Results for Search Submit Filter by: Advanced Filter All results Solutions Industry People Client Story Insights/Blogs Filter Blog March 10, 2020 The Top Four Data Privacy Trends to Watch in 2020 – Part 2 This two-part series takes a detailed look at what’s ahead this year in data privacy, including trends around the world and what next steps should be taken to stay ahead of the ever-changing privacy landscape. Yesterday, we looked at global trends in data privacy legislation. To learn more about how we can support your organization, visit our data privacy consulting page. Transparency and… Blog March 11, 2020 Microsoft Dynamics Security – AX 2012 vs. D365 Finance (Part 1) As support for Dynamics AX nears its end,* more and more organizations are considering upgrading to Microsoft Dynamics 365 for Finance (D365 Finance). Understandably, this transition will come with many functional and technical changes – some of which involve maintaining application security. In this two-part blog series, we will explore the high-level differences in security features between AX… Blog March 13, 2020 Leading Practices for a Well-Maintained SAP BusinessObjects System Managing the SAP BusinessObjects (BOBJ) environment is important to keeping systems healthy and stable. Without a stable environment, the business will be at risk of more system outages, resulting in delayed reporting. While supporting BOBJ environments for multiple clients, I’ve managed to try and implement both in-house and third-party solutions for auditing. Here is what I’ve learned:… Blog March 13, 2020 Working Remotely? Microsoft Teams can Help Join us for a free on-demand webinar: Your Virtual Workplace: Leveraging Microsoft Teams for Your Remote Workforce. Click here to register. Working remotely may seem ideal to most people. You’re working in the comfort of your own home with no commute and no dress code. Some say they are more productive with fewer office distractions. But, staying engaged with colleagues and effectively… Blog March 4, 2020 It’s Time to Take a Critical Look at the Security of Your IoT Devices . . . Now! This was originally published as a Protiviti Flash Report on February 28, 2020. Researchers at Singapore University of Technology and Design uncover major security vulnerabilities that could expose thousands of IoT devices to cyberattack IoT Vulnerabilities on the Rise A recently discovered set of Bluetooth-related vulnerabilities could mean thousands of IoT devices are vulnerable to attack… Blog March 6, 2020 Quantum Computing May Be A Reality Sooner Than You Think On March 3, Honeywell published a paper claiming a new quantum computing technique which can dramatically increase the rate of future developments. Quantum computing power is often described by the metric “quantum volume,” which is a measure of quantum bits or “qubits,” as well as their connectivity and gate and measurement errors. Honeywell uses trapped ions to create their qubits,… Blog March 9, 2020 The Top Four Data Privacy Trends to Watch in 2020 – Part 1 This two-part series takes a detailed look at what’s ahead this year in data privacy, including trends around the world and what next steps should be taken to stay ahead of the ever-changing privacy landscape. To learn more about how we can support your organization, visit our data privacy consulting page. Data, often considered to be the “oil of the digital world,” is now considered the… Blog February 7, 2020 A Closer Look: Proposed Text of CCPA Regulations from California AG On October 10, 2019, the California Attorney General released proposed regulations to the California Consumer Privacy Act (CCPA), introducing some new requirements that were not originally included in the CCPA. The regulations are divided into seven articles, which we discussed in an earlier blog here. In this post, we will undertake a comprehensive review of the proposed regulations and identify… Blog February 11, 2020 Gender Diversity Can Aid Cybersecurity: CISO Panel Suggests Keys to Greater Female Participation It’s no secret that the current skills shortage is especially acute in the area of cybersecurity. A 2018 study by the International Information System Security Certification Consortium, or (ISC)², reported a shortage of nearly 3 million cybersecurity professionals globally, including a gap of roughly 500,000 trained staff in North America alone. And CIO/CTO respondents to Protiviti’s latest… Blog March 3, 2020 Plan Ahead: 5 Best Practices for the Switch to Oracle Cloud It’s a fairly typical scenario: a company’s executive team has agreed to make the move from Oracle E-Business Suite (EBS) to Oracle Cloud and all eyes turn to Finance and IT leadership to make it happen. A project this significant and complex can be overwhelming, and with so many critical tasks happening simultaneously, it is not uncommon to overlook key activities. To ensure organizations do not… Load More