Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Client Story June 16, 2023 Leading Biotechnology Company Enhances AWS Environment Security and Risk Control A leading biotechnology company that develops life-transforming medicines has worked for decades to improve the lives of those who rely on their work. But recently, they found themselves in need of assistance to enhance the security of their AWS environment. Client Story June 16, 2023 Blockchain/Web3 Startup Blocks Gaps and Improves AWS Security Posture A blockchain/web3 startup engaged Protiviti to review their AWS environment. While getting the product to market as fast as possible was a primary goal for the client, security was an afterthought in many scenarios. To address this need and prevent a potential catastrophic security event, the client wanted a quick and consistent way to understand where their security gaps were and how they could… Survey March 29, 2023 The Innovation vs. Technical Debt Tug of War Technology leaders are exploring new ways to drive innovation and maximise the value of IT in a changing world driven by disruption and a need for acceleration Executive Summary Innovation is the name of the game in today’s global market. Recognising this new reality, CIOs, CTOs, CISOs and other technology executives and leaders are exploring new ways to fuel innovation throughout their… Whitepaper March 28, 2022 Urbanisation des activités du RSSI Travail à distance, cyber attaque, guerre asymétrique, fuite de données : les enjeux de la cyber sécurité sont de plus en plus importants. Certes, les investissements au sein des entreprises sont réels mais les attentes du management et des parties prenantes internes et externes sont de plus en plus présentes et les réponses attendues pour les actifs clés se doivent d’être relativement binaires,… Whitepaper March 22, 2019 Data, Application & Infrastructure Security Risk Assessment Let’s explore the Iceberg!Understanding gaps in how your applications and infrastructure protect your data is a priority for both Operations and Executives.Application interface is only the tip of the IcebergApplication are interfaces used to access and process data (business or personal) and are only the visible part of a more complex IT landscape. Whitepaper March 22, 2019 Evaluation de la Sécurité des Données, des Applicatifs et des Infrastructures L’interface applicative n’est que la partie émergée de l’iceberg!Comprendre les défaillances des environnements applicatifs et des infrastructures doit être une priorité pour les intervenants opérationnels ainsi que pour le management.Les applications sont des interfaces d’accès et de traitements des données (métiers, personnelles, …) et ne sont que la partie visible d’un Système d’Information (… Podcast Transcript November 25, 2022 Transcript | Financial Index Tracking via Quantum Computing— with Multiverse Using cardinality constraints for portfolio optimisation opens the doors to new applications for creating innovative portfolios and exchange-traded-funds (ETFs). All while providing better returns with less market risk. Host Konstantinos Karagiannis recently co-authored a paper on portfolio optimisation with Sam Palmer from Multiverse Computing. Find out how the team was able to outperform… Podcast Transcript June 1, 2022 Transcript | A UK-Based Quantum Computer via Amazon Quantum computing via cloud access feels global, but there are reasons to have these machines located in a particular region. Oxford Quantum Circuits released a quantum computer named Lucy on Amazon Braket that not only helps customers with regulatory concerns, but also brings an exciting new type of transmon technology to the industry. Join host Konstantinos Karagiannis for a chat on the coaxmon… Podcast June 1, 2022 Podcast | A UK-Based Quantum Computer via Amazon Quantum computing via cloud access feels global, but there are reasons to have these machines located in a particular region. Oxford Quantum Circuits released a quantum computer named Lucy on Amazon Braket that not only helps customers with regulatory concerns, but also brings an exciting new type of transmon technology to the industry. Join host Konstantinos Karagiannis for a chat on the coaxmon… Whitepaper July 27, 2022 Balancing Opportunity and Risk: Security for RPA Platforms Robotic process automation (RPA) was first used to execute predetermined, rules-based tasks twenty or so years ago. Since then, RPA has functioned as a virtual workforce for businesses, which benefit from its power to collect data, execute processes rapidly and unerringly, and facilitate higher levels of quality — while enhancing customer satisfaction.We’ve previously addressed at length the… Load More