-
Where to Focus Your Company's Limited Cybersecurity Budget
Technology & Operations Digital ArticleThree cybersecurity investments to target. -
How to Keep Cyberattacks from Tanking Your Balance Sheet
Technology & Operations Digital ArticleThe average cost of a data breach reached $4.35 million in 2022, according to IBM's Cost of a Data Breach Report in 2022. -
What? Me, Worry?
Intellectual property Magazine ArticleMost executives think they’re security conscious—they change their passwords and shred important documents and so forth. But what rarely crosses their minds, says espionage expert H. Keith Melton, is that cloak-and-dagger types really are after their valuables. Just because you’re not paranoid, he observes, doesn’t mean they’re not following you. Melton, the author of Ultimate […] -
The Real Story of the Fake Story of One of Europe’s Most Charismatic CEOs
Web-based technologies Big IdeaHow two professors built a myth that persisted for a decade -
What Do We Know About False News?
Web-based technologies Big IdeaA roundup of the latest thinking -
Psychology Is the Key to Detecting Internal Cyberthreats
Psychology Digital ArticleFlag risks before they become a problem. -
Boost Your Resistance to Phishing Attacks
Technology & Operations Magazine ArticleSimple changes to employee training can improve results. Plus: How to push past an ultimatum, the case for acquiring during a downturn, a vote for generalists,... -
Cybersecurity's Human Factor: Lessons from the Pentagon
Strategy & Execution Magazine ArticleWith cyberattacks soaring, corporations must step up efforts to protect their IT networks. Most firms could learn from the U.S. military, which has been... -
New Laws on Data Privacy and Security Are Coming. Is Your Company Ready?
Cybersecurity and digital privacy Digital ArticleThe consequences of weak security are about to go way beyond bad PR. -
How to Use Facebook's Settings to Have More-Productive Conversations
Technology & Operations Digital ArticleA couple of relatively simple changes can improve your experience. -
Why Boards Aren’t Dealing with Cyberthreats
Boards Digital ArticleThey lack the expertise to ask the right questions. -
How We All Can Fight Misinformation
Web-based technologies Big IdeaEveryone needs to take action. -
Help Your Employees Make Strong Passwords a Habit
Technology & Operations Digital ArticleTo shore up security, you need to encourage practices your employees will actually use. -
What Business Needs to Know About the New U.S. Cybersecurity Strategy
Cybersecurity and digital privacy Digital ArticleIt promises to shift liability onto private firms and create incentives to defend against critical vulnerabilities. -
Who Should Take the Fall? (Commentary for HBR Case Study)
Strategy & Execution Magazine ArticleWhen a mobile-payment company is hacked, business slips. The board believes that having someone publicly take the fall will stabilize the situation, but... -
Equifax, the Credit Reporting Industry, and What Congress Should Do Next
Technology & Operations Digital ArticleThe private sector can't handle this on its own. -
What the Rise of Russian Hackers Means for Your Business
Intellectual property Digital ArticleMake yourself a harder target. -
The Cyber Insurance Market Needs More Money
Technology & Operations Digital ArticleSecurities could help give insurers the breathing room they need to keep growing - and meet customers' mounting needs. -
The Darknet: A Quick Introduction for Business Leaders
Web-based technologies Digital ArticleWhat you need to know about the internet’s seedy underbelly.
