Insight Search

Sort by:
  • Survey

    January 7, 2022
    The quality and, in some cases, the existence of the CISO/CFO relationship varies by company. In organizations where the CISO role is positioned and promoted as a source of value, CISOs and CFOs tend to collaborate more often and more meaningfully than in companies that treat information security as a cost center (and typically struggle with cybersecurity as a result). Protiviti’s 2021…
  • Whitepaper

    February 4, 2019
    A Step-By-Step Approach to Building Strong Security Architecture During Oracle ERP Cloud Implementation and Redesign Projects. Organizations are becoming more accepting of moving their key business applications to the cloud, including their enterprise resource planning (ERP) systems. For companies looking to move to Oracle ERP Cloud, the advantages are many — high scalability, consistent…
  • Podcast

    March 23, 2022
    Quantum machine learning, or QML, is one of the three major application categories for quantum computing, along with optimization and simulation. As we’re working with customers at Protiviti to find advantageous use cases in QML, we rely daily on a tool called PennyLane from Xanadu. Join host Konstantinos Karagiannis, and special cohost Emily Stamm, for a chat with Nathan Killoran from Xanadu to…
  • Podcast

    July 18, 2022
    In coding, libraries make developers’ lives easier, sparing them thousands of lines of code, while also increasing performance and security. And everyone’s concerned with security as fault-tolerant quantum computing approaches. Geometry Labs has released the “lattice-algebra” library to bring a high-performance cryptographic library to developers interested in using post-quantum cryptography in…
  • Whitepaper

    August 12, 2021
    Introduction Most technology companies today understand that ensuring data privacy and protection is an imperative for their business; however, few manage this process well or even invest enough resources in that effort. As governments and consumers around the world continue to raise their expectations of how technology businesses should handle and process private and sensitive data,…
  • Survey

    May 29, 2023
    The level of uncertainty in today’s global marketplace and the velocity of change continue to produce a multitude of potential risks that can disrupt an organization’s business model and strategy on very short notice. Unfolding events in Eastern Europe, changes in government leadership in several countries around the globe, escalating inflation, rising interest rates, ever-present cyber threats,…
  • Podcast

    November 30, 2022
    We’re getting close to practical advantage with quantum computing when running optimization algorithms. Companies interested in being leaders in their industry should already be considering how to harness this promised power with use cases that solve their business problems. But some companies want a better solution that’s advantageous today, even if it’s only quantum-inspired. Join host…
  • Whitepaper

    February 22, 2021
    As CEOs and boards become more informed about the extreme threats that cybersecurity lapses pose, their expectations are growing. CFOs’ expanding contributions to fortifying organizational data security, the highest priority identified in Protiviti’s latest Global Finance Trends Survey, play a pivotal role in satisfying those high expectations. Board members demand coherent, relevant and…
  • Flash Report

    November 9, 2021
    On November 4, 2021, the U.S. Department of Defense (DoD or Department) published a proposed update to its Cybersecurity Maturity Model Certification (CMMC) and defined a path forward that has Defense Industrial Base (DIB) contractors eager to understand impacts to their business and anticipated next steps in the evolution of the CMMC program. In addition to simplifying and consolidating the…
  • Flash Report

    March 9, 2023
    The White House recently released a comprehensive national cybersecurity strategy that is sure to have a major impact on government agencies as well as private businesses. The Biden-Harris Administration has been percolating a comprehensive cybersecurity strategy for some time and in early March released the aptly named “National Cybersecurity Strategy.” The 35-page document was created to help…
Loading...