Insight Search

Sort by:
  • Podcast Transcript

    June 16, 2023
    Cracking RSA in web traffic is primarily what people think of when they hear about the quantum threat to cryptography. But there are lots of protocols in peril, especially in a typical corporate environment. Join host Konstantinos Karagiannis for a chat with Suvi Lampila from SSH to find out how the security giant is working on securing data flows you may not have considered. Guest: Suvi Lampila…
  • Blogs

    June 19, 2023
    Penetration testing and red teaming are essential cybersecurity practices that bolster an organisation’s security posture by uncovering vulnerabilities within their systems, networks, and people or business processes. These methodologies have distinct objectives, scopes, approaches and technologies employed.
  • Podcast

    June 20, 2023
    As manufacturing organisations assess new ways to innovate and transform their operations, one area they continue to explore is the development of agile factories. In this episode, we talk with Protiviti Managing Directors Sharon Lindstrom, David Petrucci and Robert Giacobbe. Together, they explore the concept of agile factories and the importance of building flexibility and adaptability in the…
  • Blogs

    June 30, 2023
    This blog post was authored by Justin Turner - Director, Security and Privacy on the technology insights blog. Anyone who has spent a significant amount of time in any U.S. state where college football is popular, has likely seen a “house divided” bumper sticker or license plate cover, with contrasting university logos. Many of us (and our friends and families) enjoy spirited rivalries (Roll…
  • Podcast

    June 28, 2023
    Quantum Information Science just might have commercial impact before quantum computing achieves error correction. All sorts of vertical industries will be able to take advantage of quantum clocks and sensors, enabling better navigation and even “seeing” through miles of solid Earth. Join Host Konstantinos Karagiannis for a chat about these amazing devices and what we can expect from cold atom…
  • Blogs

    June 30, 2023
    The big picture: Aligned assurance can create multiple benefits, including: Giving stakeholders a common view of risks and issues across the organisation Reducing repetitive, manual testing, which allows more focus on high-value activities By the numbers: In a recent Protiviti webinar on aligned assurance, only 14% of the audience members reported that collaboration across the…
  • Podcast

    June 30, 2023
    Well, it looks like a recession is coming. Or maybe it's not. Or maybe it is. It seems like it's been a long wait for the other economic shoe to drop. And in the meantime, many questions are arising around managing costs in organisations. CFOs and finance leaders continue to have a lot of questions, and get even more from their internal stakeholders and customers, about projections, cost…
  • Podcast Transcript

    June 29, 2023
    As manufacturing organisations assess new ways to innovate and transform their operations, one area they continue to explore is the development of agile factories. In this episode, we talk with Protiviti Managing Directors Sharon Lindstrom, David Petrucci and Robert Giacobbe. Together, they explore the concept of agile factories and the importance of building flexibility and adaptability in the…
  • Podcast Transcript

    June 29, 2023
    Well, it looks like a recession is coming. Or maybe it's not. Or maybe it is. It seems like it's been a long wait for the other economic shoe to drop. And in the meantime, many questions are arising around managing costs in organisations. CFOs and finance leaders continue to have a lot of questions, and get even more from their internal stakeholders and customers, about projections, cost…
  • Blogs

    June 30, 2023
    We’ve all heard the saying, “what gets measured gets done,” meaning that regular measurement and reporting helps to keep organisations focused on the information that matters. But with so many data points available to measure security, it is difficult to know where to begin. Security practitioners must constantly question what data they collect and why. Only by providing relevant measures can we…
Loading...