Insight Search

Sort by:
  • Flash Report

    March 9, 2023
    The White House recently released a comprehensive national cybersecurity strategy that is sure to have a major impact on government agencies as well as private businesses. The Biden-Harris Administration has been percolating a comprehensive cybersecurity strategy for some time and in early March released the aptly named “National Cybersecurity Strategy.” The 35-page document was created to help…
  • Podcast

    July 24, 2024
    The migration to post-quantum cryptography (PQC) is about to begin and is necessary to protect against the threats of fault-tolerant quantum computing. However, critical assets like those in military, banking, and government environments also require other layers of security and strategies such as zero trust and increased encryption bit sizes. Join host Konstantinos Karagiannis as he discusses a…
  • Newsletter

    April 9, 2021
    On February 26, 2021, the Board of Governors of the Federal Reserve System (FRB) in the United States issued expectations for boards of large financial institutions as a standard for its regulators when they assess board effectiveness. The guidance applies to all domestic bank holding companies and savings and loan holding companies with total consolidated assets of $100 billion or more, with…
  • Podcast

    November 1, 2023
    It’s the 11th hour as we approach 2024 and the release of NIST’s post-quantum cryptography standards. Is it possible for your business to start protecting some critical assets today from tomorrow's cryptanalytically relevant quantum computing? Find out how a few applications already do so. Join Host Konstantinos Karagiannis for a chat with Denis Mandich from Qrypt.Guest: Denis Mandich from Qrypt
  • Podcast Transcript

    October 31, 2023
    It’s the 11th hour as we approach 2024 and the release of NIST’s post-quantum cryptography standards. Is it possible for your business to start protecting some critical assets today from tomorrow's cryptanalytically relevant quantum computing? Find out how a few applications already do so. Join Host Konstantinos Karagiannis for a chat with Denis Mandich from Qrypt.Guest: Denis Mandich from Qrypt
  • July 14, 2023
    In recent years, there’s been considerable talk of blockchain and its use cases in the business world. While some of these topics have specific use cases – metaverse, decentralised finance, etc – there is one topic that underpins everything in the blockchain and decentralised space: smart contracts. Smart contracts are behind-the-scenes applications that route data, track changes and settle…
  • Client Story

    April 28, 2022
    Web application accessibility is critical to the ongoing success of any digital application. In fact, the Americans with Disabilities Act (ADA) includes digital assets in its definition of “public places of accommodation” that should adhere to accessibility standards. Jamf, a global software company based in Minneapolis, Minn., produces applications to manage Apple devices and services and has a…
  • July 14, 2023
    This blog post was authored by Rob Woltering - Associate Director, Security and Privacy on the technology insights blog. As cybersecurity incidents continue to make headlines, whether involving the breach of sensitive information or the halting of an enterprise’s operations, cybersecurity risks remain top of mind for many organisations. To this end, organisations are continuously…
  • Podcast

    July 20, 2023
    VISION by Protiviti interviews Dr. Ian Oppermann, the New South Wales Government’s Chief Data Scientist working within the Department of Customer Service and expert on the future impact of technology on society, about how we’ll use the metaverse in the future. Dr. Oppermann is also an Industry Professor at the University of Technology Sydney and served as CEO of the New South Wales Data…
  • Flash Report

    April 28, 2022
    Cybersecurity threats are growing exponentially as companies introduce an increasing number of Internet of Things (IoT) devices into operations and collect and store an ever- escalating amount of data. This technology and data sprawl is providing bad actors with more entry points into networks and systems. Too often, organisations have failed to make commensurate investments in data protection,…
Loading...