Results for

  • Blog
    September 27, 2019
    Remember how crazy things were last year at this time, when the world was wondering what impact the General Data Protection Regulation (GDPR) would have? The European Union regulation on data protection and privacy for all individual citizens of the European Union and the European Economic Area, which also addresses the transfer of personal data outside the EU and EEA areas was definitely top of…
  • Blog
    October 3, 2019
    By 2021, cybercrime is likely to cost the world $6 trillion each year. Cyber risk quantification helps businesses understand the real costs of not adequately preparing for and protecting against cyber threats. Cyber risk quantification uses industry-leading and highly-vetted probabilisitic models to more accurately describe the cybersecurity and technology-based risks facing an organization. This…
  • Blog
    October 11, 2019
    Enterprise reporting and analytics are constantly evolving, both as new technology is introduced, and as organizational requirements change. The need for an agile, flexible solution that can quickly deliver meaningful business value has never been more critical. Software vendors are addressing these requirements in various ways and, almost without exception, the infrastructure of choice is cloud…
  • Blog
    October 14, 2019
    The cybersecurity landscape is littered with failed data loss prevention (DLP) initiatives. Perhaps surprising to many, most of these failures are the result of positioning DLP as a tool. Let’s be clear: an effective DLP is not a feature. It’s not a product. It’s not a tool. Rather, it is an ecosystem, or a mindset around the number of people, processes and technologies that must be bound…
  • Blog
    March 2, 2020
    It seems as if we are in a constant race against time to ensure our software stays within the mainstream maintenance window – most notable as of late is the sunsetting of SAP ERP (ECC) 6.0. While organizations may be at varying steps on their S/4HANA journey, we encourage them to not lose sight of their GRC application reaching the end of its mainstream maintenance December 31 of this year (…
  • Blog
    March 3, 2020
    It’s a fairly typical scenario: a company’s executive team has agreed to make the move from Oracle E-Business Suite (EBS) to Oracle Cloud and all eyes turn to Finance and IT leadership to make it happen. A project this significant and complex can be overwhelming, and with so many critical tasks happening simultaneously, it is not uncommon to overlook key activities. To ensure organizations do not…
  • Blog
    March 4, 2020
    This was originally published as a Protiviti Flash Report on February 28, 2020. Researchers at Singapore University of Technology and Design uncover major security vulnerabilities that could expose thousands of IoT devices to cyberattack IoT Vulnerabilities on the Rise A recently discovered set of Bluetooth-related vulnerabilities could mean thousands of IoT devices are vulnerable to attack…
  • Blog
    March 6, 2020
    On March 3, Honeywell published a paper claiming a new quantum computing technique which can dramatically increase the rate of future developments.  Quantum computing power is often described by the metric “quantum volume,” which is a measure of quantum bits or “qubits,” as well as their connectivity and gate and measurement errors. Honeywell uses trapped ions to create their qubits,…
  • Blog
    March 13, 2020
    Join us for a free on-demand webinar: Your Virtual Workplace: Leveraging Microsoft Teams for Your Remote Workforce. Click here to register. Working remotely may seem ideal to most people. You’re working in the comfort of your own home with no commute and no dress code. Some say they are more productive with fewer office distractions. But, staying engaged with colleagues and effectively…
  • Blog
    March 17, 2020
    Welcome back to this two-part blog series about the high-level differences in security features between AX 2012 and D365 Finance. Last week, in Part 1, we discussed the Dynamics security model and a couple of notable changes in the way security is managed. In this post, we will explore changes to the user interface that are helpful for understanding and troubleshooting security.  …
Loading...