Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper August 26, 2020 China's Cybersecurity Law: Cross-Border Data Transfer As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this fifth installment focuses on the cross-border transfer of data — or data localisation — that is outlined in Article 37. Client Story June 16, 2023 Leading Biotechnology Company Enhances AWS Environment Security and Risk Control A leading biotechnology company that develops life-transforming medicines has worked for decades to improve the lives of those who rely on their work. But recently, they found themselves in need of assistance to enhance the security of their AWS environment. Whitepaper August 31, 2023 Technical debt and innovation trends in manufacturing and distribution By Sharon Lindstrom - Global Leader, Manufacturing and Distribution Industry Practice, ProtivitiBy the numbers: Overall, organisations today spend an average of 30% of their IT budgets on and invest a fifth of their IT human resources in technical debt management.This research, based on a global survey of more than 1,000 CIOs, CTOs and other technology leaders, underscores the burden created by… Client Story June 16, 2023 Blockchain/Web3 Startup Blocks Gaps and Improves AWS Security Posture A blockchain/web3 startup engaged Protiviti to review their AWS environment. While getting the product to market as fast as possible was a primary goal for the client, security was an afterthought in many scenarios. To address this need and prevent a potential catastrophic security event, the client wanted a quick and consistent way to understand where their security gaps were and how they could… Blogs February 9, 2023 Sustainable Cloud Computing Organisations have grown more productive by embracing the scalability and performance of cloud computing. As they’ve become more sensitive to matters of sustainability, however, organisations will place greater focus on the sustainability of cloud computing models from an overall environmental, social and governance (ESG) standpoint. This is true globally, whether ESG goals are driven by… Blogs July 14, 2023 Is Apple’s vision pro a gamechanger that will mainstream the metaverse? Tech experts weigh in. Apple’s announcement of its Vision Pro virtual reality headset earlier this month elicited some strong opinions across the board. Could it really replace the iPhone and mainstream the metaverse, as some have claimed? Or is it just another overpriced wearable for the wealthy? Blogs August 8, 2023 The metaverse in 2040? Buckle up for a bumpy ride, says Elon professor and Pew researcher Janna Anderson, professor of communications and director of the Imagining the Internet Center at Elon University, is the lead author of the report The Metaverse in 2040, published in partnership with Pew Research. She is a senior contract researcher for Pew and co-leads the center’s 19-year series of reports outlining experts’ predictions for the most likely future of digital life. The full… Whitepaper September 7, 2021 China's Evolving Cybersecurity Law China’s evolving Cybersecurity Law and what companies should know before operating in mainland ChinaIn 2017 China’s Cybersecurity Law went into effect, marking an important milestone in China’s efforts to create strict guidelines on cyber governance. Over the past five years, numerous updates to the regulations and interpretations have been released making it increasingly difficult for… Whitepaper August 26, 2020 China’s Cybersecurity Law: Personal Information Protection Law (PIPL) Overview As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection. Whitepaper August 26, 2020 China's Cybersecurity Law: Critical Information Infrastructure (CII) According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction. Load More