-
New Laws on Data Privacy and Security Are Coming. Is Your Company Ready?
Cybersecurity and digital privacy Digital ArticleThe consequences of weak security are about to go way beyond bad PR. -
How to Red Team a Gen AI Model
AI and machine learning Digital ArticleThe harms that generative AI systems create often differ from other forms of AI in both scope and scale. -
Cybersecurity Is Not (Just) a Tech Problem
Cybersecurity and digital privacy Digital ArticleFour steps to building a company culture that reinforces your IT initiatives. -
Cyberattacks Are Inevitable. Is Your Company Prepared?
Technology & Operations Digital ArticleThe first time you test your plan shouldn't be during a crisis. -
What Russia's Ongoing Cyberattacks in Ukraine Suggest About the Future of Cyber Warfare
Technology & Operations Digital ArticleAnd how organizations around the world can prepare -
The Cybersecurity Risks of an Escalating Russia-Ukraine Conflict
Cybersecurity and digital privacy Digital ArticleNow is the time to revisit your business continuity plans. -
Quantum Computing for Business Leaders
Technology & Operations Magazine ArticleQuantum computers can solve problems exponentially faster than classical computers can. They will bring about two huge changes: an end to our current... -
Sizing Up Your Cyberrisks
Boards Magazine ArticleFocus first on the threats to your key activities—not on the technology itself. -
Corporate Cybersecurity Is Becoming Geopolitical. Are U.S. Tech Companies Ready?
Cybersecurity and digital privacy Digital ArticlePlatforms have a propaganda problem. -
What It Takes to Sell Cloud-Based Software to the U.S. Government
Cybersecurity and digital privacy Digital ArticleComplying with FedRAMP is worth the investment. -
How the Cloud Is Changing Data Science
Analytics and data science Digital ArticleHere’s what leaders need to know in this shifting landscape. -
How Organizations Can Ramp Up Their Cybersecurity Efforts Right Now
Cybersecurity and digital privacy Digital ArticleScams and attacks have become more frequent and sophisticated as the crisis unfolds. -
Raytheon CEO Gregory Hayes: How Ukraine Has Highlighted Gaps in US Defense Technologies
Business and society Digital ArticleHow does a company that gets two million hack attempts each week think about security? -
Don't Acquire a Company Until You Evaluate Its Data Security
Technology & Operations Digital ArticleBeware the "data lemon." -
7 Pressing Cybersecurity Questions Boards Need to Ask
IT security management Digital ArticleDon’t leave concerns about critical vulnerabilities for tomorrow. -
Why Companies Are Forming Cybersecurity Alliances
Cybersecurity and digital privacy Digital ArticleThey’re stepping up where governments haven’t. -
Does Your Cyber Insurance Cover a State-Sponsored Attack?
Leadership & Managing People Digital ArticleDecisions you make today will determine whether you're facing financial chaos - or just a bad day at the office. -
How to Safeguard Against Cyberattacks on Utilities
Decision making and problem solving Digital ArticleIn 2019, California showed us how costly a sustained power outage can be. -
Boards Are Having the Wrong Conversations About Cybersecurity
IT management Digital ArticleA survey of 600 directors suggests that growing awareness of cyber risk isn’t enough to drive better preparedness. -
Is Third-Party Software Leaving You Vulnerable to Cyberattacks?
Technology & Operations Digital ArticleThe SolarWinds hack highlights the importance of vetting your vendors.
-
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy
Technology & Operations Case Study8.95View Details In 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components of widely used industrial control... -
The Phoenix Project: Remediation of a Cybersecurity Crisis at the University of Virginia
Innovation & Entrepreneurship Case Study8.95View Details This case was designed to facilitate discussion of how a cyberattack was remediated by a major public university. Students are challenged to think through... -
iPremier (A): Denial of Service Attack (Graphic Novel Version)
Technology & Operations Case Study8.95View Details Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure... -
Everybody Knows: Russia and the Election
Global Business Case Study15.05View Details Following a contentious presidential race, Donald Trump's 2016 election destabilized America's status quo. Academics, journalists, politicians and the... -
Hydropack India Pvt. Ltd.: Resolving a Data Breach
Technology & Operations Case Study8.95View Details In April 2018, Amit Darekar, director of operations at Hydropack India Pvt. Ltd. (Hydropack), was focused on revamping the company's information technology... -
PopVote: Assessing the Risk of DDoS (A)
Technology & Operations Case Study8.95View Details In this series of case studies, students learn to identify, assess, and control the risks of distributed denial of service (DDoS) attacks in a real-world... -
Mossack Fonseca: Panama Papers
Technology & Operations Case Study8.95View Details Mossack Fonseca, a Panama-based law firm, specializes in Corporate Law, fiduciary services, investment advice, and international business. In April 2016,... -
Security Breach at TJX
Technology & Operations Case Study8.95View Details The chief security officer of TJX Companies Inc. (TJX) faces a dilemma on his first day on the job. The company has discovered in December 2006, a computer... -
iPremier (B): Denial of Service Attack (Graphic Novel Version)
Technology & Operations Case Study5.00View Details Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure... -
iPremier (C): Denial of Service Attack (Graphic Novel Version)
Technology & Operations Case Study5.00View Details Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure... -
HBR Insights Future of Business Boxed Set (8 Books)
Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future... -
Avalon Information Services, Inc.
Sales & Marketing Case Study9.95View Details The Privacy Review Committee of Avalon Information Services must decide how to deal with concerns voiced by its retail supermarket customers about the...
-
Are You a Cyberthreat to Your Organization?
Leadership & Managing People Digital ArticleChances are, your employer is more vulnerable than you think to insider cyberattacks. This assessment will help you gauge how resilient your organization... -
New Laws on Data Privacy and Security Are Coming. Is Your Company Ready?
Cybersecurity and digital privacy Digital ArticleThe consequences of weak security are about to go way beyond bad PR. -
How to Red Team a Gen AI Model
AI and machine learning Digital ArticleThe harms that generative AI systems create often differ from other forms of AI in both scope and scale. -
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy
Technology & Operations Case Study8.95View Details In 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components of widely used industrial control... -
The Phoenix Project: Remediation of a Cybersecurity Crisis at the University of Virginia
Innovation & Entrepreneurship Case Study8.95View Details This case was designed to facilitate discussion of how a cyberattack was remediated by a major public university. Students are challenged to think through... -
Cybersecurity Is Not (Just) a Tech Problem
Cybersecurity and digital privacy Digital ArticleFour steps to building a company culture that reinforces your IT initiatives. -
iPremier (A): Denial of Service Attack (Graphic Novel Version)
Technology & Operations Case Study8.95View Details Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure... -
Cyberattacks Are Inevitable. Is Your Company Prepared?
Technology & Operations Digital ArticleThe first time you test your plan shouldn't be during a crisis. -
Everybody Knows: Russia and the Election
Global Business Case Study15.05View Details Following a contentious presidential race, Donald Trump's 2016 election destabilized America's status quo. Academics, journalists, politicians and the... -
What Russia's Ongoing Cyberattacks in Ukraine Suggest About the Future of Cyber Warfare
Technology & Operations Digital ArticleAnd how organizations around the world can prepare