Navigation Menu
Harvard Business Review Home
Subscribe Cart Sign In
Account Menu
Account Menu
Hi,
 Guest
Search Menu
Close menu
CLEAR
  • SUGGESTED TOPICS
Explore HBR
  • Latest
  • The Magazine
  • Ascend
  • Podcasts
  • Store
  • Webinars
  • Newsletters
Popular Topics
  • Managing Yourself
  • Leadership
  • Strategy
  • Managing Teams
  • Gender
  • Innovation
  • Work-life Balance
  • All Topics
For Subscribers
  • The Big Idea
  • Data & Visuals
  • Reading Lists
  • Case Selections
  • HBR Learning
  • Subscribe
My Account
  • My Library
  • Topic Feeds
  • Orders
  • Account Settings
  • Email Preferences
  • Log Out
  • Sign In
Subscribe Latest Podcasts The Magazine Ascend Store Webinars Newsletters All Topics The Big Idea Data & Visuals Reading Lists Case Selections HBR Learning My Library Account Settings Log Out Sign In

Your Cart

Your Shopping Cart is empty.
Visit Our Store
Guest User
Subscriber
My Library Topic Feeds Orders Account Settings Email Preferences Log Out
Reading List
Reading Lists

Cybersecurity and digital privacy

Follow this topic
Following
Related Topics:
  • Technology and analytics
  • AI and machine learning
  • Algorithms
  • Analytics and data science
  • Automation
See All Topics
Popular
Popular From the Store For You
  • Research: Why Employees Violate Cybersecurity Policies

    Technology & Operations Digital Article
    • Clay Posey
    • Mindy Shoss
    Stress can reduce people's tolerance for rules that seem to get in the way of doing their jobs.
    • Save
    • Share
    • Buy Copies
    • January 20, 2022
  • What? Me, Worry?

    Intellectual property Magazine Article
    • Gardiner Morse
    Most executives think they’re security conscious—they change their passwords and shred important documents and so forth. But what rarely crosses their minds, says espionage expert H. Keith Melton, is that cloak-and-dagger types really are after their valuables. Just because you’re not paranoid, he observes, doesn’t mean they’re not following you. Melton, the author of Ultimate […]
    • Save
    • Share
    • From the November 2005 Issue
  • Which of Your Employees Are Most Likely to Expose Your Company to a Cyberattack?

    Cybersecurity and digital privacy Digital Article
    • Kon Leong
    39% of all data breaches come from the inside.
    • Save
    • Share
    • December 05, 2017
  • Cybersecurity’s Human Factor: Lessons from the Pentagon

    Cybersecurity and digital privacy Magazine Article
    • James A. (Sandy) Winnefeld Jr.
    • Christopher Kirchhoff
    • David M. Upton
    How companies can turn themselves into high-reliability organizations
    • Save
    • Share
    • From the September 2015 Issue
  • The Cyber Insurance Market Needs More Money

    Cybersecurity and digital privacy Digital Article
    • Tom Johansmeyer
    Securities could help give insurers the breathing room they need to keep growing — and meet customers’ mounting needs.
    • Save
    • Share
    • March 10, 2022
  • Who Should Take the Fall? (HBR Case Study)

    Strategy & Execution Magazine Article
    • Jana Seijts
    When a mobile-payment company is hacked, business slips. The board believes that having someone publicly take the fall will stabilize the situation, but...
    • Save
    • Share
    • Buy Copies
    • July 01, 2015
  • Human Error Drives Most Cyber Incidents. Could AI Help?

    Technology & Operations Digital Article
    • Tomas Chamorro-Premuzic PhD.
    The pros and cons of relying on machine intelligence to de-risk human behavior.
    • Save
    • Share
    • Buy Copies
    • May 03, 2023
  • Boss, I Think Someone Stole Our Customer Data (HBR Case Study)

    Strategy & Execution Magazine Article
    • Eric McNulty
    Flayton Electronics is showing up as a common point of purchase for a large number of fraudulent credit card transactions. It's not clear how responsible...
    • Save
    • Share
    • Buy Copies
    • September 01, 2007
  • A Blueprint for a Better Digital Society

    Technology and analytics Big Idea
    • Jaron Lanier
    • E. Glen Weyl
    For individuals and platforms, the future requires a fundamental economic shift.
    • Save
    • Share
    • September 26, 2018
  • Where Is Tech Going in 2023?

