Insight Search

Sort by:
  • Podcast

    October 1, 2024
    Since 2018, the United States has had a national strategy for excellence in quantum information science that includes getting the science right, enhancing competitiveness, and enabling people. To achieve that aim, regions across the country have begun ramping up their efforts to become quantum silicon valleys. Find out how Colorado stacks up in advancing the quantum stack, and how recent federal…
  • Blogs

    January 11, 2023
    Five years ago, we wrote a post called “The 8 Character Password is Dead,” which was an in-depth look at password cracking in 2017 and how eight-character passwords do not adequately protect organisations. In that analysis, we broke down the math and how quickly hardware purchased for under $5,000 could make an eight-character length irrelevant. Unfortunately, in just five years’ time, the…
  • Blogs

    April 19, 2024
    As senior executives face more pressure to respond to rising costs and eroding profit margins, CFOs can remind their colleagues that they have more cost-optimisation strategies than they might expect.Many business leaders reflexively reach for the headcount-reduction lever. This is understandable given the rising cost of labor and that downsizing and reducing year-end bonuses usually hits the…
  • Client Story

    February 16, 2023
    Rising energy prices and the resulting profitability typically generate a flurry of merger and acquisition activity in the oil and gas sector. The deals frequently target organizations that are independent and entrepreneurial in spirit — companies that have amassed a significant but often underdeveloped asset base and whose processes generally have not kept up with the growth of the company. The…
  • Whitepaper

    February 21, 2023
    This article will address the changes and updates to ISO 27001 standard published on October 25, 2022, and the approaches organizations can take to implement the changes introduced. There have been significant advancements in technology, as well as an increase in the complexity of security threats since the last iteration of ISO 27001 was published on September 25, 2013. The changes introduced in…
  • Blogs

    May 5, 2023
    Cybersecurity governance should do more than manage cyber risk. Good cybersecurity governance creates efficiencies by clarifying the outcomes expected from its processes and establishing boundaries of responsibility among cybersecurity practitioners, frontline operational areas, senior leaders and board members. Recently, numerous crises have drawn senior leaders and board members down…
  • Newsletter

    October 9, 2024
    Risk reporting to the board may not be fit for purpose in these uncertain times. Directors are trending toward expecting more dialogue, engagement and forward-looking insights based on relevant data and information. A principled approach would help.Boards and their companies face a constant and seemingly unending state of flux in the marketplace. Emergence of the unexpected is the norm. For…
  • Podcast

    November 13, 2024
    To modify a Feynman quote, we can safely say that no one understands quantum … networking. The definition does mean different things to different folks. Sometimes, the best way to solidify a concept is to bring it to the real world. It turns out there is a way to experiment with quantum networking, and you wouldn’t believe how it’s already being used to interconnect different quantum computing…
  • Newsletter

    November 13, 2024
    Almost every organisation around the world is trying to figure out what artificial intelligence (AI) offers and how to deploy it to move the business forward. A road map can help directors engage more effectively in these strategic conversations. With the emergence of generative AI (GenAI), organisations all over the globe are taking a close look at the tremendous promise AI offers in…
  • Podcast

    March 19, 2025
    Migrating to post-quantum cryptography across an organisation will take time. But while you are replacing every cipher to defend against the threat side of quantum computing, you may also want to add systems that bring new functionality and come with PQC out of the gate. Imagine a mobile messaging app like WhatsApp, but with NIST-approved ML-KEM under the hood and enterprise-grade controls. From…
Loading...