Results for

Sort by:
  • Newsletter
    October 13, 2022
    A University of Oxford and Protiviti global survey reports that North American companies are less committed to ESG than their counterparts in Europe and the Asia-Pacific region. The questions are why this disparity exists, and where does your organization stand?
  • Whitepaper
    November 18, 2022
    Environmental protection laws have been in place in many countries for more than 50 years.1,2 The United Nations Environment Program (UNEP) and the International Criminal Police Organization (Interpol) have highlighted the rise of environmental crime, its links to bribery and corruption, and its devastating impact on environments globally.3 But despite the strong connection to money laundering…
  • Blog
    September 26, 2017
    This article would be of interest to security professionals looking to enhance security practices around passwords. Passwords have been computer security’s first and last line of defense for decades. Despite exponential growth in computing power, 8 character passwords still remain the security standard for many organizations. This password length is no longer acceptable. With under $5,000 in…
  • Podcast Transcript
    August 23, 2021
    Next in our Transformation Series, guest host Lucy Pearman talks with Sophie Krynauw about the future of insurance and workplaces in a digital environment with global collaborative teams focusing on outcomes rather than process.
  • Podcast Transcript
    August 25, 2021
    Open source helped revolutionize classical computing. What can it do for quantum? EPiQC is a collaboration across five universities that is developing a range of open-source tools to connect algorithms to quantum computers, including programing languages, compilers, optimizers, and more. They’re also working on benchmarking, which is much needed as different types of quantum systems come online,…
  • Podcast
    November 16, 2022
    Quantum computing is built on the ideas of giants. These so-called quantum foundations contain complicated concepts, including entanglement. In fact, the 2022 Nobel Prize in Physics was awarded to three scientists who expanded our understanding of entanglement. How does this key concept work? What are some other fascinating core ideas behind Quantum Information Science? Join host Konstantinos…
  • Flash Report
    November 15, 2022
    Last Friday at the 2022 United Nations Climate Change Conference, or Conference of the Parties of the UNFCCC (more commonly referred to as COP27), in Egypt, United States President Joe Biden asserted that global warming posed an existential threat to the planet and promised his country would meet its targets for fighting it. In his speech, he said, “The climate…
  • Infographic
    November 18, 2022
    Whether migrating to cloud-based applications or enhancing data security and privacy or managing workforce disruptions, chief financial officers at technology, media and telecommunications (TMT) organizations are resetting priorities and reimagining their long-term roles. Below are some of the key takeaways from the TMT results of Protiviti's latest Global Finance Trends Survey. Read full survey…
  • Blog
    January 19, 2018
    Corporate technology and security executives no doubt spend many a sleepless night anticipating what hackers might do next to attempt to gain access to valuable company assets. Keeping company and valuable customer data safe is Job One, as breaches can cost millions in lost assets, not to mention the reputational damage a corporation can suffer when an attack happens. Clearly, hackers can own the…
  • Blog
    March 7, 2018
    In a technology world where terms like Internet of Things (IoT), big data, augmented reality and bots are hot, a conversation about modems might seem painfully antiquated. But phone modems are still a surprisingly viable way for hackers to gain access to your organization’s valuable data. So today, we’re talking about the process for setting up an environment for interacting with modems, as well…
Loading...