Insight Search

Sort by:
  • Flash Report

    November 16, 2023
    The results from the recent ASIC cyber security survey, ‘REP 776 Spotlight on cyber: Findings and insights from the cyber pulse survey 2023,’ released on 13 November 2023, have once again highlighted the security posture of corporate Australia’s management of cyber security. While there were some encouraging trends in specific security capabilities around identity and access management,…
  • Whitepaper

    June 24, 2022
    On April 29, 2022, the PCI Security Standards Council (PCI SSC) released new versions of the PCI DSS Self-Assessment Questionnaires (SAQs) ahead of the anticipated June 2022 release timeline. After the release of the new version of PCI DSS 4.0 a month prior, the new versions of the SAQs have been updated to reflect changes in the standard, as well as to adjust requirements applicable for…
  • Flash Report

    November 3, 2023
    In this Flash Report, we summarize the SEC’s allegations against SolarWinds and offer nine points for executives and functional leaders with SEC registrants to consider regarding their own accountability and responsibility for public reporting.
  • Blogs

    July 10, 2023
    Enforcing real-world laws in virtual worlds is complex as it raises issues regarding jurisdiction, sovereignty, and the application of laws to virtual spaces. Roblox recently brought an action against a content creator, alleging the individual had been engaging in harassing behavior in violation of the Roblox terms of service.
  • Whitepaper

    February 17, 2021
    TMT Sector Lists Pandemic Policies, Cyber Threats, Privacy and Information Security as Top Risk Concerns in 2021 The continuing global challenges and potential existential threat posed by the ongoing COVID-19 pandemic. Political divisiveness and polarisation. Social and economic unrest. Gridlock. Artificial intelligence (AI), automation and other rapidly developing digital technologies. Rapid…
  • Infographic

    November 18, 2022
    Whether migrating to cloud-based applications or enhancing data security and privacy or managing workforce disruptions, chief financial officers at technology, media and telecommunications (TMT) organisations are resetting priorities and reimagining their long-term roles. Below are some of the key takeaways from the TMT results of Protiviti's latest Global Finance Trends Survey. Read full survey…
  • Newsletter

    September 10, 2021
    Ransomware is a current threat many people are struggling to understand and manage. Amid the headlines and uncertainty, how can the board respond strategically? Reputation damage, hefty ransoms and business continuity are all concerns with ransomware. But the core of the conversation is about the potential loss of intellectual property and customer information and the specter of unpleasant…
  • Video

    October 14, 2021
    Healthcare Provider Internal Audit Plan Priorities Funding, privacy, security and IT system changes dominate priorities for healthcare internal auditors. In this sessions learn about key findings from the latest survey conducted by Protiviti and AHIA on Healthcare Provider Organisation Internal Audit Plan Priorities. Speakers: Richard Williams, Managing DirectorAlex Robison, Managing…
  • Newsletter

    May 3, 2022
    Ransomware attacks have been around for many years. In the past, cyber-threat actors would penetrate a company’s computer and network systems and obtain data with the objective of returning it upon payment. The demanded payments were usually smaller than the ransoms requested in recent incidents. Most of these incidents weren’t financially material, nor were they reported publicly. By contrast,…
  • Podcast

    June 15, 2022
    In coding, libraries make developers’ lives easier, sparing them thousands of lines of code, while also increasing performance and security. And everyone’s concerned with security as fault-tolerant quantum computing approaches. Geometry Labs has released the “lattice-algebra” library to bring a high-performance cryptographic library to developers interested in using post-quantum cryptography in…
Loading...