Insight Search Search Submit Sort by: Relevance Date Search Sort by RelevanceDate Order AscDesc Whitepaper March 24, 2023 Collaboration: The key to better management of cybercrime and financial crime By Carol Beaumier and Bernadine Reese Sharing information and lessons learned has become increasingly critical for the effective management of cybercrime and related financial crime. This need requires financial institutions to rethink how they have historically managed these risks. Blogs July 10, 2023 Law and order in the metaverse? 'Possible but difficult,' says Sydney-based innovation lawyer Enforcing real-world laws in virtual worlds is complex as it raises issues regarding jurisdiction, sovereignty, and the application of laws to virtual spaces. Roblox recently brought an action against a content creator, alleging the individual had been engaging in harassing behavior in violation of the Roblox terms of service. Blogs July 31, 2023 Simple is secure: Streamlining smart contract design For security teams looking to implement and design smart contracts, there are many intricacies and nuances that can be overwhelming. Using established standards for the secure development of smart contracts/decentralised applications (dApps) is instrumental to effectively launch smart contracts. In an earlier blog, I introduced the basics of smart contracts; today, I’m diving into existing… Blogs July 31, 2023 Cyber risk quantification for chaos management The most important use of any risk assessment tool is that it must contribute to better decision making on how to manage individual risks. Whether that is treating and reducing risk, or accepting that risk exists, risk management activities must ultimately help management make better decisions. Executives and risk management leaders, though, are increasingly faced with risk decisions they have… Whitepaper September 7, 2021 China's Evolving Cybersecurity Law China’s evolving Cybersecurity Law and what companies should know before operating in mainland ChinaIn 2017 China’s Cybersecurity Law went into effect, marking an important milestone in China’s efforts to create strict guidelines on cyber governance. Over the past five years, numerous updates to the regulations and interpretations have been released making it increasingly difficult for… Whitepaper August 26, 2020 China’s Cybersecurity Law: Personal Information Protection Law (PIPL) Overview As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this Point of View (POV) highlights a key area pertaining to personal information protection. Whitepaper August 26, 2020 China's Cybersecurity Law: Critical Information Infrastructure (CII) According to the Cybersecurity Law, CII is defined as any information infrastructure that can endanger national security, national strategy, and civil welfare in the event of a data breach, compromised network, or system malfunction. Whitepaper August 26, 2020 Interpretations of the Updates to China’s Cybersecurity Law All companies incorporated within Mainland China are required to abide by the Cybersecurity Law of The People's Republic of China (PRC), which went into effect 1 June 2017. Podcast Transcript October 5, 2022 Transcript | From Qubits to Qumodes in Photonic Quantum Computing with QuiX Quantum In late 2020, physicists in China generated controversy by claiming quantum advantage with a photonic quantum computing system that’s technically not programmable. Other companies have been experimenting with photonic systems, including QuiX Quantum. How do these machines work? Should scientists redefine what quantum advantage means, focusing on practical, usable problems a machine is solving?… Blogs July 19, 2023 Creating Read-Only Roles for Microsoft Dynamics 365 Finance and Supply Chain Management This blog post was authored by Sarah Guthrie - Senior Consultant, Enterprise Application Solutions on Protiviti's technology insights blog. In today’s fast-paced business landscape, organisations rely heavily on robust enterprise resource planning (ERP) systems like Microsoft Dynamics 365 Finance and Supply Chain Management to streamline operations and drive growth. However, granting… Load More