Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Sort by: Relevance Date Filter Search Sort by RelevanceDate Order AscDesc Blog August 27, 2020 Protiviti Perspective: Verizon 2020 Data Breach Investigations Report Security data nerds look forward to the annual release of the Verizon Data Breach Investigations Report (DBIR). The report contains a breakdown of the prior year’s security incidents and breaches and provides trending data that mature security programs can benchmark against. One of the surprises in this year’s report is that organizations are… Blog September 1, 2020 Is Now the Right Time for DNS Diversification? The Domain Name System (DNS) is a critical internet service that enables the translation of accessible human names like www.protiviti.com to the IP Addresses hosting services. Collaboration and communication services like e-mail and instant messaging also rely upon the resolution services DNS provides. Over the past several years, the internet has experienced significant DNS hosting outages that… Blog September 2, 2020 The Quantum Three: Three Reasons Why the Quantum “Apocalypse” Could be Just Three Years Away Around 2013, I was asked when I thought quantum computers would be able to crack encryption. I said 10 years—2023. I’m not psychic, but through a curious trio of recent developments, I’ve realized I might end up being spot on. My prediction wasn’t looking good for a while. About a year ago, we touted machines in the 50-qubit range. And then, did the same thing at the start of this year. Did we… Blog September 3, 2020 Confused by Microsoft’s Branding? A Dynamics Evolution Microsoft’s impressive array of CRM and ERP offerings make it a powerhouse in the business applications market today. Deep-seated market presence and continuous development efforts have created application maturity and reliability. However, the evolution of these systems and frequent changes to brand naming conventions often creates confusion for customers interested in today’s product offerings… Blog September 8, 2020 Return-to-Work Thermal Scanner Project Solves “Right Now” Issues As we watched the COVID-19 pandemic unfold, we knew businesses would need to find safe ways to help bring their people back to work. So, our Emerging Technology group assembled a team of technical experts to help design a low-cost solution to address some of the complex re-entry issue. This project represented the same type of emerging tech expertise Protiviti brings to every client looking to… Blog September 9, 2020 Research, Build, Break, Tinker: Developing a Thermal Sensor Solution The COVID-19 pandemic has upended much of our world’s traditional operations. The challenges brought about have forced organizations to quickly adapt to new ways of doing business in order to keep essential services running, while simultaneously developing plans to bring schools, offices, restaurants and more back online. The disruption brought on by COVID-19 has given us an opportunity to bring… Blog September 10, 2020 Is Software Defined Perimeter the Best Method for Adopting a Zero Trust Strategy? Enterprise networks have been described as being like an egg, with a hard shell on the outside and soft on the inside. There have been heated dialogues between security professionals that treat the "insiders" as trusted and anything outside the network as a threat. However, this thought process began to change after the introduction of Zero… Blog September 14, 2020 Source Code Repositories and Mishandled Secrets As the DevOps revolution continues to sweep across the IT landscape, source code repositories have become a prominent resource for most organizations. They provide a centralized place to track, document and collaborate on changes to applications and are a critical component of modern continuous integration/continuous delivery (CI/CD) workflows. The automation of the technology stack necessary to… Blog September 16, 2020 CISOs: Security Program Reassessment in a Dynamic World Changing Times Time has certainly altered my perspective, but I think we can all agree the world has changed incredibly in just the last few months. The good news is that, while many of us have been through significant changes or challenges in our past, we have always found a way… Blog September 17, 2020 4 Ways to Effectively Design and Configure Workday Security Given the size and complexity of most organizations, effectively managing user access to Workday can be challenging. Defining adequate security policies and requirements will enable a clean security role design with few or no unmitigated risks of which the organization is not aware. It is important to have a well-designed and strong security architecture within Workday to ensure smooth business… Load More