Results for

  • Blog
    July 27, 2021
    In today’s rapidly evolving business world, the lines between technology and business have blurred. Organizations need to modernize and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti’s…
  • Blog
    March 24, 2022
    Organizations rethinking their project delivery operating model must shift their mindset and rethink their approach. The pandemic, changing customer dynamics and rapidly evolving competitor landscape has significantly impacted all industries.  Transformation and project (or program) management office (PMO) leaders are faced with a perfect storm of: Evolving the way their companies do…
  • Blog
    March 28, 2022
    Companies face multiple threats as the security landscape continues to evolve. But how can they get to grips with the cyber risks they face and a record number of data breaches? Taken together, all areas of risk and security are essential in modern businesses: from IT and physical systems to cybersecurity and personal protection. But if they aren’t implemented correctly, they all have the…
  • Blog
    March 30, 2022
    Segregation of duties (SoD) is an area that presents significant challenges for almost every organization large or small. SoD risk is the potential exposure to financial misstatement or operational disruption due to a user having the ability to perform two conflicting job responsibilities. A company may be in the early stages of its identity and access governance journey, trying to assess where…
  • Blog
    March 31, 2022
    Microsoft Dynamics 365 Finance & Operations provides a database logging feature that can be used to track insert, update, delete, and rename key operation changes made to tables and fields in the application. Database logging is a valuable feature of Microsoft Dynamics 365 used to provide a chronological record of changes that occur within the application. Each record contains details of the…
  • Blog
    April 4, 2022
    It’s probably not surprising that emerging technology’s role in the future of work, the workforce and workplaces are top of mind for global business leaders; what is surprising is nearly three quarters (74%) of those executives believe digital and emerging technologies will add jobs and increase the size of their workforce over the next decade. That should help allay some of the fears of workers…
  • Blog
    April 6, 2022
    Mission critical The quote-to-cash (Q2C) process is a vital part of the sales cycle that is responsible for driving revenue for an organization. It encompasses detailed sales functions spanning from initial quote configuration to payment receipt and revenue recognition. Optimizing the Q2C process allows companies to speed up sales cycles, close a higher percentage of deals and create a better…
  • Blog
    April 12, 2022
    CVE 2022-22965, dubbed SpringShell (rated 9.8 CVSS Score) was found in Java’s Spring Framework. Spring, developed by VMware, is one of the most popular Java application deployment frameworks. On March 31, 2022, SpringShell (first known as Spring4Shell) was originally reported to VMware by multiple sources, and details were leaked online ahead of a public release and the formal CVE publication.…
  • Blog
    April 14, 2022
    SAP BusinessObjects is a well-established, on-premise enterprise business intelligence system, which has commonly been installed and configured within an organization’s own data center, with the responsibility of server maintenance falling on the organization itself. SAP has introduced the SAP BusinessObjects Private Cloud Edition (PCE) initiative, which shifts this responsibility to SAP and…
  • Blog
    April 18, 2022
    Anyone who follows the news is already aware of the persistent threat of ransomware events. Board members are certainly aware, and they know what preparations their organizations are making to fend off, respond to and recover from ransomware attacks. However, they may be unaware of their own roles in the organizations’ response to ransomware and other attacks. Chief Information Security Officers…
Loading...