-
Is Your Board Prepared for New Cybersecurity Regulations?
Technology & Operations Digital ArticleA proposed SEC rule would require companies to disclose their cybersecurity governance capabilities. -
Is Third-Party Software Leaving You Vulnerable to Cyberattacks?
Technology & Operations Digital ArticleThe SolarWinds hack highlights the importance of vetting your vendors. -
Boards Are Having the Wrong Conversations About Cybersecurity
Technology & Operations Digital ArticleA survey of 600 directors suggests that growing awareness of cyber risk isn't enough to drive better preparedness. -
How the Cloud Is Changing Data Science
Technology & Operations Digital ArticleHere's what leaders need to know in this shifting landscape. -
Cybersecurity Insurance Has a Big Problem
Risk management Digital ArticleThere’s literally not enough money to keep the system afloat in the event of a major attack. -
New Laws on Data Privacy and Security Are Coming. Is Your Company Ready?
Cybersecurity and digital privacy Digital ArticleThe consequences of weak security are about to go way beyond bad PR. -
Raytheon CEO Gregory Hayes: How Ukraine Has Highlighted Gaps in US Defense Technologies
Business and society Digital ArticleHow does a company that gets two million hack attempts each week think about security? -
The Cybersecurity Risks of an Escalating Russia-Ukraine Conflict
Cybersecurity and digital privacy Digital ArticleNow is the time to revisit your business continuity plans. -
How Organizations Can Ramp Up Their Cybersecurity Efforts Right Now
Technology & Operations Digital ArticleScams and attacks have become more frequent and sophisticated as the crisis unfolds. -
Don’t Acquire a Company Until You Evaluate Its Data Security
Cybersecurity and digital privacy Digital ArticleBeware the “data lemon.” -
How to Red Team a Gen AI Model
Technology & Operations Digital ArticleThe harms that generative AI systems create often differ from other forms of AI in both scope and scale. -
What It Takes to Sell Cloud-Based Software to the U.S. Government
Technology & Operations Digital ArticleComplying with FedRAMP is worth the investment. -
Cyberattacks Are Inevitable. Is Your Company Prepared?
Cybersecurity and digital privacy Digital ArticleThe first time you test your plan shouldn’t be during a crisis. -
What Russia's Ongoing Cyberattacks in Ukraine Suggest About the Future of Cyber Warfare
Technology & Operations Digital ArticleAnd how organizations around the world can prepare -
Does Your Cyber Insurance Cover a State-Sponsored Attack?
Crisis management Digital ArticleDecisions you make today will determine whether you’re facing financial chaos — or just a bad day at the office. -
Cybersecurity Is Not (Just) a Tech Problem
Cybersecurity and digital privacy Digital ArticleFour steps to building a company culture that reinforces your IT initiatives. -
Quantum Computing for Business Leaders
Technology & Operations Magazine ArticleQuantum computers can solve problems exponentially faster than classical computers can. They will bring about two huge changes: an end to our current... -
Sizing Up Your Cyberrisks
Boards Magazine ArticleFocus first on the threats to your key activities—not on the technology itself. -
Why Companies Are Forming Cybersecurity Alliances
Technology & Operations Digital ArticleThey're stepping up where governments haven't. -
How to Safeguard Against Cyberattacks on Utilities
Decision making and problem solving Digital ArticleIn 2019, California showed us how costly a sustained power outage can be.
-
HBR Insights Future of Business Boxed Set (8 Books)
Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future... -
The Phoenix Project: Remediation of a Cybersecurity Crisis at the University of Virginia
Innovation & Entrepreneurship Case Study11.95View Details This case was designed to facilitate discussion of how a cyberattack was remediated by a major public university. Students are challenged to think through... -
PopVote: Assessing the Risk of DDoS (A)
Technology & Operations Case Study11.95View Details In this series of case studies, students learn to identify, assess, and control the risks of distributed denial of service (DDoS) attacks in a real-world... -
iPremier (A): Denial of Service Attack (Graphic Novel Version)
Technology & Operations Case Study11.95View Details Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure... -
iPremier (B): Denial of Service Attack (Graphic Novel Version)
Technology & Operations Case Study5.00View Details Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure... -
iPremier (C): Denial of Service Attack (Graphic Novel Version)
Technology & Operations Case Study5.00View Details Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure... -
Hydropack India Pvt. Ltd.: Resolving a Data Breach
Technology & Operations Case Study11.95View Details In April 2018, Amit Darekar, director of operations at Hydropack India Pvt. Ltd. (Hydropack), was focused on revamping the company's information technology... -
Everybody Knows: Russia and the Election
Global Business Case Study11.95View Details Following a contentious presidential race, Donald Trump's 2016 election destabilized America's status quo. Academics, journalists, politicians and the... -
Security Breach at TJX
Technology & Operations Case Study11.95View Details The chief security officer of TJX Companies Inc. (TJX) faces a dilemma on his first day on the job. The company has discovered in December 2006, a computer... -
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy
Technology & Operations Case Study11.95View Details In 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components of widely used industrial control... -
Mossack Fonseca: Panama Papers
Technology & Operations Case Study11.95View Details Mossack Fonseca, a Panama-based law firm, specializes in Corporate Law, fiduciary services, investment advice, and international business. In April 2016,... -
Avalon Information Services, Inc.
Sales & Marketing Case Study11.95View Details The Privacy Review Committee of Avalon Information Services must decide how to deal with concerns voiced by its retail supermarket customers about the...
-
Is Your Board Prepared for New Cybersecurity Regulations?
Technology & Operations Digital ArticleA proposed SEC rule would require companies to disclose their cybersecurity governance capabilities. -
A $10 million question and other cybersecurity-related ethical dilemmas amid the COVID-19 pandemic
Technology & Operations Digital ArticleCybercrime and cybersecurity are like two sides of the same coin: They are opposites but cannot exist without each other. Their mutual relation generates... -
HBR Insights Future of Business Boxed Set (8 Books)
Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future... -
Is Third-Party Software Leaving You Vulnerable to Cyberattacks?
Technology & Operations Digital ArticleThe SolarWinds hack highlights the importance of vetting your vendors. -
Boards Are Having the Wrong Conversations About Cybersecurity
Technology & Operations Digital ArticleA survey of 600 directors suggests that growing awareness of cyber risk isn't enough to drive better preparedness. -
How the Cloud Is Changing Data Science
Technology & Operations Digital ArticleHere's what leaders need to know in this shifting landscape. -
The Phoenix Project: Remediation of a Cybersecurity Crisis at the University of Virginia
Innovation & Entrepreneurship Case Study11.95View Details This case was designed to facilitate discussion of how a cyberattack was remediated by a major public university. Students are challenged to think through... -
PopVote: Assessing the Risk of DDoS (A)
Technology & Operations Case Study11.95View Details In this series of case studies, students learn to identify, assess, and control the risks of distributed denial of service (DDoS) attacks in a real-world... -
Cybersecurity Insurance Has a Big Problem
Risk management Digital ArticleThere’s literally not enough money to keep the system afloat in the event of a major attack. - SPONSORED CONTENT FROM Broadcom Software
Taming IT Complexity through Effective Strategies and Partnerships
Digital transformation ResearchResearch Report Sponsored By Broadcom Software