Insight Search

Sort by:
  • Client Story

    June 16, 2023
    A leading biotechnology company that develops life-transforming medicines has worked for decades to improve the lives of those who rely on their work. But recently, they found themselves in need of assistance to enhance the security of their AWS environment.
  • Whitepaper

    August 31, 2023
    By Sharon Lindstrom - Global Leader, Manufacturing and Distribution Industry Practice, ProtivitiBy the numbers: Overall, organisations today spend an average of 30% of their IT budgets on and invest a fifth of their IT human resources in technical debt management.This research, based on a global survey of more than 1,000 CIOs, CTOs and other technology leaders, underscores the burden created by…
  • Client Story

    June 16, 2023
    A blockchain/web3 startup engaged Protiviti to review their AWS environment. While getting the product to market as fast as possible was a primary goal for the client, security was an afterthought in many scenarios. To address this need and prevent a potential catastrophic security event, the client wanted a quick and consistent way to understand where their security gaps were and how they could…
  • Newsletter

    November 14, 2021
    In the third decade of the 21st century, smart companies and boards across all industries recognise that the pace of technological change continues to unfold at warp speed. The question in the boardroom a decade ago — “Should we invest in digital transformation?” — has transitioned to a different question today: “How much should we invest and, more important, how fast should we invest, given our…
  • Whitepaper

    September 7, 2021
    China’s evolving Cybersecurity Law and what companies should know before operating in mainland ChinaIn 2017 China’s Cybersecurity Law went into effect, marking an important milestone in China’s efforts to create strict guidelines on cyber governance. Over the past five years, numerous updates to the regulations and interpretations have been released making it increasingly difficult for…
  • Whitepaper

    August 26, 2020
    As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection.
  • Whitepaper

    August 26, 2020
    According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction.
  • Whitepaper

    August 26, 2020
    All companies incorporated within Mainland China are required to abide by the Cybersecurity Law of The People's Republic of China (PRC), which went into effect 1 June 2017. 
  • Blogs

    August 8, 2023
    Janna Anderson, professor of communications and director of the Imagining the Internet Center at Elon University, is the lead author of the report The Metaverse in 2040, published in partnership with Pew Research. She is a senior contract researcher for Pew and co-leads the center’s 19-year series of reports outlining experts’ predictions for the most likely future of digital life. The full…
  • Blogs

    July 14, 2023
    Apple’s announcement of its Vision Pro virtual reality headset earlier this month elicited some strong opinions across the board. Could it really replace the iPhone and mainstream the metaverse, as some have claimed? Or is it just another overpriced wearable for the wealthy?
Loading...