Results for “Quantum Computing” Search Submit Filter by: Advanced Filter All results Solutions Industry Typelist People Client Story Insights/Blogs Filter Search Sort by RelevanceDate Order AscDesc Blog November 15, 2022 Present Challenges Notwithstanding, the EU’s Energy Transition Holds Long-Term Promise Europe’s effort to stamp out greenhouse gas emissions by 2050 in accord with the Paris Agreement and the European Green Deal is arguably the most progressive energy transition plan ever initiated. Ultimately, the continent aims to replace fossil fuel-fired power plants with wind, solar, hydrogen and other renewable sources that will result in innovative business models, technologies and revenue… Blog September 26, 2017 The 8 Character Password is Dead This article would be of interest to security professionals looking to enhance security practices around passwords. Passwords have been computer security’s first and last line of defense for decades. Despite exponential growth in computing power, 8 character passwords still remain the security standard for many organizations. This password length is no longer acceptable. With under $5,000 in… Blog March 8, 2018 Security Advisory: Meltdown and Spectre – Processor Flaws Expose Networks to New Class of Vulnerabilities Security researchers have identified a flaw, present in most computer processors, that allows unauthorized disclosure of information. The flaw, which affects most major processor manufacturers, is the first known instance of a security vulnerability at the processor level, and could be exploited in servers, workstations (including laptops), network infrastructure, mobile devices, IoT devices and… Blog January 9, 2018 Security Advisory: Meltdown and Spectre – Processor Flaws Expose Networks to New Class of Vulnerabilities Security researchers have identified a flaw, present in most computer processors, that allows unauthorized disclosure of information. The flaw, which affects most major processor manufacturers, is the first known instance of a security vulnerability at the processor level, and could be exploited in servers, workstations (including laptops), network infrastructure, mobile devices, IoT devices and… Blog September 29, 2016 The Evolution of Risk Reporting One of the key questions financial services firms ask every morning is, “Am I riskier today than I was yesterday?” Institutions need to know whether their risk profile has changed, and why. In such a highly competitive industry and a constantly evolving economic environment, knowing how and why their risk profile is changing – or is about to change – is a significant advantage because it can… Survey December 15, 2022 Executive Perspectives on Top Risks 2023 & 2032 PE-owned companies weigh in on their top risks for 2023 and the next decade, from labor and global supply chain issues to resilience and cultureWhen it comes to the risk landscape for 2023 and the next 10 years, people, talent and culture top the list of concerns for organizations worldwide – specifically, succession challenges and the ability to attract and retain top talent, as well as being… Leadership Douglas Sellers Douglas is a Managing Director within Protiviti’s Software Services (PSS) group based out of Chicago. For the past 22 years he has been helping clients innovate, create, and realize value by blending business with technology through software development. Doug has deep expertise in bringing software solutions to market, establishing software managed service arrangements with clients, and… Whitepaper July 19, 2021 Resilience Practices Can Help Firms Mitigate Supply Chain and Third-Party Provider Risks - Top of Mind Compliance Issues for 2021 Customers are major drivers of change in the marketplace. In times of stress, how well companies manage customer experience and expectation can determine whether they succeed. At the height of the COVID-19 pandemic, amid demand spikes and panic buying of household items like groceries and cleaning products, companies that successfully addressed customers’ demands (e.g., restocked alternative… Whitepaper July 22, 2021 The shift to zero trust The future of organizations will be built on the ability to work securely from anywhere, using any device at any time. This was made clear during the COVID-19 pandemic, which forced millions of workers to work from home using company-owned or personal devices. As the velocity and persistence of cybersecurity attacks increase daily and digital transformation continues to be a priority for… Blog September 26, 2024 The Strategic Imperative of Enterprise Resilience In a volatile business environment, the concept of resilience has emerged as a cornerstone of strategic management. More than just a trendy concept, resilience should be ingrained as a key organizational goal, fostered through a comprehensive and continuous strategy. This strategy integrates a thorough understanding of the risk environment, enabling organizations to adapt and prosper when – not… Load More