-
Don’t Acquire a Company Until You Evaluate Its Data Security
Cybersecurity and digital privacy Digital ArticleBeware the “data lemon.” -
7 Pressing Cybersecurity Questions Boards Need to Ask
IT security management Digital ArticleDon’t leave concerns about critical vulnerabilities for tomorrow. -
Sizing Up Your Cyberrisks
Boards Magazine ArticleFocus first on the threats to your key activities—not on the technology itself. -
Is Third-Party Software Leaving You Vulnerable to Cyberattacks?
Technology & Operations Digital ArticleThe SolarWinds hack highlights the importance of vetting your vendors. -
How Organizations Can Ramp Up Their Cybersecurity Efforts Right Now
Technology & Operations Digital ArticleScams and attacks have become more frequent and sophisticated as the crisis unfolds. -
What Russia’s Ongoing Cyberattacks in Ukraine Suggest About the Future of Cyber Warfare
Cybersecurity and digital privacy Digital ArticleAnd how organizations around the world can prepare -
Is Your Board Prepared for New Cybersecurity Regulations?
Technology & Operations Digital ArticleA proposed SEC rule would require companies to disclose their cybersecurity governance capabilities. -
Cybersecurity Is Not (Just) a Tech Problem
Technology & Operations Digital ArticleFour steps to building a company culture that reinforces your IT initiatives. -
How to Red Team a Gen AI Model
Technology & Operations Digital ArticleThe harms that generative AI systems create often differ from other forms of AI in both scope and scale. -
Boards Are Having the Wrong Conversations About Cybersecurity
Technology & Operations Digital ArticleA survey of 600 directors suggests that growing awareness of cyber risk isn't enough to drive better preparedness. -
Cybersecurity Insurance Has a Big Problem
Risk management Digital ArticleThere’s literally not enough money to keep the system afloat in the event of a major attack. -
Why Companies Are Forming Cybersecurity Alliances
Technology & Operations Digital ArticleThey're stepping up where governments haven't. -
Cyberattacks Are Inevitable. Is Your Company Prepared?
Cybersecurity and digital privacy Digital ArticleThe first time you test your plan shouldn’t be during a crisis. -
The Cybersecurity Risks of an Escalating Russia-Ukraine Conflict
Technology & Operations Digital ArticleNow is the time to revisit your business continuity plans. -
Does Your Cyber Insurance Cover a State-Sponsored Attack?
Crisis management Digital ArticleDecisions you make today will determine whether you’re facing financial chaos — or just a bad day at the office. -
What It Takes to Sell Cloud-Based Software to the U.S. Government
Cybersecurity and digital privacy Digital ArticleComplying with FedRAMP is worth the investment. -
How to Safeguard Against Cyberattacks on Utilities
Leadership & Managing People Digital ArticleIn 2019, California showed us how costly a sustained power outage can be. -
New Laws on Data Privacy and Security Are Coming. Is Your Company Ready?
Cybersecurity and digital privacy Digital ArticleThe consequences of weak security are about to go way beyond bad PR. -
Quantum Computing for Business Leaders
Technology & Operations Magazine ArticleQuantum computers can solve problems exponentially faster than classical computers can. They will bring about two huge changes: an end to our current... -
Corporate Cybersecurity Is Becoming Geopolitical. Are U.S. Tech Companies Ready?
Technology & Operations Digital ArticlePlatforms have a propaganda problem.
-
HBR Insights Future of Business Boxed Set (8 Books)
165.00View Details Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future... -
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy
Technology & Operations Case Study11.95View Details In 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components of widely used industrial control... -
iPremier (B): Denial of Service Attack (Graphic Novel Version)
Technology & Operations Case Study5.00View Details Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure... -
The Phoenix Project: Remediation of a Cybersecurity Crisis at the University of Virginia
Innovation & Entrepreneurship Case Study11.95View Details This case was designed to facilitate discussion of how a cyberattack was remediated by a major public university. Students are challenged to think through... -
Avalon Information Services, Inc.
Sales & Marketing Case Study11.95View Details The Privacy Review Committee of Avalon Information Services must decide how to deal with concerns voiced by its retail supermarket customers about the... -
Everybody Knows: Russia and the Election
Global Business Case Study11.95View Details Following a contentious presidential race, Donald Trump's 2016 election destabilized America's status quo. Academics, journalists, politicians and the... -
Hydropack India Pvt. Ltd.: Resolving a Data Breach
Technology & Operations Case Study11.95View Details In April 2018, Amit Darekar, director of operations at Hydropack India Pvt. Ltd. (Hydropack), was focused on revamping the company's information technology... -
Mossack Fonseca: Panama Papers
Technology & Operations Case Study11.95View Details Mossack Fonseca, a Panama-based law firm, specializes in Corporate Law, fiduciary services, investment advice, and international business. In April 2016,... -
iPremier (A): Denial of Service Attack (Graphic Novel Version)
Technology & Operations Case Study11.95View Details Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure... -
iPremier (C): Denial of Service Attack (Graphic Novel Version)
Technology & Operations Case Study5.00View Details Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure... -
Security Breach at TJX
Technology & Operations Case Study11.95View Details The chief security officer of TJX Companies Inc. (TJX) faces a dilemma on his first day on the job. The company has discovered in December 2006, a computer... -
PopVote: Assessing the Risk of DDoS (A)
Technology & Operations Case Study11.95View Details In this series of case studies, students learn to identify, assess, and control the risks of distributed denial of service (DDoS) attacks in a real-world...
-
Don’t Acquire a Company Until You Evaluate Its Data Security
Cybersecurity and digital privacy Digital ArticleBeware the “data lemon.” -
7 Pressing Cybersecurity Questions Boards Need to Ask
IT security management Digital ArticleDon’t leave concerns about critical vulnerabilities for tomorrow. -
Sizing Up Your Cyberrisks
Boards Magazine ArticleFocus first on the threats to your key activities—not on the technology itself. -
Is Third-Party Software Leaving You Vulnerable to Cyberattacks?
Technology & Operations Digital ArticleThe SolarWinds hack highlights the importance of vetting your vendors. -
HBR Insights Future of Business Boxed Set (8 Books)
165.00View Details Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future... -
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy
Technology & Operations Case Study11.95View Details In 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components of widely used industrial control... -
How Organizations Can Ramp Up Their Cybersecurity Efforts Right Now
Technology & Operations Digital ArticleScams and attacks have become more frequent and sophisticated as the crisis unfolds. -
What Russia’s Ongoing Cyberattacks in Ukraine Suggest About the Future of Cyber Warfare
Cybersecurity and digital privacy Digital ArticleAnd how organizations around the world can prepare - SPONSOR CONTENT FROM MICROSOFT X AMD
Enhance Your Geo-Distributed Apps with Networking Services that Go the Distance
IT security management Sponsor ContentSponsor content from Microsoft x AMD. - SPONSORED CONTENT FROM Intel
The Strategic Importance of a PC Refresh
IT security management ResearchWhite Paper Sponsored By Intel