    AI and machine learning Digital Article
    • Aamer Baig
    • Jan Shelly Brown
    • William Forrest
    • Vinayak HV
    • Klemens Hjartar
    • Lareina Yee
    Six trends that will define the next year, according to McKinsey experts.
    • Save
    • Share
    • January 06, 2023
  • Your Algorithms Are Not Safe from Hackers

    Cybersecurity and digital privacy Digital Article
    • Kira Radinsky
    The next frontier of cybersecurity.
    • Save
    • Share
    • January 05, 2016
  • 6 Actions CEOs Must Take During a Cyberattack

    Cybersecurity and digital privacy Digital Article
    • Tim Maurer
    Lessons from the Colonial Pipeline ransomware attack.
    • Save
    • Share
    • September 18, 2023
  • We Say We Want Privacy Online, But Our Actions Say Otherwise

    Government policy and regulation Digital Article
    • Leslie K. John
    Why we don’t protect our data.
    • Save
    • Share
    • October 16, 2015
  • Don’t Acquire a Company Until You Evaluate Its Data Security

    Cybersecurity and digital privacy Digital Article
    • Chirantan Chatterjee
    • D. Daniel Sokol
    Beware the “data lemon.”
    • Save
    • Share
    • April 16, 2019
  • 7 Pressing Cybersecurity Questions Boards Need to Ask

    IT security management Digital Article
    • Dr. Keri Pearlson
    • Nelson Novaes Neto
    Don’t leave concerns about critical vulnerabilities for tomorrow.
    • Save
    • Share
    • March 04, 2022
  • Cybersecurity Is Putting Customer Trust at the Center of Competition

    Cybersecurity and digital privacy Digital Article
    • Andrew Burt
    Apple’s brand increasingly depends on it.
    • Save
    • Share
    • March 04, 2019
  • Ad Blocking's Unintended Consequences

    Technology & Operations Digital Article
    • Faizan Bhat
    Users will decide whether advertising is a viable business model online.
    • Save
    • Share
    • Buy Copies
    • August 12, 2015
  • Sizing Up Your Cyberrisks

    Boards Magazine Article
    • Thomas J. Parenty
    • Jack J. Domet
    Focus first on the threats to your key activities—not on the technology itself.
    • Save
    • Share
    • From the November–December 2019 Issue
  • How Leading Consultancies Can Better Manage AI Risk

    Technology & Operations Digital Article
    • Brian Spisak
    Eight steps to navigate this new technological landscape strategically and ethically.
    • Save
    • Share
    • Buy Copies
    • November 06, 2023
  • Biometrics Won’t Solve Our Data-Security Crisis

    Cybersecurity and digital privacy Digital Article
    • Eduard Goodman
    The basics of verification haven’t really changed for 600 years.
    • Save
    • Share
    • December 06, 2017
  • Leading Through Influence at Scale: Open Source Security at the Linux Foundation

    Management Case Study
    • Henry W. Chesbrough
    11.95
    View Details
    The Linux Foundation (LF) is a non-profit consortium of devoting to supporting the worldwide ecosystem of open source software (OSS) developers. While...
    • Save
    • Share
    • October 01, 2022
  • Network Associates: Securing the Internet

    Global Business Case Study
    • Jennifer Burns
    • Debora L. Spar
    11.95
    View Details
    Follows one company's path through the uncharted terrain of government regulation and the Internet. In March 1998, Network Associates announced it would...
    • Save
    • Share
    • March 15, 1999
  • Autopsy of a Data Breach: The Target Case

    Leadership & Managing People Case Study
    • Line Dube
    11.95
    View Details
    This case revisits the events in late 2013 that gave rise to what was at the time the largest breach of confidential data in history. Indeed, on December...
    • Save
    • Share
    • March 01, 2016
  • You Can't Tell Anyone (A)

    Organizational Development Case Study
    • Mary Gentile
    • Brian Moriarty
    11.95
    View Details
    This case set is part of the Giving Voice to Values (GVV) curriculum. To see other material in the GVV curriculum, please visit http://store.darden.virginia.edu/giving-voice-to-values....
    • Save
    • Share
    • July 15, 2022
  • The Year in Tech, 2023: The Insights You Need from Harvard Business Review

    Technology & Operations Book
    • Harvard Business Review
    • Beena Ammanath
    • Andrew Ng
    • Michael Luca
    • Bhaskar Ghosh
    22.95
    View Details
    A year of HBR's essential thinking on tech--all in one place. Easy-to-use AI tools, contactless commerce, crypto for business, the mature metaverse--new...
    • Save
    • Share
    • October 25, 2022
  • Amazon Shopper Panel: Paying Customers for Their Data

    Sales & Marketing Case Study
    • Eva Ascarza
    • Ayelet Israeli
    11.95
    View Details
    This case introduces a new Amazon program that has consumers upload their receipts from transactions outside of Amazon, in exchange for money. Through...
    • Save
    • Share
    • January 07, 2021
  • PharmaCo

