Insight Search

Sort by:
  • Blogs

    July 20, 2021
    The Digital Age is forcing businesses to seek new ways to avoid falling behind and better serve their customers. Business agility enables organisations to respond quickly to market changes and employee or customer demands without compromising quality. Traditional hierarchical siloed methods no longer work in this environment. Companies seeking speed, innovation and greater customer focus have…
  • Newsletter

    June 19, 2025
    This month, explore what’s top of mind for finance leaders—from smarter cost optimisation strategies to real-world FP&A transformation. Don’t forget to take the 2025 Finance Trends Survey and help shape the future of finance.
  • Newsletter

    July 2, 2025
    As a long-standing Microsoft Cloud Solutions Partner, Protiviti continues to lead the way in delivering AI-powered transformation. This month, we spotlight Microsoft 365 Copilot and Copilot Studio -  platforms that help organisations automate tasks, enhance productivity, and drive innovation.
  • Newsletter

    July 13, 2023
    The big picture: The metaverse has the potential to be a disruptive, expansive and transformative force, even to the point of spawning its own economy. Every board has a fiduciary duty to evaluate that potential for its company’s future. By the numbers: According to a survey of 250 global business leaders, the metaverse has the potential to dramatically alter the future of the human experience…
  • Whitepaper

    September 7, 2021
    China’s evolving Cybersecurity Law and what companies should know before operating in mainland ChinaIn 2017 China’s Cybersecurity Law went into effect, marking an important milestone in China’s efforts to create strict guidelines on cyber governance. Over the past five years, numerous updates to the regulations and interpretations have been released making it increasingly difficult for…
  • Whitepaper

    August 26, 2020
    According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction.
  • Whitepaper

    August 26, 2020
    As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection.
  • Whitepaper

    August 26, 2020
    All companies incorporated within Mainland China are required to abide by the Cybersecurity Law of The People's Republic of China (PRC), which went into effect 1 June 2017.
  • Blogs

    July 14, 2023
    Apple’s announcement of its Vision Pro virtual reality headset earlier this month elicited some strong opinions across the board. Could it really replace the iPhone and mainstream the metaverse, as some have claimed? Or is it just another overpriced wearable for the wealthy?
  • Blogs

    December 5, 2024
    The urgent need to develop a successful competitive strategy and align your supply chain to it has become apparent in recent years. So why haven’t successful implementations of enterprise technology systems kept pace to support this critical need? The issue is that many of the core characteristics of enterprise applications – complex configurations, lengthy implementations, extensive testing and…
Loading...