Results for

Sort by:
  • Blogs
    June 4, 2021
    Ensuring IT risks are managed, and compliance requirements are met has only intensified with the recent rapid growth in adoption of cloud services. Deployment of production workloads, migration of regulated systems and increasing storage of large volumes of data in the cloud has driven the need for security and controls to be deployed across customer cloud environments.
  • Blogs
    August 4, 2021
    By Hirun Tantirigama, Matthew Watson and Dugan Krwawicz In today’s rapidly evolving business world, the lines between technology and business have blurred. Organisations need to modernise and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone.…
  • Blogs
    August 9, 2021
    In today’s rapidly evolving business world, the lines between technology and business have blurred. Organisations need to modernise and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti…
  • Blogs
    September 9, 2021
    Over the July 4, 2021 weekend, the Russia-based REvil hacker group perpetrated a ransomware attack on Kaseya software. The software is used by managed service providers (MSPs) to operate their clients’ networks. This attack reportedly shut down 800-1,500 small-to-mid-size clients of around 50 Kaseya MSP customers. The attack illustrates the evolution of ransomware. Historically,…
  • Blogs
    September 10, 2021
    Why Securing our Critical Infrastructure Matters Operational Technology (OT) remains a key, but vulnerable technology for organisations with critical infrastructure. The Australian Government has defined critical infrastructure as “those physical facilities, supply chains, information technologies and communication networks which, if destroyed, degraded or rendered unavailable for an extended…
  • Blogs
    November 17, 2021
    Businesses are experiencing increased agility and reliability – and cost reductions – through cloud transformation but adopting cloud solutions can result in new risks. Sometimes, they impede enterprise vision and regulatory compliance. Applying an appropriate framework to help manage the risk of cloud adoption can mitigate or even eliminate these hazards. In an earlier blog, we introduced…
  • Blogs
    November 29, 2021
    In today’s rapidly evolving business world, the lines between technology and business have blurred. Organisations need to modernise and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti’s…
  • Blogs
    November 29, 2022
    In today’s rapidly evolving business world, the lines between technology and business have blurred. Organisations need to modernise and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti’s…
  • Blogs
    February 10, 2022
    Organisations have been feeling pressure from investors, consumers and other stakeholders to embrace sustainable business practices and focus on environmental, social and governance (ESG) issues for some time. And although ESG issues are not yet a reporting requirement, there are signs that this is changing. In February this year, the Securities and Exchange Commission (SEC) in the U.S. appointed…
  • Whitepaper
    August 26, 2020
    All companies incorporated within Mainland China are required to abide by the Cybersecurity Law of The People's Republic of China (PRC), which went into effect 1 June 2017.
Loading...