-
Passwords Are Terrible, but Will Biometrics Be Any Better?
Cybersecurity and digital privacy Digital ArticleYes, if you give customers options. -
To Regain Consumers’ Trust, Marketers Need Transparent Data Practices
Analytics and data science Digital ArticleA trusting relationship between customer and business is essential. -
Sellers Are Overwhelmed by New Technology
Sales Digital ArticleAccording to research, salespeople who feel overwhelmed by technology are 43% less likely to meet quota. -
Leveraging AI to Battle This Pandemic — And the Next One
Global strategy Digital ArticleWe may need to rethink the rules around data sharing. -
The Dangers of Digital Protectionism
Cybersecurity and digital privacy Digital Article“Data islands” aren’t the answer to concerns about privacy and security. -
How Cybersecurity Teams Can Convince the C-Suite of Their Value
Technology and analytics Digital ArticleThree examples from Facebook. -
Why Cybersecurity Is So Difficult to Get Right
Cybersecurity and digital privacy Digital ArticleA Q&A with an IBM security expert. -
New Cybersecurity Regulations Are Coming. Here's How to Prepare.
Technology & Operations Digital ArticleDon't wait to assess the potential impact on your organization. -
Preventing the Next Big Cyberattack on U.S. Health Care
Technology & Operations Digital ArticleFive actions that can help avoid a repeat of the Change Healthcare debacle. -
Is Your Company Ready for a Ransomware Attack?
Crisis management Digital ArticleNearly half of U.S. companies reported one in the past year. -
The Behavioral Economics of Why Executives Underinvest in Cybersecurity
Technology & Operations Digital ArticleAnd how to change their minds. -
4 Cybersecurity Strategies for Small and Midsize Businesses
Technology and analytics Digital ArticleYou can’t stop cyberattacks from happening. But you can contain the consequences. -
Your Employees Are Your Best Defense Against Cyberattacks
Finance & Accounting Digital ArticleSix strategies to fortify your human firewall. -
Privacy and Cybersecurity Are Converging. Here’s Why That Matters for People and for Companies.
Cybersecurity and digital privacy Digital ArticleA look at what’s changing and what it means. -
How Global Information Sharing Can Help Stop Cybercrime
Technology & Operations Digital ArticleTo fight cybercriminals, governments and companies need a clear and centralized view of where and how they operate. -
6 Ways AI Could Disrupt Your Business
AI and machine learning Digital ArticleAsk these questions now to plan for the challenges ahead. -
New Laws on Data Privacy and Security Are Coming. Is Your Company Ready?
Technology & Operations Digital ArticleThe consequences of weak security are about to go way beyond bad PR. -
Equifax and Why It's So Hard to Sue a Company for Losing Your Personal Information
Technology & Operations Digital ArticleCan you prove you were harmed by it?
-
HBR's Year in Business and Technology: 2021 (2 Books)
Strategy & Execution Book45.00View Details The biggest technology and management ideas of the year, all in one place. This collection of the top ideas, insights, and best practices from the past... -
Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI
30.00View Details What will you do when your AI misbehaves? The promise of artificial intelligence is automated decision-making at scale, but that means AI also automates... -
Atlanta Ransomware Attack (A)
Management Case Study11.95View Details This case describes the March 2018 Ransomware attack on the information technology (IT) systems of the city of Atlanta and the response by Mayor Keisha... -
IPremier Co. (C): Denial of Service Attack
Technology & Operations Case Study5.00View Details Supplements the (A) case. -
Cheetah Mobile: Cross-Cultural Clashes Within a Technology Company Born Global
Global Business Case Study11.95View Details As a Chinese technology corporation founded in 2010, Cheetah Mobile (CM) formally launched its overseas strategy and entered international markets in... -
The Year in Tech, 2022: The Insights You Need from Harvard Business Review
22.95View Details A year of HBR's essential thinking on tech--all in one place. From quantum computing and next-generation digital health tools to virtual reality training... -
Cleveland Clinic Abu Dhabi
Organizational Development Case Study11.95View Details In 2006, the Cleveland Clinic and Mubadala Investment Company partnered with a bold ambition to deliver world class healthcare in the United Arab Emirates.... -
Customer Data and Privacy: The Insights You Need from Harvard Business Review
