-
A Cyberattack Doesn't Have to Sink Your Stock Price
Technology & Operations Digital ArticleHere's how to restore consumer and investor confidence. -
Case Study: After a Crisis, Who Should Take the Fall?
Crisis management Magazine ArticleIn the wake of a security breach, the board demands a scapegoat. -
Ransomware Attacks Are Spiking. Is Your Company Prepared?
Cybersecurity and digital privacy Digital ArticleThey’re up 150% in 2020 — and growing even faster in 2021. -
The Digital World Is Changing Rapidly. Your Cybersecurity Needs to Keep Up.
Technology & Operations Digital ArticleCompanies need to do more to understand when and how their software is failing. -
Blockchain Will Help Us Prove Our Identities in a Digital World
Technology & Operations Digital ArticleIt's already working in Estonia. -
The Digital-Piracy Dilemma
Technology & Operations Digital ArticleDo buzz and publicity outweigh the lost sales? -
The Behavioral Economics of Why Executives Underinvest in Cybersecurity
Cybersecurity and digital privacy Digital ArticleAnd how to change their minds. -
Raytheon CEO Gregory Hayes: How Ukraine Has Highlighted Gaps in US Defense Technologies
Global Business Digital ArticleHow does a company that gets two million hack attempts each week think about security? -
The Legal Risks of Monitoring Employees Online
Technology & Operations Digital ArticleIf you have a global workforce, you must have a global policy. -
The HBR List: Breakthrough Ideas for 2010
Finance and investing Magazine ArticleWhen the business community supports an idea, change can happen fast. HBR’s annual ideas collection, compiled in cooperation with the World Economic Forum, offers 10 fresh solutions we believe would make the world better. Ranging from productivity boosting to nation building, from health care to hacking, any of the ideas presented in the following pages […] -
Ad Blocking’s Unintended Consequences
Web-based technologies Digital ArticleUsers will decide whether advertising is a viable business model online. -
Why Companies Need to Help Ensure Election Integrity
Business and society Digital ArticleBusinesses have the tools to help local governments adapt to a new, digital landscape. -
How to Exercise the Power You Didn’t Ask For
Technology and analytics Big IdeaDoctors do it. Banks do it. To avoid the heaviest hand of regulation, platforms should become fiduciaries, too. -
Cyber Security in the Internet of Things
Cybersecurity and digital privacy Digital ArticleEvery enterprise will be affected by the Internet of Things (IoT), the growing phenomenon by which not only people, but also “things” — vehicles, commercial and industrial equipment, medical devices, remote sensors in natural environments — are linked to networks that are connected to the internet. Expect the impact on your business to be profound. […] -
Traveling for Work? You're a Prime Target for Hackers
Technology & Operations Digital ArticleThe rapid ascent of spymail. -
A New Gold Standard for Digital Ad Measurement?
Technology & Operations Digital ArticleAs the digital ad measurement landscape changes, companies should consider marketing mix models calibrated with ad experiments. -
Why Companies Are Forming Cybersecurity Alliances
Cybersecurity and digital privacy Digital ArticleThey’re stepping up where governments haven’t. -
Customer Data: Designing for Transparency and Trust
Analytics and data science Magazine ArticleDon’t sacrifice long-term goodwill for short-term benefits. -
Cybersecurity Is Not (Just) a Tech Problem
Cybersecurity and digital privacy Digital ArticleFour steps to building a company culture that reinforces your IT initiatives. -
3D Printing Gives Hackers Entirely New Ways to Wreak Havoc
Cybersecurity and digital privacy Digital ArticleCyber criminals could hide dangerous flaws in everyday objects.
