Insight Search

Sort by:
  • Podcast

    May 28, 2025
    Over 1000 GPS denial attacks happen around the world … every day! If GPS fails, planes, ships, and drones could be stranded in a fog of uncertainty or forced into a dangerous situation. Can the unprecedented precision of quantum sensing help? We dive into cutting-edge innovations at Q-CTRL, exploring how AI-powered quantum navigation is revolutionising aerospace and defense, outsmarting GPS…
  • Podcast

    June 25, 2025
    When NIST released the first post-quantum cryptography standards in August 2024, it set off a domino effect that will hopefully result in protecting the world from the quantum computing threat. Now that we’re beginning to migrate and trust our data to lattice-based cryptography, it’s a good time to examine how ML-KEM works and get some hints about how to implement it well. And who better to ask…
  • Whitepaper

    February 17, 2021
    Lingering Effects of Pandemic and Operational Challenges Are Top Concerns for Consumer Products and Services Organisations The continuing global challenges and potential existential threat posed by the ongoing COVID-19 pandemic. Political divisiveness and polarisation. Social and economic unrest. Gridlock. Artificial intelligence (AI), automation and other rapidly developing digital technologies…
  • Client Story

    May 2, 2024
    Protiviti collaborated with WBC members and non-members to collect feedback, design, and develop a user-friendly, intuitive site. We assisted in the modernisation of the site’s utility and architecture to enhance engagement. Leveraging existing technologies and an agile approach, we seamlessly integrated AI into site.
  • Whitepaper

    September 7, 2021
    China’s evolving Cybersecurity Law and what companies should know before operating in mainland ChinaIn 2017 China’s Cybersecurity Law went into effect, marking an important milestone in China’s efforts to create strict guidelines on cyber governance. Over the past five years, numerous updates to the regulations and interpretations have been released making it increasingly difficult for…
  • Whitepaper

    August 26, 2020
    According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction.
  • Whitepaper

    August 26, 2020
    As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection.
  • Whitepaper

    August 26, 2020
    All companies incorporated within Mainland China are required to abide by the Cybersecurity Law of The People's Republic of China (PRC), which went into effect 1 June 2017. 
  • Newsletter

    July 13, 2023
    The big picture: The metaverse has the potential to be a disruptive, expansive and transformative force, even to the point of spawning its own economy. Every board has a fiduciary duty to evaluate that potential for its company’s future. By the numbers: According to a survey of 250 global business leaders, the metaverse has the potential to dramatically alter the future of the human experience…
  • Blogs

    August 8, 2023
    Janna Anderson, professor of communications and director of the Imagining the Internet Center at Elon University, is the lead author of the report The Metaverse in 2040, published in partnership with Pew Research. She is a senior contract researcher for Pew and co-leads the center’s 19-year series of reports outlining experts’ predictions for the most likely future of digital life. The full…
Loading...