    Strategy & Execution Case Study
    • Michael Parent
    • Greg Murray
    • Sundeep Sandhu
    11.95
    View Details
    PharmaCo was a large, multinational, integrated pharmaceutical company. Its board of directors was meeting to discuss a possible friendly merger with...
    • Save
    • Share
    • March 30, 2020
  • HBR Insights Future of Business Boxed Set (8 Books)

    Leadership & Managing People Book
    • Harvard Business Review
    165.00
    View Details
    Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future...
    • Save
    • Share
    • January 12, 2021
  • The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy

    Technology & Operations Case Study
    • Venkatesh Narayanamurti
    • Ryan Ellis
    11.95
    View Details
    In 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components of widely used industrial control...
    • Save
    • Share
    • February 04, 2015
  • Customer Data and Privacy: The Insights You Need from Harvard Business Review

    Technology & Operations Book
    • Harvard Business Review
    • Timothy Morey
    • Andrew Burt
    • Christine Moorman
    • Thomas C. Redman
    22.95
    View Details
    Collect data and build trust. With the rise of data science and machine learning, companies are awash in customer data and powerful new ways to gain insight...
    • Save
    • Share
    • September 22, 2020
  • BuyHive: A Digital Platform for the Transformation of Global Sourcing

    Strategy & Execution Case Study
    • Kannan Ramaswamy
    • William E Youngdahl
    11.95
    View Details
    The case focuses on key decisions facing a startup venture BuyHive, that is on the cusp of disintermediating the sourcing business with a new business...
    • Save
    • Share
    • January 01, 2022
  • Building a "Backdoor" to the iPhone: An Ethical Dilemma

    Leadership & Managing People Case Study
    • Tulsi Jayakumar
    • Surya Tahora
    11.95
    View Details
    In February 2016, Tim Cook, Apple's chief executive officer, challenged a U.S. Federal Court order for Apple to assist the Federal Bureau of Investigation...
    • Save
    • Share
    • April 28, 2016
  • PharmaCo: Inject 5-Malware Infection

    Strategy & Execution Case Study
    • Michael Parent
    5.00
    View Details
    Supplement to case W20218
    • Save
    • Share
    • March 30, 2020
  • PharmaCo: Inject 1-Ransomware

    Strategy & Execution Case Study
    • Michael Parent
    5.00
    View Details
    Supplement to case W20218
    • Save
    • Share
    • March 30, 2020
  • Target Data Breach: Accounting for Contingent Liabilities

    Finance & Accounting Case Study
    • Justin J. Hopkins
    11.95
    View Details
    This is a flexible case that provides for discussion about the form and content of 10-K reports, managerial discussion and analysis, non-GAAP reporting,...
    • Save
    • Share
    • October 06, 2017
  • Maple Tree Cancer Alliance: Growing Pains

    Management Case Study
    • Phoebe Tsai
    • Andrew Wonders
    11.95
    View Details
    Karen Wonders founded Maple Tree Cancer Alliance (MTCA) in 2011 as a non-profit organization in Dayton, Ohio, to improve cancer patients' quality of life...
    • Save
    • Share
    • April 12, 2023
  • Customer Data and Privacy: Tools for Preparing Your Team for the Future

    Technology & Operations Book
    • Harvard Business Review
    • Timothy Morey
    • Andrew Burt
    • Christine Moorman
    • Thomas C. Redman
    99.95
    View Details
    Collect data and build trust. With the rise of data science and machine learning, companies are awash in customer data and powerful new ways to gain insight...
    • Save
    • Share
    • October 07, 2020
  • Cybersecurity: The Insights You Need from Harvard Business Review

    Technology & Operations Book
    • Harvard Business Review
    • Alex Blau
    • Andrew Burt
    • Boris Groysberg
    • Roman V Yampolskiy
    22.95
    View Details
    No data is completely safe. Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you...
    • Save
    • Share
    • September 17, 2019
  • Cloud Syzygy Technologies: Cloud-Based Computing

    Technology & Operations Case Study
    • Mark Chun
    • Owen Hall
    • Charla Griffy-Brown
    11.95
    View Details
    The president of Cloud Syzygy Technologies (CST) had recently returned from the Pacific Telecommunications Council conference, where he discussed ways...
    • Save
    • Share
    • September 06, 2016
  • iPremier (B): Denial of Service Attack (Graphic Novel Version)

    Technology & Operations Case Study
    • Robert D. Austin
    • Jeremy C. Short
    5.00
    View Details
    Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure...
    • Save
    • Share
    • June 29, 2009
  • Research: Why Employees Violate Cybersecurity Policies

    Technology & Operations Digital Article
    • Clay Posey
    • Mindy Shoss
    Stress can reduce people's tolerance for rules that seem to get in the way of doing their jobs.
    • Save
    • Share
    • Buy Copies
    • January 20, 2022
  • Leading Through Influence at Scale: Open Source Security at the Linux Foundation

    Management Case Study
    • Henry W. Chesbrough
    11.95
    View Details
    The Linux Foundation (LF) is a non-profit consortium of devoting to supporting the worldwide ecosystem of open source software (OSS) developers. While...
    • Save
    • Share
    • October 01, 2022
  • Network Associates: Securing the Internet

    Global Business Case Study
    • Jennifer Burns
    • Debora L. Spar
    11.95
    View Details
    Follows one company's path through the uncharted terrain of government regulation and the Internet. In March 1998, Network Associates announced it would...
    • Save
    • Share
    • March 15, 1999
  • What? Me, Worry?

