Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Survey July 30, 2024 Internal Auditing Around the World® Studying the cosmos has transformed our understanding of how planets, stars and galaxies form, and revealed deeper insights into the fundamental nature of the universe. Astrophysicists and cosmologists pursue this knowledge, in effect, by looking into the past. Using cutting-edge technology like that employed in the James Webb Space Telescope, they examine places that existed billions of years… Whitepaper July 14, 2021 Enterprise Thinking: Planning the Deployment of Microsoft 365 to Ensure Investment The Microsoft 365 platform transforms how every member of an organisation chats, emails, shares files and performs the essential tasks inherent to all corporate roles. A comprehensive approach to Microsoft 365 deployment planning will ensure the efficiency, cost saving and employee satisfaction that the Microsoft 365 investment has the potential to deliver. Widely available… Whitepaper August 11, 2023 Navigating sanctions compliance through the transition to ISO 20022 The International Organisation for Standardisation’s (ISO) new global messaging standard, ISO 20022, is set to be adopted by payment processing organisations globally by 2025. Flash Report March 9, 2023 New White House Cybersecurity Strategy Creates Additional Concerns for Businesses The White House recently released a comprehensive national cybersecurity strategy that is sure to have a major impact on government agencies as well as private businesses. The Biden-Harris Administration has been percolating a comprehensive cybersecurity strategy for some time and in early March released the aptly named “National Cybersecurity Strategy.” The 35-page document was created to help… Podcast July 18, 2022 Podcast | Coding High-Performance, Post-Quantum Secure Blockchain Systems with Geometry Labs and The QRL In coding, libraries make developers’ lives easier, sparing them thousands of lines of code, while also increasing performance and security. And everyone’s concerned with security as fault-tolerant quantum computing approaches. Geometry Labs has released the “lattice-algebra” library to bring a high-performance cryptographic library to developers interested in using post-quantum cryptography in… Flash Report November 9, 2021 U.S. Department of Defense Updates Cybersecurity Maturity Model Certification Requirements: CMMC 2.0 On November 4, 2021, the U.S. Department of Defense (DoD or Department) published a proposed update to its Cybersecurity Maturity Model Certification (CMMC) and defined a path forward that has Defense Industrial Base (DIB) contractors eager to understand impacts to their business and anticipated next steps in the evolution of the CMMC programme. In addition to simplifying and consolidating the… Podcast March 23, 2022 Podcast | Quantum Machine Learning Using PennyLane with Xanadu Quantum machine learning, or QML, is one of the three major application categories for quantum computing, along with optimisation and simulation. As we’re working with customers at Protiviti to find advantageous use cases in QML, we rely daily on a tool called PennyLane from Xanadu. Join host Konstantinos Karagiannis, and special cohost Emily Stamm, for a chat with Nathan Killoran from Xanadu to… Podcast June 2, 2021 Podcast | Quantum Computing Use Cases with Super.tech The holy grail of quantum computing in the near term is a use case that provides advantage. We believe it’s only a matter of time, but major companies have to plan and prepare now so that they are not left behind when these applications arrive. Join host Konstantinos Karagiannis for a chat about quantum computing use cases with Pranav Gokhale from Super.tech. We cover mostly financial customer… Flash Report June 3, 2022 SEC Cybersecurity Disclosure Enhancements: They’re Coming, in One Form or Another Three months ago, the U.S. Securities and Exchange Commission (SEC) proposed amendments to its rules on cybersecurity risk management, strategy, governance and incident reporting by public companies subject to the reporting requirements of the Securities Exchange Act of 1934. The SEC’s view is that cybersecurity threats and incidents pose an ongoing threat to public companies, investors and… Whitepaper October 16, 2023 The Regulators Are Optimising Their Use of Data. Are You? Can financial institutions manage effectively in a world where issues and breaches are known to regulators before the chief compliance officer or anyone else in the organisation even learns about them? Load More