Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Sort by: Relevance Date Filter Search Sort by RelevanceDate Order AscDesc Podcast Transcript August 9, 2023 Transcript | Quantum Computing at DEF CON Hacking Conference— with Mark Carney and Victoria Kumaran of Quantum Village DEF CON is the world’s leading hacking conference, about to have its 31st event in Las Vegas, August 10-13, 2023. For the second year in a row, Quantum Village will be helping attendees engage with quantum technologies and understand the cybersecurity impacts they will have. There’s even a Quantum Capture the Flag (CTF) competition! Join Host Konstantinos Karagiannis (a speaker at the show) for a… Blog September 5, 2018 Managing Data Governance in a Cloud-Focused World The rate at which companies are amassing data is staggering. More than half of organizations today (57%) have production workloads running in the cloud and with the amount of new devices being introduced that create, consume and transmit data to the cloud, it has become critical to have some type of cloud governance program in place. However, one of the most challenging elements of such a program… Blog July 12, 2023 Preparing for Hurricane Season: Ensuring Resiliency in the Face of Natural Disasters The advent of hurricane season each year (June – November) reminds organizations operating in U.S. coastal regions that having a comprehensive resiliency plan is no longer an option. Increasingly, meteorologists are predicting more frequent and more dangerous storms, challenging traditional concepts of disaster recovery. Source: NOAA National Centers for Environmental Information (NCEI) U.S.… Blog July 18, 2023 Optimizing Microsoft Dynamics 365 Licensing Costs Microsoft Dynamics 365 Finance and Operations (D365 F&O) prices its license based on the security objects assigned to a user. Each security object is associated with a user view or user maintenance license, indicating the license type required for either read access to the menu item or maintenance (anything above read permissions). A user will be associated with the highest license their… Blog July 19, 2023 Riding on 5G, Fixed Wireless Access Technology Continues to Make Huge Waves This blog originally appeared on The Protiviti View. The big picture: Financial reports released by the world’s largest mobile carriers in the first quarter show significant growth in fixed wireless access (FWA) customers – the clearest signal yet that 5G, which allows homes and businesses to connect to the internet through radio frequencies instead of cables, is gaining serious… Blog July 25, 2023 Emerging Trends in IAM Part 1: Simplified Engineering Workforce hybridization and changes to the centralized nature of business operations over the last few years have sparked a digital reformation in the way IT functions around the globe deliver their services, especially cybersecurity. Securing key assets and data in a hybrid world has highlighted many challenges for CIOs and CISOs across the board. One of the largest challenges is securing… Blog February 14, 2020 Planning Makes the SAP S/4HANA Journey Compliant and Secure “Data is the new water.” That observation by a chief information officer we met a few months ago really nails the way we think about data security and compliance today. He went on to say, “We have to reserve it. Preserve it. Share it. And make sure it’s clean.” Innovations in cloud, mobile, social media and big data mean the opportunity for increased risk. And that increased risk means that data… Blog June 21, 2023 Funding Cyber Protection: A Closer Look at State and Local Grant Programs Over the last few years, the Biden administration has heightened the awareness, requirements and activities associated with protecting the American government, critical infrastructure and counterparty commercial entities from cybersecurity attacks. Whether attacks are from state-sponsored entities or independent hacker groups such as Anonymous, there is a need to ensure appropriate controls are… Blog June 22, 2023 Creating Read-Only Roles for Microsoft Dynamics 365 Finance and Supply Chain Management In today's fast-paced business landscape, organizations rely heavily on robust enterprise resource planning (ERP) systems like Microsoft Dynamics 365 Finance and Supply Chain Management to streamline operations and drive growth. However, granting unrestricted access to sensitive financial and operational data can pose security risks and compromise data integrity. That's where read-only roles come… Blog June 27, 2023 Using Cyber Risk Quantification to Manage Chaos The most important use of any risk assessment tool is that it must contribute to better decision making on how to manage individual risks. Whether that is treating and reducing risk, or accepting that risk exists, risk management activities must ultimately help management make better decisions. Executives and risk management leaders, though, are increasingly faced with risk decisions they have… Load More