    Intellectual property Magazine Article
    • Gardiner Morse
    Most executives think they’re security conscious—they change their passwords and shred important documents and so forth. But what rarely crosses their minds, says espionage expert H. Keith Melton, is that cloak-and-dagger types really are after their valuables. Just because you’re not paranoid, he observes, doesn’t mean they’re not following you. Melton, the author of Ultimate […]
    • Save
    • Share
    • From the November 2005 Issue
  • Which of Your Employees Are Most Likely to Expose Your Company to a Cyberattack?

    Cybersecurity and digital privacy Digital Article
    • Kon Leong
    39% of all data breaches come from the inside.
    • Save
    • Share
    • December 05, 2017
  • Cybersecurity’s Human Factor: Lessons from the Pentagon

    Cybersecurity and digital privacy Magazine Article
    • James A. (Sandy) Winnefeld Jr.
    • Christopher Kirchhoff
    • David M. Upton
    How companies can turn themselves into high-reliability organizations
    • Save
    • Share
    • From the September 2015 Issue
  • The Cyber Insurance Market Needs More Money

    Cybersecurity and digital privacy Digital Article
    • Tom Johansmeyer
    Securities could help give insurers the breathing room they need to keep growing — and meet customers’ mounting needs.
    • Save
    • Share
    • March 10, 2022
  • Who Should Take the Fall? (HBR Case Study)

    Strategy & Execution Magazine Article
    • Jana Seijts
    When a mobile-payment company is hacked, business slips. The board believes that having someone publicly take the fall will stabilize the situation, but...
    • Save
    • Share
    • Buy Copies
    • July 01, 2015
  • SPONSOR CONTENT FROM LIVERAMP

    How Privacy-Enhancing Technologies Can Accelerate Your Data Strategy

    Analytics and data science Sponsor Content
    Sponsor content from LiveRamp.
    • Save
    • Share
    • May 26, 2021
  • Human Error Drives Most Cyber Incidents. Could AI Help?

    Technology & Operations Digital Article
    • Tomas Chamorro-Premuzic PhD.
    The pros and cons of relying on machine intelligence to de-risk human behavior.
    • Save
    • Share
    • Buy Copies
    • May 03, 2023

Popular Topics

Change

Loading...

Follow this topic
Following
Change

Loading...

Follow this topic
Following
Change

Loading...

Follow this topic
Following
See all topics

Partner Center

Latest Magazine Ascend Topics Podcasts Store The Big Idea Data & Visuals Case Selections HBR Learning
Harvard Business Review Home
Subscribe
Explore HBR
  • The Latest
  • All Topics
  • Magazine Archive
  • The Big Idea
  • Reading Lists
  • Case Selections
  • Podcasts
  • Webinars
  • Data & Visuals
  • My Library
  • Newsletters
  • HBR Press
  • HBR Ascend
HBR Store
  • Article Reprints
  • Books
  • Cases
  • Collections
  • Magazine Issues
  • HBR Guide Series
  • HBR 20-Minute Managers
  • HBR Emotional Intelligence Series
  • HBR Must Reads
  • Tools
About HBR
  • Contact Us
  • Advertise with Us
  • Information for Booksellers/Retailers
  • Masthead
  • Global Editions
  • Media Inquiries
  • Guidelines for Authors
  • HBR Analytic Services
  • Copyright Permissions
Manage My Account
  • My Library
  • Topic Feeds
  • Orders
  • Account Settings
  • Email Preferences
  • Account FAQ
  • Help Center
  • Contact Customer Service
Follow HBR
  • Facebook
  • X Corp.
  • LinkedIn
  • Instagram
  • Your Newsreader
Harvard Business Publishing
  • About Us
  • Careers
  • Privacy Policy
  • Cookie Policy
  • Copyright Information
  • Trademark Policy
  • Terms of Use

Harvard Business Publishing:
  • Higher Education
  • Corporate Learning
  • Harvard Business Review
  • Harvard Business School
Copyright ©   Harvard Business School Publishing. All rights reserved. Harvard Business Publishing is an affiliate of Harvard Business School.