Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper August 26, 2020 China's Cybersecurity Law: Cross-Border Data Transfer As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this fifth installment focuses on the cross-border transfer of data — or data localisation — that is outlined in Article 37. Podcast June 29, 2022 Podcast | From Qubits to Qumodes in Photonic Quantum Computing with QuiX Quantum In late 2020, physicists in China generated controversy by claiming quantum advantage with a photonic quantum computing system that’s technically not programmable. Other companies have been experimenting with photonic systems, including QuiX Quantum. How do these machines work? Should scientists redefine what quantum advantage means, focusing on practical, usable problems a machine is solving?… Podcast Transcript October 5, 2022 Transcript | From Qubits to Qumodes in Photonic Quantum Computing with QuiX Quantum In late 2020, physicists in China generated controversy by claiming quantum advantage with a photonic quantum computing system that’s technically not programmable. Other companies have been experimenting with photonic systems, including QuiX Quantum. How do these machines work? Should scientists redefine what quantum advantage means, focusing on practical, usable problems a machine is solving?… Whitepaper February 9, 2023 Managing EUDA Risks in Financial Institutions End-user developed applications (EUDAs) — applications developed and maintained by an organisation’s users rather than its information technology (IT) department — are a significant source of risk in financial institutions (FIs), as they are increasingly relied on to provide critical data for financial, management and regulatory modelling and reporting. The applications — also known as end-user… Whitepaper September 7, 2021 China's Evolving Cybersecurity Law China’s evolving Cybersecurity Law and what companies should know before operating in mainland ChinaIn 2017 China’s Cybersecurity Law went into effect, marking an important milestone in China’s efforts to create strict guidelines on cyber governance. Over the past five years, numerous updates to the regulations and interpretations have been released making it increasingly difficult for… Whitepaper August 26, 2020 Interpretations of the Updates to China’s Cybersecurity Law All companies incorporated within Mainland China are required to abide by the Cybersecurity Law of The People's Republic of China (PRC), which went into effect 1 June 2017. Whitepaper August 26, 2020 China’s Cybersecurity Law: Personal Information Protection Law (PIPL) Overview As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection. Newsletter July 13, 2023 The Metaverse: The Dawn of a New Generation of Capabilities The big picture: The metaverse has the potential to be a disruptive, expansive and transformative force, even to the point of spawning its own economy. Every board has a fiduciary duty to evaluate that potential for its company’s future. By the numbers: According to a survey of 250 global business leaders, the metaverse has the potential to dramatically alter the future of the human experience… Blogs May 20, 2022 Geopolitical Tensions Exacerbate TMT Industry’s Top Risk Concerns The last two years have provided a considerable test of resiliency for technology, media and telecommunications (TMT) companies. Industry leaders have been widely commended for spearheading growth and innovation during this period, but they continue to face a broad range of risks that require laser-focused mitigation strategies. In recent months, a dominant threat to the industry has been the… Newsletter June 7, 2023 Modernising Legacy Infrastructure to Increase Competitiveness: The Board’s Role The big picture: Innovative culture, speed to market, customer focus and organisational agility are mainstays in boardroom conversations about innovation. However, these discussions should also address technological roadblocks to realising innovation initiatives. Load More