Insight Search

Sort by:
  • In Focus

    July 23, 2024
    Global IT systems are still in reboot and recovery after a software update by cybersecurity vendor CrowdStrike caused a massive worldwide outage of Windows computers. Global businesses, governments and organisations were impacted across several industries, including airlines, banks, telecommunications, and healthcare. While the dust settles on the specifics of the how and the why of the global…
  • Podcast

    March 5, 2025
    Quantum computing needs low-overhead error correction to truly scale. Building thousands of qubits to end up with a couple of useful logical ones feels like a bad strategy. Photonic recently published a paper describing a new type of error correction code that promises a 20X reduction in the number of qubits needed to run quantum algorithms that solve real business problems. Are these so-called…
  • Podcast

    May 12, 2025
    Our Blind Spots in the Boardroom series is focused on critical business issues that can significantly impact an organisation's strategy and operations, particularly those that the board and/or C-suite are not focused on at all or enough.In this episode of Blind Spots in the Boardroom, host Frank Kurre and guest Mark Rogers discuss the strategic and often lengthy process of securing a board…
  • Flash Report

    April 30, 2025
    When Donald Trump took office on January 20 as the 47th President of the United States, U.S. chief executive officers (CEOs) were looking forward to 2025 with renewed optimism based on the expectation that business conditions would improve.  That sentiment was prevalent notwithstanding cautions from notable economists that the strategies of a second Trump administration might keep interest…
  • Resource Guide

    February 5, 2025
    As artificial intelligence (AI) continues its explosive growth within organizations around the world, with virtually every business function exploring opportunities to increase productivity, efficiency and revenue growth, a growing collection of regulations, standards and frameworks around the world is beginning to emerge. Among the most notable of these regulations is the European Union…
  • Newsletter

    January 8, 2025
    Past experience with the cost and risks of technology modernisation projects is driving boards to be more selective about allocating capital and has increased the emphasis on the certainty of delivering tangible value.Technology modernisation is a topic that has found its way into every C-suite and boardroom. In recent years, significant investments have been made by companies recognising a need…
  • Flash Report

    August 22, 2022
    Since the crisis in Ukraine began, Protiviti has issued three Flash Reports. The first addressed Vladimir Putin’s initial foray into two Ukrainian regions with “peacekeeping forces,” the West’s initial wave of sanctions and the implications for companies worldwide. The second reported on the unprovoked all-out invasion of Ukraine, the economic fallout and other actions ostracizing Russia from the…
  • Client Story

    January 6, 2023
    d2i is a cloud-based healthcare analytics solutions firm that’s on the move. The company provides an unparalleled data analytics application that aggregates, harmonizes and enriches diverse data sources to some of the largest hospital emergency departments (ED) in the United States. The company currently extracts Electronic Health Record (EHR) data into their environment for over 240 hospitals.…
  • Whitepaper

    February 17, 2021
    TMT Sector Lists Pandemic Policies, Cyber Threats, Privacy and Information Security as Top Risk Concerns in 2021 The continuing global challenges and potential existential threat posed by the ongoing COVID-19 pandemic. Political divisiveness and polarisation. Social and economic unrest. Gridlock. Artificial intelligence (AI), automation and other rapidly developing digital technologies.…
  • Newsletter

    September 8, 2021
    Ransomware attacks have been around for many years. In the past, cyber-threat actors would penetrate a company’s computer and network systems and obtain data with the objective of returning it upon payment. The demanded payments were usually smaller than the ransoms requested in recent incidents. Most of these incidents weren’t financially material, nor were they reported publicly. By contrast,…
Loading...