Insight Search

Sort by:
  • Podcast

    January 8, 2025
    Most applications businesses rely on are complex, with subroutines, loops, etc. Is it possible to run a binary like this on a quantum computer? Not quite, but one company has a tool that identifies portions of code where quantum computing circuits could make a difference and then manages the necessary handoffs. Join host Konstantinos Karagiannis as he discusses the future of running programs on…
  • Podcast

    September 18, 2024
    Imagine a mesh network of AI-powered nodes that could validate the security of your organisation’s systems and applications. It’s a clever use of blockchain to add security to real-world devices, and, best of all, it will feature post-quantum cryptography. How soon will this technology simplify security for businesses and governments worldwide? And might this kind of approach even prevent killer…
  • Podcast

    January 9, 2025
    In this episode of Board Perspectives, Protiviti Associate Director Alyse Mauro Mason talks to Matthew about the ESG mindset, technology and where we are headed. Matthew leads Microsoft's Sustainability Partners to help companies understand their challenges through data. In 2024, Matthew released a book called ESG Mindset, a guide for companies to think critically about ESG and take a holistic…
  • In Focus

    July 23, 2024
    Global IT systems are still in reboot and recovery after a software update by cybersecurity vendor CrowdStrike caused a massive worldwide outage of Windows computers. Global businesses, governments and organisations were impacted across several industries, including airlines, banks, telecommunications, and healthcare. While the dust settles on the specifics of the how and the why of the global…
  • Resource Guide

    February 5, 2025
    As artificial intelligence (AI) continues its explosive growth within organizations around the world, with virtually every business function exploring opportunities to increase productivity, efficiency and revenue growth, a growing collection of regulations, standards and frameworks around the world is beginning to emerge. Among the most notable of these regulations is the European Union…
  • Newsletter

    January 8, 2025
    Past experience with the cost and risks of technology modernisation projects is driving boards to be more selective about allocating capital and has increased the emphasis on the certainty of delivering tangible value.Technology modernisation is a topic that has found its way into every C-suite and boardroom. In recent years, significant investments have been made by companies recognising a need…
  • Client Story

    July 12, 2018
    Even under normal conditions, creating a global supply chain capability from scratch is a complex and grueling endeavor. When a large U.S. retailer made a strategic decision to develop this ability — which included securing new overseas suppliers for tens of thousands of products, satisfying all customs requirements and creating a nationwide distribution capability — in less than six months, the…
  • Flash Report

    August 19, 2022
    Since the crisis in Ukraine began, Protiviti has issued three Flash Reports. The first addressed Vladimir Putin’s initial foray into two Ukrainian regions with “peacekeeping forces,” the West’s initial wave of sanctions and the implications for companies worldwide. The second reported on the unprovoked all-out invasion of Ukraine, the economic fallout and other actions ostracizing Russia from the…
  • Client Story

    January 6, 2023
    d2i is a cloud-based healthcare analytics solutions firm that’s on the move. The company provides an unparalleled data analytics application that aggregates, harmonizes and enriches diverse data sources to some of the largest hospital emergency departments (ED) in the United States. The company currently extracts Electronic Health Record (EHR) data into their environment for over 240 hospitals.…
  • Newsletter

    September 8, 2021
    Ransomware attacks have been around for many years. In the past, cyber-threat actors would penetrate a company’s computer and network systems and obtain data with the objective of returning it upon payment. The demanded payments were usually smaller than the ransoms requested in recent incidents. Most of these incidents weren’t financially material, nor were they reported publicly. By contrast,…
Loading...