22.95View Details Collect data and build trust. With the rise of data science and machine learning, companies are awash in customer data and powerful new ways to gain insight... -
Apple: Privacy vs. Safety (A)
Leadership & Managing People Case Study11.95View Details In 2015, Apple CEO Tim Cook debuted the iPhone 6S with enhanced security measures that enflamed a debate on privacy and public safety around the world.... -
iPremier (C): Denial of Service Attack (Graphic Novel Version)
Technology & Operations Case Study5.00View Details Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure... -
The Year in Tech, 2024: The Insights You Need from Harvard Business Review
22.95View Details A year of HBR's essential thinking on tech--all in one place. Generative AI, Web3, neurotech, reusable rockets to power the space economy--new technologies... -
Alexa: A Pandora's Box of Risks
Strategy & Execution Case Study11.95View Details Launched in 2014, Amazon's Echo and Echo Dot smart speakers led the category's rapid adoption by households and enabled the penetration of artificial... -
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy
Technology & Operations Case Study11.95View Details In 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components of widely used industrial control... -
HBR Insights Future of Business Boxed Set (8 Books)
165.00View Details Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future... -
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy Epilogue
Technology & Operations Case Study5.00View Details This epilogue accompanies case 2029.0. In 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components... -
Cloud Syzygy Technologies: Cloud-Based Computing
Technology & Operations Case Study11.95View Details The president of Cloud Syzygy Technologies (CST) had recently returned from the Pacific Telecommunications Council conference, where he discussed ways... -
Cybersecurity: The Insights You Need from Harvard Business Review
22.95View Details No data is completely safe. Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you... -
The Internet of Things
Management Case Study8.95View Details The Internet of Things (IoT) can be generally explained as a network of objects that collect data regarding their surroundings and transfer it across... -
Cyberattack on Abank
Finance & Accounting Case Study11.95View Details Cyberattacks on corporations are an increasingly common phenomenon that imposes significant costs on shareholders, customers, and management. It is instrumental... -
PopVote: Assessing the Risk of DDoS (B)
Technology & Operations Case Study5.00View Details In this series of case studies, students learn to identify, assess, and control the risks of distributed denial of service (DDoS) attacks in a real-world...
-
Muddling Through Cybersecurity: Insightsfrom the U.S. Healthcare Industry
Technology & Operations Digital ArticleThe U.S. healthcare sector is inadequately prepared to deal with the reality of cyber threats. The increasing use of smart medical equipment and mobile... -
Passwords Are Terrible, but Will Biometrics Be Any Better?
Cybersecurity and digital privacy Digital ArticleYes, if you give customers options. -
To Regain Consumers’ Trust, Marketers Need Transparent Data Practices
Analytics and data science Digital ArticleA trusting relationship between customer and business is essential. -
Sellers Are Overwhelmed by New Technology
Sales Digital ArticleAccording to research, salespeople who feel overwhelmed by technology are 43% less likely to meet quota. -
For Your Eyes Only: U.S. Technology Companies, Sovereign States, and the Battle Over Data Protection
Technology & Operations Digital ArticleWho owns an individual's electronic communications data, who should have access to it, and what can be done with it? The battle of privacy versus security... -
Leveraging AI to Battle This Pandemic — And the Next One
Global strategy Digital ArticleWe may need to rethink the rules around data sharing. -
The Dangers of Digital Protectionism
Cybersecurity and digital privacy Digital Article“Data islands” aren’t the answer to concerns about privacy and security. -
How Cybersecurity Teams Can Convince the C-Suite of Their Value
Technology and analytics Digital ArticleThree examples from Facebook. -
Why Cybersecurity Is So Difficult to Get Right
Cybersecurity and digital privacy Digital ArticleA Q&A with an IBM security expert. -
HBR's Year in Business and Technology: 2021 (2 Books)
Strategy & Execution Book45.00View Details The biggest technology and management ideas of the year, all in one place. This collection of the top ideas, insights, and best practices from the past...