Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Flash Report June 2, 2022 It’s Time to Take a Critical Look at the Security of Your IoT Devices... Now! IoT Vulnerabilities on the Rise A recently discovered set of Bluetooth-related vulnerabilities could mean thousands of IoT devices are vulnerable to attack and could experience deadlocks, crashes, buffer overflows and bypass of certain security settings. Researchers at the Singapore University of Technology and Design uncovered a set of 12 vulnerabilities affecting seven major system-on-a-chip (… Podcast Transcript August 26, 2021 TRANSCRIPT | PRIVACY & CONSENT WITH KATIE STEVENS Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With a combined 30+ years of IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics, and guests from the identity management industry. Podcast Transcript August 26, 2021 TRANSCRIPT | IAM RIFFS WITH ERIC ANDERSON Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With a combined 30+ years of IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics, and guests from the identity management industry. Podcast Transcript August 26, 2021 TRANSCRIPT | CARTA WITH MARIO DUSAJ Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With a combined 30+ years of IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics, and guests from the identity management industry. Podcast Transcript August 26, 2021 TRANSCRIPT | ZERO TRUST NETWORK ARCHITECTURE WITH BRAIN DEITCH Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With a combined 30+ years of IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics, and guests from the identity management industry. Blogs June 22, 2023 Harnessing Analytics to Streamline and Automate Your Control Environment In an increasingly complex business landscape, organizations confront mounting challenges linked to their operating models and cost management. These pressures are prompting a discernible shift in focus towards streamlining and simplifying controls to cut costs, boost responsiveness and enhance the control environment. Central to this evolution is recognizing that a well-structured control… Client Story June 13, 2023 Having it all: Technology transformation in the luxury marina market This company is the world’s largest owner and operator of marinas, with more than 100 locations in its portfolio. The company’s business model is laser focused on growth through acquisition while enhancing the member experience in this high-end market. To support the business model, the company embarked on a technology transformation journey to develop its own marina management system that allows… Client Story May 9, 2024 Mastering Compliance and Efficiency with SAP GRC Access and Process Control Elevate compliance and efficiency with SAP GRC implementation by Protiviti. Streamline access control and process management for seamless operations. Client Story April 19, 2024 Rural Lifestyle Retailer Builds Customer Loyalty With Enhanced CIAM Strategy Protiviti partnered with a rural lifestyle retailer client to assess its Customer Identity and Access Management (CIAM) program and architecture. Whitepaper October 22, 2024 Establishing a scalable AI governance framework Establishing an AI governance structure paves the way for effective management and measurement of AI solutions, fostering innovation while mitigating risk. Load More