Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Sort by: Relevance Date Filter Search Sort by RelevanceDate Order AscDesc Newsletter October 13, 2022 The ESG Debate: Where Does Your Company Stand? A University of Oxford and Protiviti global survey reports that North American companies are less committed to ESG than their counterparts in Europe and the Asia-Pacific region. The questions are why this disparity exists, and where does your organization stand? Whitepaper November 18, 2022 Navigating the Intersection of ESG and Money Laundering: How Financial Institutions Can Prevent Environmental Crime Environmental protection laws have been in place in many countries for more than 50 years.1,2 The United Nations Environment Program (UNEP) and the International Criminal Police Organization (Interpol) have highlighted the rise of environmental crime, its links to bribery and corruption, and its devastating impact on environments globally.3 But despite the strong connection to money laundering… Blog September 26, 2017 The 8 Character Password is Dead This article would be of interest to security professionals looking to enhance security practices around passwords. Passwords have been computer security’s first and last line of defense for decades. Despite exponential growth in computing power, 8 character passwords still remain the security standard for many organizations. This password length is no longer acceptable. With under $5,000 in… Podcast Transcript August 23, 2021 Transcript | Workplace Transformation Next in our Transformation Series, guest host Lucy Pearman talks with Sophie Krynauw about the future of insurance and workplaces in a digital environment with global collaborative teams focusing on outcomes rather than process. Podcast Transcript August 25, 2021 Transcript | Bridging the Gap Between Algorithms and Machines Open source helped revolutionize classical computing. What can it do for quantum? EPiQC is a collaboration across five universities that is developing a range of open-source tools to connect algorithms to quantum computers, including programing languages, compilers, optimizers, and more. They’re also working on benchmarking, which is much needed as different types of quantum systems come online,… Podcast November 16, 2022 Podcast | Entanglement and Other Quantum Foundations with Quantinuum Quantum computing is built on the ideas of giants. These so-called quantum foundations contain complicated concepts, including entanglement. In fact, the 2022 Nobel Prize in Physics was awarded to three scientists who expanded our understanding of entanglement. How does this key concept work? What are some other fascinating core ideas behind Quantum Information Science? Join host Konstantinos… Flash Report November 15, 2022 Biden Doubles Down at COP27 Last Friday at the 2022 United Nations Climate Change Conference, or Conference of the Parties of the UNFCCC (more commonly referred to as COP27), in Egypt, United States President Joe Biden asserted that global warming posed an existential threat to the planet and promised his country would meet its targets for fighting it. In his speech, he said, “The climate… Infographic November 18, 2022 Infographic: Finance Trends for Technology, Media and Telecommunication Whether migrating to cloud-based applications or enhancing data security and privacy or managing workforce disruptions, chief financial officers at technology, media and telecommunications (TMT) organizations are resetting priorities and reimagining their long-term roles. Below are some of the key takeaways from the TMT results of Protiviti's latest Global Finance Trends Survey. Read full survey… Blog January 19, 2018 The Tools Hackers Use to Own Your World Corporate technology and security executives no doubt spend many a sleepless night anticipating what hackers might do next to attempt to gain access to valuable company assets. Keeping company and valuable customer data safe is Job One, as breaches can cost millions in lost assets, not to mention the reputational damage a corporation can suffer when an attack happens. Clearly, hackers can own the… Blog March 7, 2018 A Modern Approach to Hacking Modems In a technology world where terms like Internet of Things (IoT), big data, augmented reality and bots are hot, a conversation about modems might seem painfully antiquated. But phone modems are still a surprisingly viable way for hackers to gain access to your organization’s valuable data. So today, we’re talking about the process for setting up an environment for interacting with modems, as well… Load More