Results for Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog February 6, 2020 Simplify Cloud Accounting to Deliver Perfect Harmony We see the dissonance all the time. Organizations struggle to get their IT and accounting teams working together and IT’s desire to introduce cloud computing to the mix can often strike a flat note. Fortunately, harmony can be achieved in just three simple steps. On its face, “moving to the cloud” seems like a simple enough term. Yet, as we will see, the term “cloud” carries a lot of meanings.… Blog February 7, 2020 A Closer Look: Proposed Text of CCPA Regulations from California AG On October 10, 2019, the California Attorney General released proposed regulations to the California Consumer Privacy Act (CCPA), introducing some new requirements that were not originally included in the CCPA. The regulations are divided into seven articles, which we discussed in an earlier blog here. In this post, we will undertake a comprehensive review of the proposed regulations and identify… Blog February 11, 2020 Gender Diversity Can Aid Cybersecurity: CISO Panel Suggests Keys to Greater Female Participation It’s no secret that the current skills shortage is especially acute in the area of cybersecurity. A 2018 study by the International Information System Security Certification Consortium, or (ISC)², reported a shortage of nearly 3 million cybersecurity professionals globally, including a gap of roughly 500,000 trained staff in North America alone. And CIO/CTO respondents to Protiviti’s latest… Blog February 12, 2020 5G Download What is 5G and what does it mean to consumers? To be quite clear, the term 5G is simply a marketing term to represent the fifth-generation of wireless technology used in cellular networks. However, the various cellular providers have created a fair bit of confusion about what 5G is, when it is… Blog February 14, 2020 Planning Makes the SAP S/4HANA Journey Compliant and Secure “Data is the new water.” That observation by a chief information officer we met a few months ago really nails the way we think about data security and compliance today. He went on to say, “We have to reserve it. Preserve it. Share it. And make sure it’s clean.” Innovations in cloud, mobile, social media and big data mean the opportunity for increased risk. And that increased risk means that data… Blog February 17, 2020 Migrating Security in Oracle ERP Cloud As security and Segregation of Duties (SoD) risks are becoming more scrutinized by the Public Company Accounting Oversight Board (PCOAB) and external auditors, it is increasingly important to establish a clean and compliant security role design in your Oracle ERP Cloud application. Whether you develop custom roles as part of your implementation or redesign security in your existing environment,… Blog March 2, 2020 Upgrading to GRC 12: A Race Against Time! It seems as if we are in a constant race against time to ensure our software stays within the mainstream maintenance window – most notable as of late is the sunsetting of SAP ERP (ECC) 6.0. While organizations may be at varying steps on their S/4HANA journey, we encourage them to not lose sight of their GRC application reaching the end of its mainstream maintenance December 31 of this year (… Blog March 3, 2020 Plan Ahead: 5 Best Practices for the Switch to Oracle Cloud It’s a fairly typical scenario: a company’s executive team has agreed to make the move from Oracle E-Business Suite (EBS) to Oracle Cloud and all eyes turn to Finance and IT leadership to make it happen. A project this significant and complex can be overwhelming, and with so many critical tasks happening simultaneously, it is not uncommon to overlook key activities. To ensure organizations do not… Blog March 4, 2020 It’s Time to Take a Critical Look at the Security of Your IoT Devices . . . Now! This was originally published as a Protiviti Flash Report on February 28, 2020. Researchers at Singapore University of Technology and Design uncover major security vulnerabilities that could expose thousands of IoT devices to cyberattack IoT Vulnerabilities on the Rise A recently discovered set of Bluetooth-related vulnerabilities could mean thousands of IoT devices are vulnerable to attack… Blog March 6, 2020 Quantum Computing May Be A Reality Sooner Than You Think On March 3, Honeywell published a paper claiming a new quantum computing technique which can dramatically increase the rate of future developments. Quantum computing power is often described by the metric “quantum volume,” which is a measure of quantum bits or “qubits,” as well as their connectivity and gate and measurement errors. Honeywell uses trapped ions to create their qubits,… Load More