Insight Search

Sort by:
  • Whitepaper

    April 16, 2025
    Any predictions made before 2020 about the future of work have drastically shifted due to the global pandemic, economic transformations and significant social movements. And as we look toward 2030, Hong Kong’s workforce will also see dramatic shifts. Unlike many other regions, Hong Kong’s labour force is deeply influenced by its unique and tumultuous history, resulting in a multigenerational…
  • Blogs

    October 11, 2024
    In today’s fast-paced digital landscape, DevOps practices have revolutionised software development and deployment, allowing organisations in Hong Kong and globally to achieve greater efficiency and agility. As DevOps teams embrace cloud-based infrastructures like Amazon Web Services (AWS), security must remain a paramount concern. Ensuring the security of a DevOps environment in the AWS cloud…
  • Podcast

    May 14, 2025
    Post-quantum cryptography is rapidly moving from the realm of NIST standards to running in production. The threat of quantum computing advances and coming regulations are driving this acceleration. One major component on the PQC migration plan for companies is VPN. In this episode we look at the Ambit corporate VPN client, which uses a standardised NIST PQC cipher: ML-KEM. Did you know there are…
  • In Focus

    November 4, 2024
    During National Cybersecurity Month in October, both the New York State Department of Financial Services (DFS) and the Biden administration issued releases on the opportunities and risks of artificial intelligence (AI). The DFS’s Industry Letter focuses on the impact of AI on the cybersecurity landscape while the Biden administration released the first-ever National Security Memorandum (NSM) on…
  • Blogs

    July 14, 2023
    Cloud transformation is a process of moving applications, data and infrastructure to the cloud. Such simple definitions lack any sense of the business drivers or anticipated benefits that transformation strategies ought to encompass. After undertaking a “transformation” according to these simpler definitions, businesses are left operating in the same old way, making use of the same…
  • Survey

    April 17, 2025
    The higher education sector is contending with significant challenges. Rapid regulatory changes and declining enrolments due to demographic shifts and competition are creating uncertainty. The need for technological integration, increased governmental scrutiny on institutional practises, and financial instability due to tuition discounting are further complicating the landscape. Additionally,…
  • Survey

    June 12, 2024
    If the first few months of 2025 are any indication, navigating risk-strewn near-term and long-term risk environments will be difficult. In this regard, the chief financial officers (CFOs) broad exposure to macroeconomic and strategic risks as well as finance-focused operational challenges is valuable. As finance leaders develop and update strategic roadmaps amid global uncertainty, it is helpful…
  • Podcast

    October 16, 2024
    Quantum information science deals with the world of the very small, sure, but imagine 128 acres of land devoted to advancing QIS. Now imagine this mega complex in a major city! The Illinois Quantum and Microelectronics Park is expected to draw leading companies and researchers to Chicago, and DARPA is already playing a significant role. Find out what this will mean for advancing the industry and…
  • Podcast

    July 23, 2025
    DEF CON 33 approaches, bringing with it the fourth year of Quantum Village. Nothing like getting hands-on with quantum computing and sensing technology at the world’s leading hacking conference. To that end, this episode explores the open-source quantum sensing device and software that our guests Mark Carney and Victoria Kumaran are presenting in Vegas. And yes, for the third year in a row, host…
  • Podcast

    June 25, 2025
    When NIST released the first post-quantum cryptography standards in August 2024, it set off a domino effect that will hopefully result in protecting the world from the quantum computing threat. Now that we’re beginning to migrate and trust our data to lattice-based cryptography, it’s a good time to examine how ML-KEM works and get some hints about how to implement it well. And who better to ask…
Loading...