Insight Search

Sort by:
  • Whitepaper

    September 15, 2021
    Issue Suspicious transaction monitoring systems enable financial institutions to monitor their customers’ transaction behavior systematically by providing relevant scenarios/rules that analyse the underlying customer transactions and generate automated alerts of activity that may be unusual and indicative of potential money laundering. These alerts are then reviewed by a team of investigators to…
  • Blogs

    April 6, 2023
    This blog post was authored by Julia Artzi - Consultant, Sarah Guthrie - Senior Consultant, Enterprise Application Solutions on The Technology Insights Blog.Microsoft Dynamics 365 Finance and Supply Chain Management (D365 F&SCM) publishes security changes with new code releases. These changes are automatically applied to out-of-the-box security roles, duties…
  • Blogs

    May 15, 2023
    Ever since Steven Spielberg put the metaverse on the mainstream map in 2018 with his science-fiction adventure film, Ready Player One, based on Ernest Cline's novel of the same name, there has been a slow but steady drumbeat of momentum building around the potential and possibilities of this brave, new, immersive world. Sure, the metaverse had been talked about long before 2018, but once…
  • Blogs

    June 30, 2023
    This blog post was authored by Justin Turner - Director, Security and Privacy on the technology insights blog. Anyone who has spent a significant amount of time in any U.S. state where college football is popular, has likely seen a “house divided” bumper sticker or license plate cover, with contrasting university logos. Many of us (and our friends and families) enjoy spirited rivalries (Roll…
  • Blogs

    June 19, 2023
    Penetration testing and red teaming are essential cybersecurity practices that bolster an organisation’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed.
  • Whitepaper

    March 24, 2023
    By Carol Beaumier and Bernadine Reese Sharing information and lessons learned has become increasingly critical for the effective management of cybercrime and related financial crime. This need requires financial institutions to rethink how they have historically managed these risks.
  • Podcast Transcript

    June 30, 2021
    Quantum computing is easy to access thanks to services like Amazon Braket. But how long does it take to apply one of these systems to a real-world use case? Sometimes months. Amazon partner Quantum Computing, Inc. (QCI) has launched Qatalyst API to shorten development time on some types of quantum coding … to under a week!  Listen in to hear how Amazon is preparing for the future of high-…
  • Infographic

    February 24, 2023
    Technology, media and telecommunications (TMT) companies are adjusting for more economic headwinds in 2023, and are particularly focused on people management challenges, according to results from the latest Protiviti-NC State global top risk survey. Download Infographic
  • Blogs

    April 3, 2023
    Leaders of energy and utilities (E&U) businesses are becoming increasingly focused on the business impacts of rapidly evolving technology. According to Protiviti’s latest Executive Perspectives on Top Risks Survey, many of these leaders see their companies struggling over the next decade to adopt digital technologies effectively, use data analytics and “big data” to drive competitive…
  • Infographic

    February 28, 2023
    Across many retail and consumer goods categories, companies are contending with talent shortages that have increased labor costs, product availability challenges, difficulty sustaining customer loyalty and retention, and pressure to implement sustainability practices. According to results from the latest Protiviti-NC State global top risk survey, these are among the key issues being discussed in…
Loading...