Insight Search

Sort by:
  • Blogs

    July 8, 2024
    Content management involves the creation, organisation, storage and distribution of digital content within an organisation, ranging from documents and images to videos and web pages. One of the biggest problems businesses face with content management is the quantity of unstructured content, which is growing exponentially, making it incredibly hard to find good or accurate data.
  • Insights paper

    March 20, 2024
    In today's digital age, data privacy management is paramount for businesses and individuals alike. With the ever-changing regulatory landscape surrounding data protection, organisations must adapt swiftly to ensure compliance and maintain trust with their customers and stakeholders. However, both data sovereignty and localisation play an important role in privacy, as discussed in a previous post…
  • Survey

    December 9, 2021
    Key issues being discussed around the globe in the boardroom and C-suite Massive disruptions in the global supply chain. Challenges in attracting and retaining talent to address needs all across the enterprise. The Delta and Omicron variants. Cyber attacks and ransomware. Geopolitical tensions in specific regions and shifts on issues related to climate change. Long-overdue shifts in expectations…
  • Blogs

    April 29, 2022
    The Potential of Machine Learning (ML) to deliver value to banks has created something of a gold rush in adopting this methodology for banking applications. ML can produce immense benefits when applied to complex nonlinear problems where there is a large amount of data, particularly unstructured data. Use cases for incorporating machine learning in banking include asset management, fraud…
  • Newsletter

    September 25, 2023
    Delivering results — and the 60-hour-a-week grind fests that doing so demanded — often sufficed for “leadership development.” Not anymore.What’s at stake: It’s time to understand new talent and workforce realities. Organisations that fail to address succession planning and leadership development inadequacies won’t be successful over the long term — rather, they expose themselves to strategic…
  • Whitepaper

    July 28, 2022
    The past 18 months have seen a significant increase in threats targeting critical infrastructure and operational technology (OT) networks. These environments are prime targets due to their age, complexity and importance to organisations. OT is the driver behind the largest corporations in the world – whether it is mixing the secret recipe for Coca-Cola, generating power for millions of customers…
  • Podcast Transcript

    September 22, 2021
    Engineering challenges abound in quantum computing. Technologies like interconnect and improved memory for repeaters will enable these machines to accelerate and power connectivity in the future. Q-NEXT is one of five quantum information science research centers funded by the DOE to help develop these technologies in addition to strengthening the nation’s leadership position in the quantum arms…
  • Blogs

    May 16, 2022
    Cyber risk is a growing threat to organisations of all shapes and sizes. Cyber risk quantification allows organisations to better understand the financial impact that these risks pose; however, setting the scope of quantification activities and clearly articulating their outputs can be a challenge. Recently, Protiviti teamed up with the FAIR Institute to review how organisations can implement key…
  • Client Story

    February 7, 2023
    A global hospitality company needed to transition their highly manual process for RFPs to one that was more automated. The need to update their processes was driven by the changes required to address the Covid-19 pandemic, which created a dynamic business environment and market demands to act nimbly. The company recognized it required a solution that could automate and expedite a traditionally…
  • Whitepaper

    February 21, 2023
    This article will address the changes and updates to ISO 27001 standard published on October 25, 2022, and the approaches organizations can take to implement the changes introduced. There have been significant advancements in technology, as well as an increase in the complexity of security threats since the last iteration of ISO 27001 was published on September 25, 2013. The changes introduced in…
Loading...