take Effect March 31, 2022 On March 29, 2021, the Bank of England (BoE), the Prudential Regulation Authority (PRA) and the Financial Conduct Authority (FCA) issued a series of policy statements to both refine and finalise their approach to operational resilience for financial services firms. Almost concurrent with the release of the policy statements, the Basel Committee on Banking Supervision…
No matter what they make or sell — computers, pet food, cosmetics, textiles — companies around the world are grappling with significant supply chain issues. It’s easy to blame the global health crisis for these problems, especially the labor, material and shipping container shortages. Certainly, the pandemic has played its part in exposing the global supply chain’s brittleness and exacerbating systemic problems. But…
The internal audit function is the only function within any organisation which has the mandate to look across and examine all aspects of the businesses and its processes. It’s a very empowering position and it’s also very unique and compelling as a profession.  An internal auditor can gain insights into an organisation with a holistic view. The internal audit process requires one to assess the challenges for…
On the three-dimensional chessboard of business, CFOs are expanding their roles in multiple directions at once. Finance leaders now shape and drive corporate strategy in areas ranging from advanced technology investments to organisational design, and from supply chain resilience to organisational culture. Simply stated, they are positioning themselves as players in the strategic dialogue in the C-suite and boardroom…
Businesses are experiencing increased agility and reliability – and cost reductions – through cloud transformation but adopting cloud solutions can result in new risks. Sometimes, they impede enterprise vision and regulatory compliance. Applying an appropriate framework to help manage the risk of cloud adoption can mitigate or even eliminate these hazards. In an earlier blog, we introduced the cloud control…
I’m a professional hacker, or as we are referred to in the security industry, a penetration tester. As a penetration tester, I am hired by organisations to attack their systems, networks, applications, and employees in the same fashion that a malicious attacker would. It is my job to find and exploit weaknesses before malicious attackers can. These weaknesses include application and network-based attacks (…
Loading...