Insight Search

Sort by:
  • Whitepaper

    August 26, 2020
    As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this fifth installment focuses on the cross-border transfer of data — or data localisation — that is outlined in Article 37. 
  • Client Story

    June 16, 2023
    A leading biotechnology company that develops life-transforming medicines has worked for decades to improve the lives of those who rely on their work. But recently, they found themselves in need of assistance to enhance the security of their AWS environment.
  • Whitepaper

    August 31, 2023
    By Sharon Lindstrom - Global Leader, Manufacturing and Distribution Industry Practice, ProtivitiBy the numbers: Overall, organisations today spend an average of 30% of their IT budgets on and invest a fifth of their IT human resources in technical debt management.This research, based on a global survey of more than 1,000 CIOs, CTOs and other technology leaders, underscores the burden created by…
  • Client Story

    June 16, 2023
    A blockchain/web3 startup engaged Protiviti to review their AWS environment. While getting the product to market as fast as possible was a primary goal for the client, security was an afterthought in many scenarios. To address this need and prevent a potential catastrophic security event, the client wanted a quick and consistent way to understand where their security gaps were and how they could…
  • Blogs

    February 9, 2023
    Organisations have grown more productive by embracing the scalability and performance of cloud computing. As they’ve become more sensitive to matters of sustainability, however, organisations will place greater focus on the sustainability of cloud computing models from an overall environmental, social and governance (ESG) standpoint. This is true globally, whether ESG goals are driven by…
  • Blogs

    July 14, 2023
    Apple’s announcement of its Vision Pro virtual reality headset earlier this month elicited some strong opinions across the board. Could it really replace the iPhone and mainstream the metaverse, as some have claimed? Or is it just another overpriced wearable for the wealthy?
  • Blogs

    August 8, 2023
    Janna Anderson, professor of communications and director of the Imagining the Internet Center at Elon University, is the lead author of the report The Metaverse in 2040, published in partnership with Pew Research. She is a senior contract researcher for Pew and co-leads the center’s 19-year series of reports outlining experts’ predictions for the most likely future of digital life. The full…
  • Whitepaper

    September 7, 2021
    China’s evolving Cybersecurity Law and what companies should know before operating in mainland ChinaIn 2017 China’s Cybersecurity Law went into effect, marking an important milestone in China’s efforts to create strict guidelines on cyber governance. Over the past five years, numerous updates to the regulations and interpretations have been released making it increasingly difficult for…
  • Whitepaper

    August 26, 2020
    As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection.
  • Whitepaper

    August 26, 2020
    According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction.
Loading...