Insight Search

Sort by:
  • Client Story

    June 16, 2023
    A blockchain/web3 startup engaged Protiviti to review their AWS environment. While getting the product to market as fast as possible was a primary goal for the client, security was an afterthought in many scenarios. To address this need and prevent a potential catastrophic security event, the client wanted a quick and consistent way to understand where their security gaps were and how they could…
  • Survey

    March 29, 2023
    Technology leaders are exploring new ways to drive innovation and maximise the value of IT in a changing world driven by disruption and a need for acceleration Executive Summary Innovation is the name of the game in today’s global market. Recognising this new reality, CIOs, CTOs, CISOs and other technology executives and leaders are exploring new ways to fuel innovation throughout their…
  • Whitepaper

    August 26, 2020
    As part of our series providing insights into the Cybersecurity Law of the People’s Republic of China (PRC), this fifth installment focuses on the cross-border transfer of data — or data localisation — that is outlined in Article 37. 
  • Newsletter

    February 12, 2021
    Like any enterprisewide organisational change, implementing an operational resilience programme across an organisation requires a careful and collaborative effort to be successful. Whether implementation has been in the works for several years or is just beginning, turning the resilience programme from concept to reality is hard work. Except for the most dynamic and change-…
  • Flash Report

    December 18, 2020
    The news of the cyber attacks being experienced by government agencies and an expanding list of organisations continues to grow and change on almost an hourly basis. This is proving to be potentially one of the most significant cyber breaches in recent times. Following up on our December 14, 2020, Flash Report on the CISA advisory, and in response to numerous questions and inquiries we…
  • Flash Report

    December 14, 2020
    On December 13, 2020, the Cybersecurity & Infrastructure Security Agency (CISA) issued an emergency directive detailing required action for federal agencies to mitigate the threat of the recently discovered compromise involving SolarWinds® Orion® Network Management products that are currently being exploited by malicious actors. (Read the SolarWinds Security…
  • Client Story

    April 9, 2021
    Data privacy has become a strategic priority as companies adapt to comply with rapidly proliferating data privacy laws. Recent years have seen the adoption of the European Union’s General Data Protection Regulation (GDPR), the more recent California Consumer Protection Act (CCPA), and similar regulations. These safeguards require companies to document the types of protected personal data used in…
  • Blogs

    July 10, 2023
    Enforcing real-world laws in virtual worlds is complex as it raises issues regarding jurisdiction, sovereignty, and the application of laws to virtual spaces. Roblox recently brought an action against a content creator, alleging the individual had been engaging in harassing behavior in violation of the Roblox terms of service.
  • Blogs

    July 31, 2023
    For security teams looking to implement and design smart contracts, there are many intricacies and nuances that can be overwhelming. Using established standards for the secure development of smart contracts/decentralised applications (dApps) is instrumental to effectively launch smart contracts. In an earlier blog, I introduced the basics of smart contracts; today, I’m diving into existing…
  • Blogs

    July 31, 2023
    The most important use of any risk assessment tool is that it must contribute to better decision making on how to manage individual risks. Whether that is treating and reducing risk, or accepting that risk exists, risk management activities must ultimately help management make better decisions. Executives and risk management leaders, though, are increasingly faced with risk decisions they have…
Loading...