Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog August 5, 2019 Client Story: Web Accessibility Audit Meets Diverse Needs for Goodwill Industries In July, Protiviti was recognized with the Microsoft 2019 MSUS Partner Award – Diversity & Inclusion for its work with the leading workforce development provider, Goodwill Industries International, and other organizations. The MSUS awards are given to companies that demonstrate leadership in customer impact, solution innovation, deployment and exceptional use of advanced features in… Blog August 7, 2019 Protecting the AWS Environment Recent events involving AWS S3 data compromises have once again highlighted the ongoing and complex struggle organizations face when attempting to achieve a secure state of operations in the cloud. Of particular interest is the reinforcement of the need for defense in depth with active monitoring. While officially published documents have left out the detail of the initial server compromise, the… Blog August 16, 2019 What to Do Now to Address Microsoft Vulnerabilities On August 13, Microsoft released information regarding patches that will impact virtually every modern version of Windows. This alert, Patch New Wormable Vulnerabilities in Remote Desktop Services, outlines “a set of fixes for Remote Desktop Services that include two critical Remote Code Execution (RCE) vulnerabilities.” As Microsoft points out, these vulnerabilities raise significant red flags… Blog August 20, 2019 Why Data Map or Categorize Vendors When the CCPA Does Not Require Either? The California Consumer Privacy Act (CCPA) does not mention anywhere in the statute that a data map must be performed or that vendors must be categorized. Yet, as we work with organizations that are preparing to implement CCPA compliance measures by the end of this year, we hear these common refrains when we recommend that businesses perform a data map and categorize vendors as part of their… Blog September 3, 2019 5 Ways to Prepare for the Next Oracle Cloud Quarterly Release Oracle Cloud continues to be a hot topic as companies are drawn to the benefits that come with a Cloud ERP environment, including a reduced burden on infrastructure management. However, in terms of functionality, Cloud is still playing catch-up to the existing features of its on-premise E-Business Suite (EBS) counterpart. As such, Oracle releases quarterly Cloud updates comprised of new… Blog September 4, 2019 Moving to Microservices: How Granular Should My Services Be? Microservices architecture is not one size fits all. While it can bring advantages in the areas of agility, scalability and resilience, it is vital for application leaders to know about the tradeoffs and costs that it can also bring. There are varying levels of service granularity that application leaders can chose from to ensure their firms and teams can fully realize benefits and advantages in… Blog September 4, 2019 Where Cybersecurity, Incident Response and Business Resilience Converge Things just aren’t as simple as they used to be. When it comes to managing organizational IT risks associated with confidentiality, integrity and availability (the long held “CIA” triumvirate within security), it doesn’t get any easier. A confusion of terms as well as the merging of traditional security and resiliency processes has contributed to recent noise. As companies address the risk of… Blog September 12, 2019 Secrets to a Seamless O365 OneDrive Migration It’s a common scenario. Your organization has recently migrated to Microsoft Office 365 (O365). Laptop hardware and software has been updated. Your users are prepped and ready to start using a tool that will let them create and collaborate more efficiently. As the IT project leader and a power user, you think to yourself, “Great, now I can move all my OneNote files to my personal OneDrive!” You… Blog September 20, 2019 Three Things to Know Today About DevSecOps In order to enhance their approaches to cyber and other risks, many organizations are integrating security, privacy, policy and controls into their DevOps lifecycle, processes and tools. As the DevSecOps trend gains momentum, we anticipate more organizations will make threat modeling, risk assessment and security automation integral components of their product development initiatives, from… Blog September 24, 2019 California Consumer Privacy Act Amendments Update & FAQs The California legislature finished its 2019 session on Friday, September 13, marking the end of opportunities to make changes before the bill goes into effect on January 1, 2020. In sum, five of six CCPA amendments were passed during the 2019 legislative session. Among the changes and clarifications included in the amendments, the most noteworthy include: 1) AB 25 exempts for one year the… Load More