Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Blogs May 3, 2024 Mastering the Fiori frontier: Crafting secure, intuitive spaces and pages in SAP S/4HANA A well-thought-out Fiori spaces and pages approach establishes a foundation for a user-friendly and scalable design that supports a least-privilege access model. When incorporated with security best practices, spaces and pages provide an intuitive experience within the Fiori launchpad in alignment with a business user’s tasks and responsibilities. As SAP S/4HANA users increasingly transition to… Insights paper May 20, 2025 Collaborative Security for Medical Devices – Best Practices for Device Manufacturers and Healthcare Delivery Organisations The proliferation of connected medical devices continues to introduce new cybersecurity risks that could impact patient safety and the security and privacy of patient data. To address these challenges, it is imperative that medical device manufacturers (MDMs) and healthcare delivery organisations (HDOs) collaborate effectively and prioritise medical device security (including design,… Blogs July 5, 2024 9 common errors to avoid while implementing security in Microsoft Dynamics 365 Finance and Operations Microsoft Dynamics 365 Finance and Operations (D365FO) is a comprehensive ERP solution that empowers businesses to optimise financial management and operational efficiency. With its integrated approach, powerful analytics, scalability and continuous innovation, it is a valuable asset for organisations striving to navigate today’s dynamic business landscape successfully. Blogs June 17, 2024 Don’t trawl for customers; consolidate your digital toolset and they will come to you With the retirement of third-party data on the horizon, marketers need to adjust and strategise on the data and tools available to them to find their customers. In the new first-party data world, what the customer directly gives you is what you already know, giving them more control. Customers have embraced that control and seek transparent ways of sharing information, when they want and when it… Podcast March 21, 2025 Data security and privacy management with Carol Lee, VP of ISACA China, Hong Kong In this VISION by Protiviti Interview, Michael Pang, APAC lead of Protiviti’s technology consulting practice, sits down with Carol Lee to discuss data security and privacy management and her experience leading enterprisewide security programs to support cloud and digital transformation strategy. Lee is Vice President of ISACA's China Hong Kong Chapter as well as the Deputy GM, Cybersecurity and… Client Story November 8, 2024 Getting Smart About Sourcing: How One Educational and Resource Institution Rebuilt Its Procurement Organisation Discover the transformative journey of an educational institution's procurement overhaul, where strategic sourcing was key. Optimising processes and leveraging spend, they identified $72M in savings potential. Survey September 30, 2025 From Automation to Autonomy - The Capabilities and Complexities of AI Agents | AI Pulse - Vol.3 Protiviti's AI Survey 3.0 reveals organisations are using Agentic AI to enhance decisions, improve efficiency and shape the future. Podcast January 20, 2020 Journey to the Cloud: Debunking Myths and the Role of Artificial Intelligence in Cloud Security Welcome to the new edition of Powerful Insights and our series on Cybersecurity Awareness. Protiviti has a series of webinars on cybersecurity awareness that, along with these accompanying podcasts, are intended to highlight ways organisations can be proactive in addressing these critical security challenges today. We explore how leaders can dynamically build cyber resilience while maximising… Podcast June 15, 2022 Podcast | Coding High-Performance, Post-Quantum Secure Blockchain Systems with Geometry Labs and The QRL In coding, libraries make developers’ lives easier, sparing them thousands of lines of code, while also increasing performance and security. And everyone’s concerned with security as fault-tolerant quantum computing approaches. Geometry Labs has released the “lattice-algebra” library to bring a high-performance cryptographic library to developers interested in using post-quantum cryptography in… Blogs August 8, 2023 The metaverse in 2040? Buckle up for a bumpy ride, says Elon professor and Pew researcher Janna Anderson, professor of communications and director of the Imagining the Internet Center at Elon University, is the lead author of the report The Metaverse in 2040, published in partnership with Pew Research. She is a senior contract researcher for Pew and co-leads the center’s 19-year series of reports outlining experts’ predictions for the most likely future of digital life. The full… Load More