Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog February 22, 2022 A Plethora of Priorities: CPG and Retail Finance Leaders Have Their Hands Full In a survey about top priorities, corporate finance leaders and teams in the retail and consumer packaged goods (CPG) industry ranked data security and privacy, enhanced data analytics, process improvement and challenges with regulations at the top of their list. Upended by the pandemic, the retail and CPG industry is confronting a mix of macroeconomic, strategic and operational risks that… Blog February 23, 2022 “Closer Together Than Ever”: Charles Drayton With MTC in Chicago Envisions a Future of Connectiveness — But Not Just for Cities Charles Drayton, chief technical architect and healthcare and life sciences lead at the Microsoft Technology Center (MTC) in Chicago, wants us all to start looking at the internet differently — not as a “luxury,” but as a “commoditized utility.” Do that, he says, and we can make real progress toward closing some of the income and performance gaps between our cities, suburban areas and rural areas… Blog February 24, 2022 Shifting Priorities: What TMT Industry Finance Leaders Are Focused on Today In a survey about their top priorities, corporate finance leaders and teams in the technology, media and telecommunications (TMT) industry ranked data security and privacy second to none, followed by enhanced data analytics and embracing new technologies. The survey results affirm many of today’s business realities: Data is a valuable corporate asset that needs to be produced and analyzed… Blog February 24, 2022 The Russian Invasion of Ukraine: Its Potential Implications and Impact On February 21, after months of building up forces close to Ukraine’s borders, Vladimir Putin recognized the Luhansk and Donetsk regions of Ukraine as “independent people’s republics.” He ordered the Russian Defense Ministry to deploy troops in those regions to “maintain the peace.” These actions commenced on the anniversary of Russia’s invasion of Crimea almost eight years to the day. The… Blog February 25, 2022 Privacy Act 1988 Review: A Compliance Burden or Welcome Change? It has been more than two years since the Attorney-General’s Department announced it would be undertaking a review of the Privacy Act 1988. The review will likely result in the most substantial amendment to the Act since what we now know as the Australian Privacy Principles (APPs) were introduced in 2000. The objective of the review “will consider whether the scope of the Privacy Act… Blog February 28, 2022 City Centers Without Personal Cars or Mass Transit? Protiviti Managing Director Jonathan Wyatt Says That’s the Future Cities around the globe, no matter how well-planned or sustainability-focused, all struggle to manage vehicle traffic. Many of the vehicles clogging up their roads and undermining air quality, especially during commute hours, are personal cars. Now, what would happen if a city made the bold decision to eliminate personal cars completely from its roads? It would “immediately become a leader on… Blog February 28, 2022 Putin Pulls the Trigger and the West Responds Again: What Happens Now? On February 23, Protiviti issued a Flash Report on Vladimir Putin’s recognition of two Ukrainian regions as “independent people’s republics,” deployment of “peacekeeping forces,” and demands that Ukraine disarm and negotiate the sovereignty of the two separatist regions. The Flash Report also summarized the sanctions that had been imposed by the West in response to Putin’s aggression. Much has… Blog September 26, 2017 The 8 Character Password is Dead This article would be of interest to security professionals looking to enhance security practices around passwords. Passwords have been computer security’s first and last line of defense for decades. Despite exponential growth in computing power, 8 character passwords still remain the security standard for many organizations. This password length is no longer acceptable. With under $5,000 in… Blog January 19, 2018 The Tools Hackers Use to Own Your World Corporate technology and security executives no doubt spend many a sleepless night anticipating what hackers might do next to attempt to gain access to valuable company assets. Keeping company and valuable customer data safe is Job One, as breaches can cost millions in lost assets, not to mention the reputational damage a corporation can suffer when an attack happens. Clearly, hackers can own the… Blog March 7, 2018 A Modern Approach to Hacking Modems In a technology world where terms like Internet of Things (IoT), big data, augmented reality and bots are hot, a conversation about modems might seem painfully antiquated. But phone modems are still a surprisingly viable way for hackers to gain access to your organization’s valuable data. So today, we’re talking about the process for setting up an environment for interacting with modems, as well… Load More