Results for

Sort by:
  • Podcast Transcript
    August 9, 2023
    DEF CON is the world’s leading hacking conference, about to have its 31st event in Las Vegas, August 10-13, 2023. For the second year in a row, Quantum Village will be helping attendees engage with quantum technologies and understand the cybersecurity impacts they will have. There’s even a Quantum Capture the Flag (CTF) competition! Join Host Konstantinos Karagiannis (a speaker at the show) for a…
  • Blog
    September 5, 2018
    The rate at which companies are amassing data is staggering. More than half of organizations today (57%) have production workloads running in the cloud and with the amount of new devices being introduced that create, consume and transmit data to the cloud, it has become critical to have some type of cloud governance program in place. However, one of the most challenging elements of such a program…
  • Blog
    July 12, 2023
    The advent of hurricane season each year (June – November) reminds organizations operating in U.S. coastal regions that having a comprehensive resiliency plan is no longer an option. Increasingly, meteorologists are predicting more frequent and more dangerous storms, challenging traditional concepts of disaster recovery. Source: NOAA National Centers for Environmental Information (NCEI) U.S.…
  • Blog
    July 18, 2023
    Microsoft Dynamics 365 Finance and Operations (D365 F&O) prices its license based on the security objects assigned to a user. Each security object is associated with a user view or user maintenance license, indicating the license type required for either read access to the menu item or maintenance (anything above read permissions). A user will be associated with the highest license their…
  • Blog
    July 19, 2023
    This blog originally appeared on The Protiviti View.  The big picture: Financial reports released by the world’s largest mobile carriers in the first quarter show significant growth in fixed wireless access (FWA) customers – the clearest signal yet that 5G, which allows homes and businesses to connect to the internet through radio frequencies instead of cables, is gaining serious…
  • Blog
    July 25, 2023
    Workforce hybridization and changes to the centralized nature of business operations over the last few years have sparked a digital reformation in the way IT functions around the globe deliver their services, especially cybersecurity. Securing key assets and data in a hybrid world has highlighted many challenges for CIOs and CISOs across the board. One of the largest challenges is securing…
  • Blog
    February 14, 2020
    “Data is the new water.” That observation by a chief information officer we met a few months ago really nails the way we think about data security and compliance today. He went on to say, “We have to reserve it. Preserve it. Share it. And make sure it’s clean.” Innovations in cloud, mobile, social media and big data mean the opportunity for increased risk. And that increased risk means that data…
  • Blog
    June 21, 2023
    Over the last few years, the Biden administration has heightened the awareness, requirements and activities associated with protecting the American government, critical infrastructure and counterparty commercial entities from cybersecurity attacks. Whether attacks are from state-sponsored entities or independent hacker groups such as Anonymous, there is a need to ensure appropriate controls are…
  • Blog
    June 22, 2023
    In today's fast-paced business landscape, organizations rely heavily on robust enterprise resource planning (ERP) systems like Microsoft Dynamics 365 Finance and Supply Chain Management to streamline operations and drive growth. However, granting unrestricted access to sensitive financial and operational data can pose security risks and compromise data integrity. That's where read-only roles come…
  • Blog
    June 27, 2023
    The most important use of any risk assessment tool is that it must contribute to better decision making on how to manage individual risks. Whether that is treating and reducing risk, or accepting that risk exists, risk management activities must ultimately help management make better decisions. Executives and risk management leaders, though, are increasingly faced with risk decisions they have…
Loading...