Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Podcast November 1, 2022 Podcast | Trapping Ions for Powerful Quantum Computing with IonQ It’s hard to improve the purity of an atom. Identical and easy to find, atoms such as those in ytterbium can make flawless qubits. We only need to be able to trap and control them. Can using trapped ions as qubits therefore yield the most powerful quantum computers on the planet? How scalable is this approach on the road to quantum advantage? Join host Konstantinos Karagiannis for a chat about… Podcast September 21, 2022 Podcast | Becoming a Quantum Coder— with ColdQuanta Interessieren Sie sich dafür, Quantum Coder zu werden? Der Arbeitsmarkt ist groß, die Quantencomputing-Branche sucht händeringend nach Talenten. Haben Sie das Zeug dazu? Vielleicht können Sie sogar mit weniger Erfahrung einsteigen, als Sie denken In Focus February 18, 2025 Does DeepSeek disrupt your AI strategy? It should. Late last month, DeepSeek, the China-based AI startup, sent shockwaves worldwide when it released its latest model, DeepSeek R1, which it says rivals ChatGPT’s capabilities. OpenAI’s o1 model was released on Sept. 12, 2024, roughly four months ahead of DeepSeek’s R1 model release in January. Survey September 8, 2025 2025 Global Finance Trends Survey Der Bericht zu den Finanztrends 2025 beleuchtet die wichtigsten Prioritäten von CFOs, den Einsatz von KI im Finanzwesen sowie die Transformation der Finanzabteilungen, welche die Zukunft der Branche prägen. Laden Sie den vollständigen Bericht herunter. Client Story April 19, 2024 Rural Lifestyle Retailer Builds Customer Loyalty With Enhanced CIAM Strategy Protiviti arbeitet mit einem Einzelhändler im ländlichen Raum zusammen, um dessen Programm und Architektur für das Identitäts- und Zugriffsmanagement von Kunden zu bewerten. Whitepaper March 21, 2023 Mitigating crypto sanctions evasion risk in financial institutions The Financial Action Task Force (FATF) has long warned that criminals leverage virtual assets not only for predicate or money-laundering offenses but also to evade financial sanctions and raise funds to support terrorism. Even so, the number of recent headlines about criminal activity and sanctions evasion in the crypto industry is alarming. Cryptocurrency-based crime hit an all-time high of $20.… Whitepaper May 28, 2024 DORA Compliance: Untangling Key Hurdles to Implementation The Digital Operational Resilience Act (DORA), or more formally known as Regulation (EU) 2022/2554, took effect on 16 January 2023, with final industry compliance required by 17 January 2025. The regulation underscores the importance of digital operational resilience in today’s increasingly interconnected and digitized landscape and seeks to expand the reach of European regulators incorporating… Insights paper October 8, 2024 Best Practices for Building a Sustainable PCI DSS Compliance Programme Creating and maintaining a sustainable PCI DSS compliance programme is a crucial and complex task for organisations to protect payment card transactions and uphold consumer trust. However, despite the PCI DSS standard being around for almost 20 years, many organisations still struggle to achieve and validate compliance with it.In April 2016, the PCI Security Standards Council (SSC) introduced the… Whitepaper October 22, 2020 How Firms Can Tackle Technology Risk Blind Spots to Build Resilience Contrary to popular belief, criminals — insiders or outsiders — are not the most common cause of major operational failures. Technology is the biggest culprit. The rapid adoption of artificial intelligence (AI), blockchain, robotic process automation (RPA), cloud computing and other technologies continues to transform finance. It has created a mix of technological risks that frequently disrupt… In Focus October 17, 2024 The DoD unveils the Cybersecurity Maturity Model Certification Programme: A primer for defense contractors As cybersecurity threats evolve, the U.S. Department of Defense (DoD) has introduced a long-awaited pivotal framework aimed at bolstering the security of its national defense supply chain: The Cybersecurity Maturity Model Certification (CMMC) Programme. The new rule, published Oct. 15, marks a significant step towards enhancing cybersecurity across the Defense Industrial Base (DIB). Load More