Insight Search

Sort by:
  • Blogs

    September 7, 2021
    I’m a professional hacker, or as we are referred to in the security industry, a penetration tester. As a penetration tester, I am hired by organisations to attack their systems, networks, applications, and employees in the same fashion that a malicious attacker would. It is my job to find and exploit weaknesses before malicious attackers can. These weaknesses include application and network-…
  • Blogs

    June 17, 2021
    Several years ago, we invited board members to speak candidly about presentations from company executives. Those free-flowing conversation more than lived up to what was billed as a “Don’t Bore the Board” panel discussion. The panel members’ engaging insights remain instructive to CISOs today as security leaders strive to hone their increasingly important board presentation approaches. One…
  • Blogs

    May 13, 2021
    The amount of new cybersecurity threats and vulnerabilities that organisations respond to grows every day. In many cases Zero Trust Networks (ZTN) are better equipped to tackle these challenges than traditional perimeter-based networks. Further, Zero Trust principles are becoming a critical part of the overall corporate strategy…
  • Blogs

    January 11, 2023
    Five years ago, we wrote a post called “The 8 Character Password is Dead,” which was an in-depth look at password cracking in 2017 and how eight-character passwords do not adequately protect organisations. In that analysis, we broke down the math and how quickly hardware purchased for under $5,000 could make an eight-character length irrelevant. Unfortunately, in just five years’ time, the…
  • Blogs

    January 13, 2023
    This blog post was authored by Mike Ortlieb, Director, Security and Privacy and Chris Porter, Associate Director, Security and Privacy on The Technology Insights Blog. Threat actors are an ever-evolving species. Portrayed in popular advertising as guys dressed in black, probably sporting a ski mask, the harsh reality is that these bad actors are everywhere and are getting more creative…
  • Video

    December 17, 2018
    Vulnerability Assessment and Penetration Testing are the first steps to mitigate the risk of cybercrime. Protiviti helps organizations with a full range of security and privacy services. Our experts attempt to gain access to sensitive target data using common hacking techniques, spearfishing and specialized malware. How do you know whether your organization is protected and your customer data is…
  • Newsletter

    May 10, 2022
    A Decade of Testing and Resilience Over the past 10 years, the Securities Industry and Financial Markets Association (SIFMA) has coordinated a series of industrywide resilience exercises known as Quantum Dawn. These exercises provide a forum for financial firms, regulatory bodies, central banks, law enforcement, government agencies, trade associations and information-sharing organisations to…
  • Podcast Transcript

    January 5, 2021
    In this episode, Kevin Donahue, a senior director with Protiviti speaks with Protiviti's associate director Justin Turner and manager Derek Dunkel-JahanTigh about security for industrial control systems, or operational technology. 
Loading...