Results for

Sort by:
  • Whitepaper
    August 26, 2020
    As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this fifth installment focuses on the cross-border transfer of data — or data localisation — that is outlined in Article 37.
  • Whitepaper
    August 26, 2020
    According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction.
  • Whitepaper
    August 26, 2020
    As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection.
  • Whitepaper
    August 1, 2022
    The purpose of security analytics in an organisation Security metrics and the analysis of security information can be challenging concepts even for leading organisations. As information security professionals, most of us have been taught that in order to have a mature information security function we must both document and measure the organisation’s security capabilities. If policies are the…
  • Whitepaper
    August 1, 2022
    U.S. Deputy Attorney General Lisa Monaco has called sanctions “the new FCPA.” [1] The EU has issued a proposal that would make sanctions evasion an EU crime [2] . The U.K.’s Office of Financial Sanctions Implementation (OFSI) is under pressure from key global partners to step up its enforcement activity [3]. These developments are just a few of the signs that the national…
  • Podcast
    September 7, 2022
    An 85-year-old idea may hold the key to nearly error-free qubits. The Majorana fermion has taken on almost mythical status, but Microsoft recently solved a critical technical hurdle to creating topological qubits with the particle. How close are we to quantum computers with this technology? What other future developments can we expect from Azure Quantum? Join host Konstantinos Karagiannis for a…
  • Blogs
    August 2, 2022
    Many companies are evaluating how to leverage cloud tools within their business analytics and data programmes. In this blog, our SAP experts have provided a high-level architecture of SAP Data Warehouse Cloud (SAP DWC) and core functionalities ranging from supported connections, data consumption and manipulation, to preparing for analytical usage. SAP DWC is an end-to-end data management…
  • Newsletter
    May 16, 2022
    A recent Protiviti global survey indicates varying views across different executive groups about the overall risk environment. CEOs rate the relative riskiness of the business environment higher for 2022 than anyone else, jumping from the lowest rating in 2021 to the highest rating in 2022. Also, the number of risks that CEOs noted would have a “significant impact on their business”…
  • Survey
    August 8, 2022
    Supply chain risk is the dominant issue for the Manufacturing and Distribution industry group in 2022 and 2031 – but there’s more Massive disruptions in the global supply chain. Challenges in attracting and retaining talent to address needs all across the enterprise. COVID-19 variants. Cyber attacks and ransomware. Wildfires and flooding. Geopolitical tensions in specific regions and shifts on…
  • Newsletter
    June 6, 2022
    A year ago, an issue of Board Perspectives focused on why the board should care about quantum computing — what it is, when it will become a reality and what steps companies should take to stay on top of this evolving technology market. Since then, use cases for quantum computing continue to emerge. One of the most misleading phrases found in articles about quantum computing is…
Loading...