Insight Search

Sort by:
  • Whitepaper

    August 26, 2020
    In part one of our Point of View (POV) series Interpretations of the updates to China’s Cybersecurity Law, we highlighted the updated legal requirements that impact organisations looking to do business in mainland China. 
  • Podcast

    June 29, 2022
    In late 2020, physicists in China generated controversy by claiming quantum advantage with a photonic quantum computing system that’s technically not programmable. Other companies have been experimenting with photonic systems, including QuiX Quantum. How do these machines work? Should scientists redefine what quantum advantage means, focusing on practical, usable problems a machine is solving?…
  • Blogs

    July 19, 2023
    In today’s fast-paced business landscape, organisations rely heavily on robust enterprise resource planning (ERP) systems like Microsoft Dynamics 365 Finance and Supply Chain Management to streamline operations and drive growth. However, granting unrestricted access to sensitive financial and operational data can pose security risks and compromise data integrity. That’s where read-only roles come…
  • Podcast Transcript

    October 5, 2022
    In late 2020, physicists in China generated controversy by claiming quantum advantage with a photonic quantum computing system that’s technically not programmable. Other companies have been experimenting with photonic systems, including QuiX Quantum. How do these machines work? Should scientists redefine what quantum advantage means, focusing on practical, usable problems a machine is solving?…
  • Whitepaper

    September 7, 2021
    China’s evolving Cybersecurity Law and what companies should know before operating in mainland ChinaIn 2017 China’s Cybersecurity Law went into effect, marking an important milestone in China’s efforts to create strict guidelines on cyber governance. Over the past five years, numerous updates to the regulations and interpretations have been released making it increasingly difficult for…
  • Whitepaper

    August 26, 2020
    As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection.
  • Whitepaper

    August 26, 2020
    According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction.
  • Whitepaper

    August 26, 2020
    All companies incorporated within Mainland China are required to abide by the Cybersecurity Law of The People's Republic of China (PRC), which went into effect 1 June 2017.
  • Podcast Transcript

    October 26, 2022
    Mathematics is one of the most intimidating barriers for those looking to get into quantum coding. Mention linear algebra the next time you want to grind a conversation to a halt. What if there was a resource to learn the necessary mathematics to best prepare for such a career? Join host Konstantinos Karagiannis for a chat with Leonard Woody, the author of an excellent new book, Essential…
  • Infographic

    November 18, 2022
    Whether migrating to cloud-based applications or enhancing data security and privacy or managing workforce disruptions, chief financial officers at technology, media and telecommunications (TMT) organisations are resetting priorities and reimagining their long-term roles. Below are some of the key takeaways from the TMT results of Protiviti's latest Global Finance Trends Survey. Read full survey…
Loading...