Results for

  • Blog
    September 9, 2021
    Protiviti has identified four key steps that organizations can take to improve their overall control environment and receive the benefits mentioned below. Each of these steps will be a focus in this four-part blog series. In Part 1 and Part 2, we covered Step 1: Analyze SAP configuration and processes and Step 2: Optimize internal control framework. In this post, we will be…
  • Blog
    December 6, 2022
    On October 18, 2022, the Transportation Security Administration (TSA) announced new cybersecurity regulations required for passenger and freight railroad carriers that carry sensitive materials. The Security Directives were announced with the goal to enhance cybersecurity resilience across the railroad industry. Which rail companies are impacted? The Security Directives apply to all United States…
  • Blog
    December 7, 2022
    There is nothing worse than unplanned downtime. Whether it’s your personal vehicle or a manufacturing plant, unplanned downtime is one of the most disruptive things that can occur delaying schedules and incurring significant costs. One of the other least favorite occurrences for someone that owns a physical asset is paying for maintenance when it’s not needed. What if we had a dynamic solution…
  • Blog
    December 12, 2022
    According to the annual Sonatype State of the Software Supply Chain Report, open source software (OSS) consumption is growing at an estimated 33% annually across the primary OSS ecosystems - namely, Java (Maven), .NET (nuget), Javascript (npmjs) and Python (PyPI). As such, it is important to understand the risks and benefits of using OSS and the role proper governance plays in enabling…
  • Blog
    December 13, 2022
    Depending on whom one asks, digital twin technology has been around since 1991, 2002 or 2010. In the past few years, however, interest in digital twins for manufacturing has intensified for two critical reasons: a scarcity of workers and a scarcity of raw materials. While digital twins have been gaining popularity for several years, businesses since the pandemic see these virtual representations…
  • Blog
    December 14, 2022
    Five years ago, we wrote a post called "The 8 Character Password is Dead,” which was an in-depth look at password cracking in 2017 and how eight-character passwords do not adequately protect organizations. In that analysis, we broke down the math and how quickly hardware purchased for under $5,000 could make an eight-character length irrelevant. Unfortunately, in just five years’ time, the…
  • Blog
    December 15, 2022
    This year, our leading experts came together to address some of the most game-changing topics in the SAP space. Here are Protiviti’s most popular SAP insights from 2022 as you look ahead to the new year. By and large, these topics will remain important for your success in 2023. Read our top five most-read pieces below. #1. Case Study: Selecting a Conversion Type for SAP BW/4HANA…
  • Blog
    January 3, 2023
    Threat actors are an ever-evolving species. Portrayed in popular advertising as guys dressed in black, probably sporting a ski mask, the harsh reality is that these bad actors are everywhere and are getting more creative by the day. Just when an organization’s security systems have been upgraded to avoid the latest threats, new challenges appear on the horizon. Staying steps ahead of these…
  • Blog
    January 4, 2023
    The first formal mention of environmental, social and governance (ESG) principles appeared some 18 years ago in the United Nations Global Compact initiative, which garnered support from financial institutions across the world. During the next decade-and-a-half, and without much notice, ESG slowly gained steam. But outcries to address climate change in recent years, as well as social and gender…
  • Blog
    January 10, 2023
    Business leaders may have heard of quantum computing, but many are not yet aware of its incipient threat to cryptography and cryptocurrency. When these machines reach a sufficient level of performance, they will be able to easily factor prime numbers, which poses a threat to RSA. Only a few realize that the time to prepare for the conundrum of post-quantum risk is now. In quantum computing, the…
Loading...