Insight Search

Sort by:
  • Newsletter

    June 1, 2020
    As companies emerge from lockdowns marked by unprecedented change and begin to look forward, boards should continue to ask the right questions. As countries across the globe emerge from lockdown, discussions tailored to the evolving marketplace and issues around employee health and safety are needed in the boardroom. While the specifics will vary depending on the circumstances, we pose 10…
  • Whitepaper

    April 13, 2020
    Marcel de Jongh and Anneke Wieling, Protiviti restructuring specialists The corona virus is spreading quickly around the world. Your company’s first priority is the health and wellbeing of your employees and their families. Your second priority is to keep calm and to control your cash flows and cash position. Nobody can predict the future, but you can take measures to optimise your cash – and to…
  • Whitepaper

    March 4, 2021
    Protiviti has assessed the YARA rules and verified that they accurately address the indicators known on March 2, 2021. Whenever using external links as a source, Protiviti recommends that all clients practice caution when ingesting open source data, as its usage is at their own risk. Thanks to Florian Roth for making the following rule available on GitHub under the MIT license.  (Note: "…
  • Podcast Transcript

    March 24, 2021
    Protiviti has produced a series of podcasts on GRC programmes and technologies in which we obtained perspectives from Protiviti leaders and subject-matter experts around the world on GRC drivers, innovations and challenges in their markets. In this episode, we talked with Ivan Torres, a Director with Protiviti’s Technology Consulting group. Ivan, who is based in Mexico City, offers his views on…
  • Podcast Transcript

    July 14, 2021
    The cryptographic apocalypse could be under five years away, depending on interconnect technologies that might allow quantum computers to work together. Is now the time to start planning for, or even implementing, post-quantum safe cryptography? It all depends on the shelf life of the data you’re trying to protect. Join host Konstantinos Karagiannis for a chat about post-quantum cryptography you…
  • Podcast Transcript

    February 8, 2023
    Will quantum computers be able to crack RSA this decade? Maybe. But figuring out that exact date is not what you and your organisation should be worried about. A memorandum issued by the White House reveals when the quantum computing apocalypse will begin as far as information security boots on the ground are concerned. Join Host Konstantinos Karagiannis for a deep dive into the NSM-10 memo and…
  • Whitepaper

    June 10, 2022
    Big Tech’s “big” problem How big is Big Tech? There is little doubt that the big five technology companies (i.e., Apple, Microsoft, Google, Amazon and Facebook) are operating in a completely different stratosphere. As one recent New York Times blog described it, “America’s tech titans have formed a separate universe in which they are the sun, and everyone else — billions of humans, other…
  • Podcast

    May 3, 2023
    Quantum computing has been surrounded by hype from the beginning. While these machines may exceed our most ambitious imaginings in the future, investing in them today brings some challenges to venture capitalists. How do VCs vet companies in the field, and how does the so-called Quantum Winter affect all this? Join Host Konstantinos Karagiannis for a chat with Bill Liao about investing in quantum…
  • Podcast Transcript

    May 15, 2023
    Quantum computing has been surrounded by hype from the beginning. While these machines may exceed our most ambitious imaginings in the future, investing in them today brings some challenges to venture capitalists. How do VCs vet companies in the field, and how does the so-called Quantum Winter affect all this? Join Host Konstantinos Karagiannis for a chat with Bill Liao about investing in quantum…
  • Client Story

    June 16, 2023
    A blockchain/web3 startup engaged Protiviti to review their AWS environment. While getting the product to market as fast as possible was a primary goal for the client, security was an afterthought in many scenarios. To address this need and prevent a potential catastrophic security event, the client wanted a quick and consistent way to understand where their security gaps were and how they could…
Loading...