Insight Search

Sort by:
  • In Focus

    April 29, 2025
    Data breaches have increasingly plagued organisations worldwide, underscoring the urgent need for robust security measures. The latest reported incidents involving Oracle have spotlighted the critical importance of protecting customer data.
  • Blogs

    June 18, 2025
    A consumption-centric enterprise framework is purpose-built to integrate, adopt and operationalise scalable, service-based technologies at speed and with strategic intent for the benefit of the enterprise.
  • Insights paper

    May 20, 2025
    The proliferation of connected medical devices continues to introduce new cybersecurity risks that could impact patient safety and the security and privacy of patient data. To address these challenges, it is imperative that medical device manufacturers (MDMs) and healthcare delivery organisations (HDOs) collaborate effectively and prioritise medical device security (including design,…
  • Newsletter

    July 2, 2025
    As a long-standing Microsoft Cloud Solutions Partner, Protiviti continues to lead the way in delivering AI-powered transformation. This month, we spotlight Microsoft 365 Copilot and Copilot Studio -  platforms that help organisations automate tasks, enhance productivity, and drive innovation.
  • Client Story

    December 19, 2024
    Discover how an international nonprofit enhanced SAP S/4HANA and Fiori security using Pathlock's solution, boosting compliance, reducing risks, and improving access governance.
  • Insights paper

    June 5, 2025
    In 2023, a prominent global technology firm experienced a significant security breach when sensitive production data was inadvertently restored in a development environment. This misconfiguration led to the exposure of credentials and customer data, underscoring the persistent challenges even the most advanced tech companies face in securing cloud environments.
  • Podcast

    June 25, 2025
    When NIST released the first post-quantum cryptography standards in August 2024, it set off a domino effect that will hopefully result in protecting the world from the quantum computing threat. Now that we’re beginning to migrate and trust our data to lattice-based cryptography, it’s a good time to examine how ML-KEM works and get some hints about how to implement it well. And who better to ask…
  • Newsletter

    May 30, 2025
    Welcome to December issue of Technology Insights. Explore new webinars, videos, blogs, podcasts and much more.
Loading...