Insight Search

Sort by:
  • Flash Report

    June 3, 2022
    Three months ago, the U.S. Securities and Exchange Commission (SEC) proposed amendments to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing threat to public companies, investors and…
  • Newsletter

    February 3, 2020
    Ridurre tutto a numeri, tempi, performance è cogliere una sola parte delle potenzialità Agile che è soprattutto un formidabile attivatore di professionalità, di team work e business partnership. C'era una volta, negli anni ’90 … Erano tempi duri per gli sviluppatori di software, costretti a lavorare secondo metodologie di project management altamente strutturate ma poco adattabili alle…
  • Podcast Transcript

    August 26, 2021
    Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With a combined 30+ years of IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics, and guests from the identity management industry.
  • Whitepaper

    April 7, 2020
    A financial institution’s ability to maintain profitability through times of economic certainty or uncertainty is undoubtedly impacted by its careful management of the credit portfolio. Protiviti’s Credit Pulse is intended to provide a summary and analysis of economic indicators impacting financial institutions and the strength of their credit portfolio while providing industry-leading insights…
  • Podcast

    September 17, 2025
    For the first time, Shor’s Algorithm is running on logical qubits! The team at Infleqtion used their Sqale neutral atom processor to accomplish the feat. While the setup only uses six logical qubits, and we’re still in the range of factoring 15 or 21, this is both a proof of concept and a proof of the need for post-quantum cryptography (PQC). We discuss the aggressive 2.5:1 physical-to-logical…
  • Whitepaper

    February 8, 2023
    The digital revolution has led to an explosive growth in the amount of data created and collected, driving businesses to seek new ways to manage and discover value in the data they hold. In turn, the growth of stored data has been a longstanding management problem, which if not addressed can lead to potential vulnerabilities, data misuse, and possible data loss.
  • Client Story

    March 11, 2024
    Our client had taken on a high-stakes, high-profile class action suit that, if successful, could result in a settlement impacting one of the world’s largest electronic consumer products companies and their customers. The client was faced with reviewing millions of pages of complex, highly technical documents provided by the defendant, and would require Protiviti to provide project management…
  • Whitepaper

    July 12, 2021
    In spite of over 20 years of experience as an industry, Identity & Access Management (IAM) programmes continue to struggle — and with good reason. There is a lot that can go wrong with an IAM programme. Lack of funding, treating IAM like a project and not a programme, not having business buy-in, and trying to overly customise packaged software are all examples of significant challenges that…
  • Flash Report

    December 14, 2020
    On December 13, 2020, the Cybersecurity & Infrastructure Security Agency (CISA) issued an emergency directive detailing required action for federal agencies to mitigate the threat of the recently discovered compromise involving SolarWinds® Orion® Network Management products that are currently being exploited by malicious actors. (Read the SolarWinds Security…
  • Blogs

    April 13, 2021
    Cybersecurity, Privacy, Data and Resilience Dominate the Top Technology Challenges for Energy and Utilities Organisations.
Loading...