Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Blogs October 5, 2023 Australia’s Privacy Act is fundamentally changing: What this means for your organisation On the 28th of September, the Australian Government released its long-awaited response to the Attorney General’s Privacy Act Review Report. The Government response outlines its stance across the 116 proposals put forward by the Attorney General. In May, we originally published our article analysing the proposed changes that we believe will be most impactful for our clients, we have updated the… Blogs April 21, 2023 Enhancing cyber capabilities using a threat-driven strategy Senior leaders focused on cybersecurity recognise there is considerable guidance, best practices, frameworks, regulations and varied opinions on how programmes should design defensive capabilities. In addition, depending on the day, the various pressures in the organisation’s macro-environment may be greater or lesser and invite different priorities for time, team and budget. Despite these… Blogs April 19, 2023 Achieving Diversity’s Benefits in Cybersecurity Could any security organisation benefit from greater innovation? Or from responding more effectively to diverse internal customers? How about benefitting by retaining the talent its leaders have so carefully nurtured, by accessing more diverse capabilities, or by improving problem-solving capabilities within the team? Podcast November 30, 2022 Podcast | Quantum-Inspired Applications with Icosa Computing We’re getting close to practical advantage with quantum computing when running optimisation algorithms. Companies interested in being leaders in their industry should already be considering how to harness this promised power with use cases that solve their business problems. But some companies want a better solution that’s advantageous today, even if it’s only quantum-inspired. Join host… Flash Report March 9, 2023 New White House Cybersecurity Strategy Creates Additional Concerns for Businesses The White House recently released a comprehensive national cybersecurity strategy that is sure to have a major impact on government agencies as well as private businesses. The Biden-Harris Administration has been percolating a comprehensive cybersecurity strategy for some time and in early March released the aptly named “National Cybersecurity Strategy.” The 35-page document was created to help… Podcast March 23, 2022 Podcast | Quantum Machine Learning Using PennyLane with Xanadu Quantum machine learning, or QML, is one of the three major application categories for quantum computing, along with optimisation and simulation. As we’re working with customers at Protiviti to find advantageous use cases in QML, we rely daily on a tool called PennyLane from Xanadu. Join host Konstantinos Karagiannis, and special cohost Emily Stamm, for a chat with Nathan Killoran from Xanadu to… Whitepaper July 22, 2021 The adoption of "Zero Trust" The future of organisations will be built on the ability to work securely from anywhere, using any device at any time. This was made clear during the COVID-19 pandemic, which forced millions of workers to work from home using company-owned or personal devices. As the velocity and persistence of cybersecurity attacks increase daily and digital transformation continues to be a priority for… Whitepaper February 22, 2021 Four Ways Finance Leaders Strengthen Cybersecurity As CEOs and boards become more informed about the extreme threats that cybersecurity lapses pose, their expectations are growing. CFOs’ expanding contributions to fortifying organisational data security, the highest priority identified in Protiviti’s latest Global Finance Trends Survey, play a pivotal role in satisfying those high expectations. Board members demand coherent, relevant and… Flash Report November 9, 2021 U.S. Department of Defense Updates Cybersecurity Maturity Model Certification Requirements: CMMC 2.0 On November 4, 2021, the U.S. Department of Defense (DoD or Department) published a proposed update to its Cybersecurity Maturity Model Certification (CMMC) and defined a path forward that has Defense Industrial Base (DIB) contractors eager to understand impacts to their business and anticipated next steps in the evolution of the CMMC programme. In addition to simplifying and consolidating the… Podcast June 15, 2022 Podcast | Coding High-Performance, Post-Quantum Secure Blockchain Systems with Geometry Labs and The QRL In coding, libraries make developers’ lives easier, sparing them thousands of lines of code, while also increasing performance and security. And everyone’s concerned with security as fault-tolerant quantum computing approaches. Geometry Labs has released the “lattice-algebra” library to bring a high-performance cryptographic library to developers interested in using post-quantum cryptography in… Load More