Insight Search

Sort by:
  • Blogs

    January 11, 2023
    Five years ago, we wrote a post called “The 8 Character Password is Dead,” which was an in-depth look at password cracking in 2017 and how eight-character passwords do not adequately protect organisations. In that analysis, we broke down the math and how quickly hardware purchased for under $5,000 could make an eight-character length irrelevant. Unfortunately, in just five years’ time, the…
  • Blogs

    January 13, 2023
    This blog post was authored by Mike Ortlieb, Director, Security and Privacy and Chris Porter, Associate Director, Security and Privacy on The Technology Insights Blog. Threat actors are an ever-evolving species. Portrayed in popular advertising as guys dressed in black, probably sporting a ski mask, the harsh reality is that these bad actors are everywhere and are getting more creative…
  • Whitepaper

    February 21, 2023
    This article will address the changes and updates to ISO 27001 standard published on October 25, 2022, and the approaches organizations can take to implement the changes introduced. There have been significant advancements in technology, as well as an increase in the complexity of security threats since the last iteration of ISO 27001 was published on September 25, 2013. The changes introduced in…
  • Blogs

    September 8, 2021
    In today’s rapidly evolving business world, the lines between technology and business have blurred. Organisations need to modernise and transform their technology in order to successfully compete. CIOs play a critical role in transforming the world of work using automation and technology – but they can’t do it alone. Collaboration among the C-suite is critical. In this blog series, Protiviti’s…
  • Newsletter

    January 25, 2022
    26% Rampant Rise in Ransomware Attacks Leaving APAC Companies Defenseless Three Notorious Ransomware as a Service (RaaS) groups accounted for more than 60% of all ransomware attacks According to Cognyte’s Cyber Threat Intelligence Research Group[1], ransomware attacks nearly doubled in the first half of 2021, with 1,097 organisations experiencing a ransomware event, compared to 1,112 events for…
  • Flash Report

    May 14, 2021
    On May 12, President Joe Biden issued the Executive Order on Improving the Nation’s Cybersecurity. This executive order (EO) is the most recent action by the administration to strengthen U.S. national cyber defenses and address cybersecurity threats and attacks that continue to grow in magnitude, impact and frequency. It is intended to protect networks in the federal, public and private…
  • Podcast

    June 2, 2021
    The holy grail of quantum computing in the near term is a use case that provides advantage. We believe it’s only a matter of time, but major companies have to plan and prepare now so that they are not left behind when these applications arrive. Join host Konstantinos Karagiannis for a chat about quantum computing use cases with Pranav Gokhale from Super.tech. We cover mostly financial customer…
  • Survey

    January 7, 2022
    The quality and, in some cases, the existence of the CISO/CFO relationship varies by company. In organisations where the CISO role is positioned and promoted as a source of value, CISOs and CFOs tend to collaborate more often and more meaningfully than in companies that treat information security as a cost center (and typically struggle with cybersecurity as a result). Protiviti’s 2021…
  • Podcast

    March 23, 2022
    Quantum machine learning, or QML, is one of the three major application categories for quantum computing, along with optimisation and simulation. As we’re working with customers at Protiviti to find advantageous use cases in QML, we rely daily on a tool called PennyLane from Xanadu. Join host Konstantinos Karagiannis, and special cohost Emily Stamm, for a chat with Nathan Killoran from Xanadu to…
  • Podcast

    June 15, 2022
    In coding, libraries make developers’ lives easier, sparing them thousands of lines of code, while also increasing performance and security. And everyone’s concerned with security as fault-tolerant quantum computing approaches. Geometry Labs has released the “lattice-algebra” library to bring a high-performance cryptographic library to developers interested in using post-quantum cryptography in…
Loading...