Insight Search

Sort by:
  • Insights paper

    May 20, 2025
    The proliferation of connected medical devices continues to introduce new cybersecurity risks that could impact patient safety and the security and privacy of patient data. To address these challenges, it is imperative that medical device manufacturers (MDMs) and healthcare delivery organisations (HDOs) collaborate effectively and prioritise medical device security (including design,…
  • Infographic

    September 14, 2021
    Privacy, cyber breach, user access and data governance dominate the top technology challenges for consumer packaged goods (CPG) and retail organisations, according to the annual ISACA/Protiviti Global Survey of IT audit leaders and professionals. The respondents’ ranking of the top technology risks reflect the concerns of an industry that has experienced a massive shift to e-…
  • Survey

    May 9, 2023
    Organisations today spend an average of 30% of their IT budgets and invest a fifth of their IT human resources on technical debt management. This research, based on a global survey of more than 1,000 CIOs, CTOs and other technology leaders, underscores the burden created by technical debt and likely is an eye-opener for the CFO.[1] As organisations strive to increase their focus, and time and…
  • Blogs

    March 14, 2024
    Republished from a three-part series of articles on The Protiviti View, our blog featuring commentary, insights and points of view from Protiviti leaders and SMEs on key challenges and risks companies are facing today, along with new and emerging developments in the market.
  • Whitepaper

    July 27, 2022
    Robotic process automation (RPA) was first used to execute predetermined, rules-based tasks twenty or so years ago. Since then, RPA has functioned as a virtual workforce for businesses, which benefit from its power to collect data, execute processes rapidly and unerringly, and facilitate higher levels of quality — while enhancing customer satisfaction.We’ve previously addressed at length the…
  • Survey

    April 5, 2021
    The range of uncertainties facing energy and utilities business leaders around the globe is overwhelming. Challenges triggered by a once-in-a-century pandemic continue to unfold, combined with numerous other risk issues, such as growing social unrest and polarisation, and ever-present challenges associated with technology, digital transformation and innovation. Staying abreast of emerging risk…
  • Podcast Transcript

    September 22, 2021
    Engineering challenges abound in quantum computing. Technologies like interconnect and improved memory for repeaters will enable these machines to accelerate and power connectivity in the future. Q-NEXT is one of five quantum information science research centers funded by the DOE to help develop these technologies in addition to strengthening the nation’s leadership position in the quantum arms…
  • Podcast Transcript

    July 13, 2022
    Supply-chain issues are plaguing the world right now, across all industries, from manufacturing, technology, healthcare, and more. Can quantum computing offer a way to ease the burden and provide real customer advantage? Evidence seems to suggest so. Join host Konstantinos Karagiannis for a chat about this use case, and other innovative ones you may not have heard of, with Alex Khan from ZebraKet…
  • In Focus

    July 9, 2024
    Over the course of a few days before the end of its summer session, the U.S. Supreme Court issued three decisions that reshaped the regulatory landscape in the United States. Two of the decisions  (SEC v. Jarkesy and Loper Bright Enterprises v. Raimondo) shift the balance of power from the executive to the judicial branch of government and the third (Corner Post, Inc. v. Board of Governors)…
  • Blogs

    October 27, 2021
    Five common identity and access management pitfalls to avoid Identity and access management (IAM) is at the forefront of each organisation’s overall security strategy. Effective organisations ensure that regulatory compliance and risk management drivers are balanced with business-friendly and effective processes in order to provide users with access to the right resources at the right time.…
Loading...