Insight Search

Sort by:
  • In Focus

    August 28, 2024
    Earlier this month, the National Institute of Standards and Technology (NIST) approved three post-quantum cryptography (PQC) standards that constitute the first significant steps towards protecting critical services from quantum computers being used to break the encryption of sensitive and classified information for both business and government.
  • Video

    October 14, 2021
    Healthcare Provider Internal Audit Plan Priorities Funding, privacy, security and IT system changes dominate priorities for healthcare internal auditors. In this sessions learn about key findings from the latest survey conducted by Protiviti and AHIA on Healthcare Provider Organisation Internal Audit Plan Priorities. Speakers: Richard Williams, Managing Director Alex Robison, Managing Director…
  • Survey

    September 26, 2024
    Protiviti’s global internal audit survey 2024 highlights the challenges and technology risk trends faced by internal auditors worldwide. Download the report.
  • Newsletter

    May 3, 2022
    Ransomware attacks have been around for many years. In the past, cyber-threat actors would penetrate a company’s computer and network systems and obtain data with the objective of returning it upon payment. The demanded payments were usually smaller than the ransoms requested in recent incidents. Most of these incidents weren’t financially material, nor were they reported publicly. By contrast,…
  • Podcast

    June 15, 2022
    In coding, libraries make developers’ lives easier, sparing them thousands of lines of code, while also increasing performance and security. And everyone’s concerned with security as fault-tolerant quantum computing approaches. Geometry Labs has released the “lattice-algebra” library to bring a high-performance cryptographic library to developers interested in using post-quantum cryptography in…
  • Whitepaper

    July 22, 2022
    Issue Financial institutions have invested significant time, money and resources into developing and maintaining anti-money laundering (AML) compliance programs. One key enabler of an AML compliance program is the software used to review customers, analyse transactions to identify suspicious activities, and provide analytical and research capabilities to support the filing, or non-…
  • Client Story

    June 16, 2023
    A leading biotechnology company that develops life-transforming medicines has worked for decades to improve the lives of those who rely on their work. But recently, they found themselves in need of assistance to enhance the security of their AWS environment.
  • Client Story

    June 16, 2023
    A blockchain/web3 startup engaged Protiviti to review their AWS environment. While getting the product to market as fast as possible was a primary goal for the client, security was an afterthought in many scenarios. To address this need and prevent a potential catastrophic security event, the client wanted a quick and consistent way to understand where their security gaps were and how they could…
  • Survey

    April 4, 2024
    Businesses today face a myriad of challenges as they work to adapt and transform their operational models in order to overcome future obstacles, including competitive pressures and cyber threats. Moreover, the global marketplace is deeply influenced by advancements in technology, changing regulations and economic factors, all of which necessitate access to skilled professionals and expertise.…
  • Flash Report

    December 18, 2020
    The news of the cyber attacks being experienced by government agencies and an expanding list of organisations continues to grow and change on almost an hourly basis. This is proving to be potentially one of the most significant cyber breaches in recent times. Following up on our December 14, 2020, Flash Report on the CISA advisory, and in response to numerous questions and inquiries we…
Loading...