Insight Search

Sort by:
  • Client Story

    April 22, 2020
    Globalisation and the internet in recent history have generated any number of benefits for corporations, professionals and job seekers by allowing them to seek collaboration and expansion opportunities in new markets. But this virtual free flow of commerce and cooperation can abruptly hit a dead end at the door of regulators with purview over certain countries or jurisdictions, halting businesses…
  • Client Story

    January 2, 2020
    According to the 2018 Census Bureau, 12.8% of the U.S. population has some type of disability. Included in that statistic are those who have impairments that impact accessibility of online websites, applications and documents.These impairments include:Difficulty lifting or grasping, which can impact use of a mouse or keyboardCognitive, mental or emotional impairmentVision impairment (including…
  • Blogs

    May 17, 2024
    Anyone who wins business via competitive bid may have noticed that requests for proposals (RFPs) increasingly feature instructions to adopt inclusive language in responses. Over the past several years, more and more potential customers are seeking cybersecurity partners whose values in the areas of diversity, equity and inclusion (DEI) correspond with their own. Sometimes, enterprises will…
  • Blogs

    April 21, 2023
    Senior leaders focused on cybersecurity recognise there is considerable guidance, best practices, frameworks, regulations and varied opinions on how programmes should design defensive capabilities. In addition, depending on the day, the various pressures in the organisation’s macro-environment may be greater or lesser and invite different priorities for time, team and budget. Despite these…
  • Blogs

    September 27, 2023
    By 2025, core banking workload deployment on cloud is expected to be 14% of total IT spend.Banks are grappling with outdated applications; data is siloed and trapped within legacy systems and not accessible for customer insights and tailored experiences and services.Regulatory changes in Australia, the UK and U.S., in GDPR and APRA standards for data privacy and operational resiliency, are also…
  • Blogs

    July 14, 2023
    In recent years, there’s been considerable talk of blockchain and its use cases in the business world. While some of these topics have specific use cases – metaverse, decentralised finance, etc – there is one topic that underpins everything in the blockchain and decentralised space: smart contracts. Smart contracts are behind-the-scenes applications that route data, track changes and settle…
  • Blogs

    January 13, 2023
    This blog post was authored by Mike Ortlieb, Director, Security and Privacy and Chris Porter, Associate Director, Security and Privacy on The Technology Insights Blog. Threat actors are an ever-evolving species. Portrayed in popular advertising as guys dressed in black, probably sporting a ski mask, the harsh reality is that these bad actors are everywhere and are getting more creative by the…
  • Podcast

    October 9, 2023
    The results from this year's Global Technology Audit Risks Survey, conducted by Protiviti and The Institute of Internal Auditors, reveal a complex and multifaceted landscape of technology risks. Cybersecurity is the top priority and by a wide margin. AI is an emerging risk with gaps in organisational preparedness and audit proficiency. The talent gap in IT is a growing concern and data privacy is…
  • Podcast Transcript

    October 9, 2023
    The results from this year's Global Technology Audit Risks Survey, conducted by Protiviti and The Institute of Internal Auditors, reveal a complex and multifaceted landscape of technology risks. Cybersecurity is the top priority and by a wide margin. AI is an emerging risk with gaps in organisational preparedness and audit proficiency. The talent gap in IT is a growing concern and data privacy is…
  • Blogs

    February 23, 2024
    In today’s interconnected world, where adversaries seem to always be one step ahead, companies face an increasingly complex threat landscape. One of the most challenging and often overlooked threats is the dark web, an intentionally hidden part of the internet where threat actors can operate with a greater sense of anonymity. To adequately protect assets, companies need to do more than merely…
Loading...