Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper August 26, 2020 China's Cybersecurity Law: Cross-Border Data Transfer As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this fifth installment focuses on the cross-border transfer of data — or data localisation — that is outlined in Article 37. Podcast Transcript October 5, 2022 Transcript | From Qubits to Qumodes in Photonic Quantum Computing with QuiX Quantum In late 2020, physicists in China generated controversy by claiming quantum advantage with a photonic quantum computing system that’s technically not programmable. Other companies have been experimenting with photonic systems, including QuiX Quantum. How do these machines work? Should scientists redefine what quantum advantage means, focusing on practical, usable problems a machine is solving?… Video August 3, 2023 Video | Considerations and the Future for SAP Vijan Patel, Managing Director, discusses the key questions leaders utilising SAP should be asking themselves and the future of this powerful technology. Learn about Protiviti's SAP Consulting Services and how to maximise the value of your SAP investment. Podcast November 1, 2023 Podcast | Protecting Critical Data Before Post-Quantum Cryptography— with Qrypt It’s the 11th hour as we approach 2024 and the release of NIST’s post-quantum cryptography standards. Is it possible for your business to start protecting some critical assets today from tomorrow's cryptanalytically relevant quantum computing? Find out how a few applications already do so. Join Host Konstantinos Karagiannis for a chat with Denis Mandich from Qrypt.Guest: Denis Mandich from Qrypt Podcast Transcript October 31, 2023 Transcript | Protecting Critical Data Before Post-Quantum Cryptography— with Qrypt It’s the 11th hour as we approach 2024 and the release of NIST’s post-quantum cryptography standards. Is it possible for your business to start protecting some critical assets today from tomorrow's cryptanalytically relevant quantum computing? Find out how a few applications already do so. Join Host Konstantinos Karagiannis for a chat with Denis Mandich from Qrypt.Guest: Denis Mandich from Qrypt Blogs May 15, 2023 Hyperbole, hype and hope? Trillions of reasons why the metaverse matters Ever since Steven Spielberg put the metaverse on the mainstream map in 2018 with his science-fiction adventure film, Ready Player One, based on Ernest Cline's novel of the same name, there has been a slow but steady drumbeat of momentum building around the potential and possibilities of this brave, new, immersive world. Sure, the metaverse had been talked about long before 2018, but once… Podcast Transcript May 5, 2023 Transcript | A New Quantum Software Development Kit — With Anne Matsuura of Intel Intel is preparing to build its first quantum dot processor. But you don’t have to wait to try your hand at writing code for it. Thanks to the Intel Quantum SDK, you can access the support system and software stack for this future chip via simulators today. Prepare to run algorithms on a bleeding-edge platform in this episode of The Post-Quantum World. I’m your host, Konstantinos Karagiannis. I… Whitepaper March 11, 2025 Generative AI: Business Rewards vs. Security Risks Explore ISMG’s Second Annual Generative AI Study, sponsored by Protiviti. Learn how businesses balance AI innovation with security risks in this comprehensive report In Focus July 9, 2024 US Supreme Court reshapes the regulatory landscape Over the course of a few days before the end of its summer session, the U.S. Supreme Court issued three decisions that reshaped the regulatory landscape in the United States. Two of the decisions (SEC v. Jarkesy and Loper Bright Enterprises v. Raimondo) shift the balance of power from the executive to the judicial branch of government and the third (Corner Post, Inc. v. Board of Governors)… Whitepaper September 7, 2021 China's Evolving Cybersecurity Law China’s evolving Cybersecurity Law and what companies should know before operating in mainland ChinaIn 2017 China’s Cybersecurity Law went into effect, marking an important milestone in China’s efforts to create strict guidelines on cyber governance. Over the past five years, numerous updates to the regulations and interpretations have been released making it increasingly difficult for… Load More