-
IPremier Co. (A): Denial of Service Attack
Technology & Operations Case Study8.95View Details Describes a new CIO trying to manage a denial of service (DOS) attack against his e-retailing business. The attack and its aftermath provide students... -
Cybersecurity: Tools for Preparing Your Team for the Future
No data is completely safe. Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you... -
Customer Data and Privacy: The Insights You Need from Harvard Business Review
22.95View Details Collect data and build trust. With the rise of data science and machine learning, companies are awash in customer data and powerful new ways to gain insight... -
Maple Tree Cancer Alliance: Growing Pains
Management Case Study8.95View Details Karen Wonders founded Maple Tree Cancer Alliance (MTCA) in 2011 as a non-profit organization in Dayton, Ohio, to improve cancer patients' quality of life... -
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy
Technology & Operations Case Study8.95View Details In 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components of widely used industrial control... -
Apple: Privacy vs. Safety (B)
Leadership & Managing People Case Study5.00View Details In 2020, as the COVID-19 pandemic swept across the globe, Apple and Google partnered to develop a contact tracing application that would collect information... -
The Metaverse in 2022
Sales & Marketing Case Study8.95View Details -
Apple: Privacy vs. Safety (A)
Leadership & Managing People Case Study8.95View Details In 2015, Apple CEO Tim Cook debuted the iPhone 6S with enhanced security measures that enflamed a debate on privacy and public safety around the world.... -
Rapid7: The Price of Principle
Finance & Accounting Case Study15.05View Details -
Worten Portugal: Becoming a Digital Marketplace
Technology & Operations Case Study11.95View Details In 2021, Amazon announced its market entry into Portugal with a dedicated offer. The dominant local electronics retailer, Worten, had been expecting and... -
The Year in Tech, 2022: The Insights You Need from Harvard Business Review
A year of HBR's essential thinking on tech--all in one place. From quantum computing and next-generation digital health tools to virtual reality training... -
IPremier Co. (C): Denial of Service Attack
Technology & Operations Case Study5.00View Details Supplements the (A) case. -
Amazon Shopper Panel: Paying Customers for Their Data
Sales & Marketing Case Study8.95View Details This case introduces a new Amazon program that has consumers upload their receipts from transactions outside of Amazon, in exchange for money. Through... -
Cybersecurity (Reading Guide)
No data is completely safe. Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you... -
The Year in Tech, 2025: The Insights You Need from Harvard Business Review
Management Book22.95View Details A year of HBR's essential thinking on tech--all in one place. From generative AI to fintech to spatial computing, new tech innovations are reshaping organizations... -
Ransomware Attack at Springhill Medical Center
Management Case Study8.95View Details In July, 2019, Springhill Medical Center ("SMC") in Mobile, Alabama fell prey to a malicious ransomware attack that crippled the hospital's internal network... -
PharmaCo: Inject 3-Phi Theft
Strategy & Execution Case Study5.00View Details Supplement to case W20218 -
The Year in Tech, 2024: The Insights You Need from Harvard Business Review
A year of HBR's essential thinking on tech--all in one place. Generative AI, Web3, neurotech, reusable rockets to power the space economy--new technologies... -
Cloud Syzygy Technologies: Cloud-Based Computing
Technology & Operations Case Study9.95View Details The president of Cloud Syzygy Technologies (CST) had recently returned from the Pacific Telecommunications Council conference, where he discussed ways... -
Network Associates: Securing the Internet
Global Business Case Study9.95View Details Follows one company's path through the uncharted terrain of government regulation and the Internet. In March 1998, Network Associates announced it would...
-
Where to Focus Your Company's Limited Cybersecurity Budget
Technology & Operations Digital ArticleThree cybersecurity investments to target. -
How to Keep Cyberattacks from Tanking Your Balance Sheet
Technology & Operations Digital ArticleThe average cost of a data breach reached $4.35 million in 2022, according to IBM's Cost of a Data Breach Report in 2022. -
What? Me, Worry?
Intellectual property Magazine ArticleMost executives think they’re security conscious—they change their passwords and shred important documents and so forth. But what rarely crosses their minds, says espionage expert H. Keith Melton, is that cloak-and-dagger types really are after their valuables. Just because you’re not paranoid, he observes, doesn’t mean they’re not following you. Melton, the author of Ultimate […] -
Make Cybersecurity a Strategic Asset
Technology & Operations Digital ArticleMost companies treat cybersecurity as an operational issue and are often unprepared for debilitating attacks. Elevating it to a matter for strategic planning... -
The Real Story of the Fake Story of One of Europe’s Most Charismatic CEOs
Web-based technologies Big IdeaHow two professors built a myth that persisted for a decade - SPONSORED CONTENT FROM RSA
Living in GDPR’s World
Cybersecurity and digital privacy ResearchBriefing Paper Sponsored by RSA -
Are You a Cyberthreat to Your Organization?
Leadership & Managing People Digital ArticleChances are, your employer is more vulnerable than you think to insider cyberattacks. This assessment will help you gauge how resilient your organization... -
What Do We Know About False News?
Web-based technologies Big IdeaA roundup of the latest thinking -
Psychology Is the Key to Detecting Internal Cyberthreats
Psychology Digital ArticleFlag risks before they become a problem. -
Boost Your Resistance to Phishing Attacks
Technology & Operations Magazine ArticleSimple changes to employee training can improve results. Plus: How to push past an ultimatum, the case for acquiring during a downturn, a vote for generalists,...