Insight Search

Sort by:
  • Flash Report

    December 14, 2020
    On December 13, 2020, the Cybersecurity & Infrastructure Security Agency (CISA) issued an emergency directive detailing required action for federal agencies to mitigate the threat of the recently discovered compromise involving SolarWinds® Orion® Network Management products that are currently being exploited by malicious actors. (Read the SolarWinds Security…
  • Newsletter

    February 12, 2021
    Like any enterprisewide organisational change, implementing an operational resilience programme across an organisation requires a careful and collaborative effort to be successful. Whether implementation has been in the works for several years or is just beginning, turning the resilience programme from concept to reality is hard work. Except for the most dynamic and change-…
  • Podcast

    September 21, 2022
    Are you interested in becoming a quantum coder? The job market looks as large as the machines are cold. We’re all struggling in the quantum computing industry to find talent. Do you have what it takes? You may even be able to get started with less experience than you think. Join host Konstantinos Karagiannis for a chat about the path to this exciting career with Peter Noell from ColdQuanta.…
  • Podcast

    August 10, 2022
    It’s hard to improve the purity of an atom. Identical and easy to find, atoms such as those in ytterbium can make flawless qubits. We only need to be able to trap and control them. Can using trapped ions as qubits therefore yield the most powerful quantum computers on the planet? How scalable is this approach on the road to quantum advantage? Join host Konstantinos Karagiannis for a chat about…
  • Podcast Transcript

    October 5, 2022
    In late 2020, physicists in China generated controversy by claiming quantum advantage with a photonic quantum computing system that’s technically not programmable. Other companies have been experimenting with photonic systems, including QuiX Quantum. How do these machines work? Should scientists redefine what quantum advantage means, focusing on practical, usable problems a machine is solving?…
  • Whitepaper

    September 7, 2021
    China’s evolving Cybersecurity Law and what companies should know before operating in mainland ChinaIn 2017 China’s Cybersecurity Law went into effect, marking an important milestone in China’s efforts to create strict guidelines on cyber governance. Over the past five years, numerous updates to the regulations and interpretations have been released making it increasingly difficult for…
  • Whitepaper

    August 26, 2020
    As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection.
  • Whitepaper

    August 26, 2020
    According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction.
  • Whitepaper

    August 26, 2020
    All companies incorporated within Mainland China are required to abide by the Cybersecurity Law of The People's Republic of China (PRC), which went into effect 1 June 2017. 
  • Blogs

    July 19, 2023
    This blog post was authored by Sarah Guthrie - Senior Consultant, Enterprise Application Solutions on Protiviti's technology insights blog.In today’s fast-paced business landscape, organisations rely heavily on robust enterprise resource planning (ERP) systems like Microsoft Dynamics 365 Finance and Supply Chain Management to streamline operations and drive growth. However, granting…
Loading...