Results for

  • Blog
    August 30, 2018
    Let’s evaluate one of the more prominent requirements of the GDPR obligation: the mandatory 72-hour breach-notification requirement. The GDPR Article 33 requires that, in the event of a personal data breach, the data controller – without undue delay and, where feasible, no later than 72 hours after becoming aware of it – notify the appropriate supervisory authority. While the GDPR applies to…
  • Podcast
    September 7, 2022
    An 85-year-old idea may hold the key to nearly error-free qubits. The Majorana fermion has taken on almost mythical status, but Microsoft recently solved a critical technical hurdle to creating topological qubits with the particle. How close are we to quantum computers with this technology? What other future developments can we expect from Azure Quantum? Join host Konstantinos Karagiannis for a…
  • Podcast
    August 24, 2022
    Building better quantum computers requires improving every component. What if there was a quantum CAD tool that could help develop higher-fidelity qubits or effective quantum memory? Quantopticon has developed a software design tool to help photonic quantum computing live up to this promise. Join host Konstantinos Karagiannis for a chat about enabling the creation of futuristic components with…
  • Whitepaper
    June 3, 2022
    Chief Financial Officers (CFOs) of high-growth technology companies met virtually to share leading practices, discuss and exchange learnings on challenges, industry trends and topics of mutual interest. The agenda for this small-group meeting, conducted under Chatham House Rule, was created through a series of pre-interviews. Comments from participating CFOs are summarised below.
  • Whitepaper
    June 1, 2022
    A hybrid RBAC, ABAC and PBAC framework is the best practice approach A strong access management programme is foundational to establishing a Zero Trust environment by using contextual information to continuously validate that users are who they say they are and by restricting user access to necessary resources only. Within the Zero Trust framework, identity governance and risk-based…
  • Flash Report
    June 3, 2022
    Three months ago, the U.S. Securities and Exchange Commission (SEC) proposed amendments to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing threat to public companies, investors and…
  • Client Story
    September 26, 2022
    A leading Fortune 500 energy company with nine million utility customers sought to divest a long-held subsidiary to another leading energy provider. Solving the complex transition of technology, data and customer service from one provider to another required a comprehensive understanding of both the security environment and the timing of regulatory approvals. Utilising a team of experienced…
  • Podcast Transcript
    September 21, 2022
    Are you interested in becoming a quantum coder? The job market looks as large as the machines are cold. We’re all struggling in the quantum computing industry to find talent. Do you have what it takes? You may even be able to get started with less experience than you think. Join host Konstantinos Karagiannis for a chat about the path to this exciting career with Peter Noell from ColdQuanta.…
  • Blog
    May 15, 2018
    These days, the hot analogy in the analytics industry is that data is the new oil. Like oil, data must be found, extracted, refined and distributed. More companies are investing heavily in cutting-edge technologies like machine learning, artificial intelligence and big data processing to help them harvest, groom and apply data to the correct use case for maximum value. So why, then, in the midst…
  • Podcast Transcript
    October 5, 2022
    It’s hard to improve the purity of an atom. Identical and easy to find, atoms such as those in ytterbium can make flawless qubits. We only need to be able to trap and control them. Can using trapped ions as qubits therefore yield the most powerful quantum computers on the planet? How scalable is this approach on the road to quantum advantage? Join host Konstantinos Karagiannis for a chat about…
Loading...