-
Ransomware Attack at Springhill Medical Center
Management Case Study11.95View Details In July, 2019, Springhill Medical Center ("SMC") in Mobile, Alabama fell prey to a malicious ransomware attack that crippled the hospital's internal network... -
Apple: Privacy vs. Safety (C)
Management Case Study5.00View Details In September 2021, Apple decided to delay updates to iOS and iPadOS that included features to fight child sexual abuse. While many-including prominent... -
Atlanta Ransomware Attack (B)
Management Case Study5.00View Details This case describes the March 2018 Ransomware attack on the information technology (IT) systems of the city of Atlanta and the response by Mayor Keisha... -
Amazon Shopper Panel: Paying Customers for Their Data
Sales & Marketing Case Study11.95View Details This case introduces a new Amazon program that has consumers upload their receipts from transactions outside of Amazon, in exchange for money. Through... -
Network Associates: Securing the Internet
Global Business Case Study11.95View Details Follows one company's path through the uncharted terrain of government regulation and the Internet. In March 1998, Network Associates announced it would... -
The iPhone at IVK
Technology & Operations Case Study11.95View Details The CIO addresses a decision to replace salesmen netbook PC's with iPhones, including converting the company's sales and customer applications to the... -
Cybersecurity: The Insights You Need from Harvard Business Review
22.95View Details No data is completely safe. Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you... -
Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI
30.00View Details What will you do when your AI misbehaves? The promise of artificial intelligence is automated decision-making at scale, but that means AI also automates... -
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy
Technology & Operations Case Study11.95View Details In 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components of widely used industrial control... -
Ola Electric: Igniting Conversations on Privacy
Management Case Study11.95View Details In 2022, Ola Electric Mobility Private Limited (Ola Electric), a motor vehicle manufacturing company based in Bengaluru, India, was embroiled in a privacy... -
The Year in Tech, 2023: The Insights You Need from Harvard Business Review
22.95View Details A year of HBR's essential thinking on tech--all in one place. Easy-to-use AI tools, contactless commerce, crypto for business, the mature metaverse--new... -
Apple: Privacy vs. Safety (B)
Management Case Study5.00View Details In 2020, as the COVID-19 pandemic swept across the globe, Apple and Google partnered to develop a contact tracing application that would collect information... -
Note on Cyberattacks and Regulatory Regimes
Technology & Operations Case Study8.95View Details Supplements "SolarWinds Confronts Sunburst" (723-357, -368) to provide context on types of cyberattacks and their costs, as well as-at the time of the... -
Maple Tree Cancer Alliance: Growing Pains
Management Case Study11.95View Details Karen Wonders founded Maple Tree Cancer Alliance (MTCA) in 2011 as a non-profit organization in Dayton, Ohio, to improve cancer patients' quality of life... -
Cloud Syzygy Technologies: Cloud-Based Computing
Technology & Operations Case Study11.95View Details The president of Cloud Syzygy Technologies (CST) had recently returned from the Pacific Telecommunications Council conference, where he discussed ways... -
PopVote: Assessing the Risk of DDoS (C)
Technology & Operations Case Study5.00View Details In this series of case studies, students learn to identify, assess, and control the risks of distributed denial of service (DDoS) attacks in a real-world... -
HBR Insights Future of Business Boxed Set (8 Books)
165.00View Details Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future... -
Cybersecurity: Tools for Preparing Your Team for the Future
99.95View Details No data is completely safe. Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you... -
PharmaCo: Inject 1-Ransomware
Strategy & Execution Case Study5.00View Details Supplement to case W20218 -
Customer Data and Privacy: Tools for Preparing Your Team for the Future
99.95View Details Collect data and build trust. With the rise of data science and machine learning, companies are awash in customer data and powerful new ways to gain insight...
-
A Cyberattack Doesn't Have to Sink Your Stock Price
Technology & Operations Digital ArticleHere's how to restore consumer and investor confidence. -
The Future of Warfare Is Here (with General Sir Richard Barrons)
Government AudioAs war returns to Europe, General Sir Richard Barrons’ warning about how technology is transforming conflict is more prescient than ever. -
Case Study: After a Crisis, Who Should Take the Fall?
Crisis management Magazine ArticleIn the wake of a security breach, the board demands a scapegoat. -
Ransomware Attacks Are Spiking. Is Your Company Prepared?
Cybersecurity and digital privacy Digital ArticleThey’re up 150% in 2020 — and growing even faster in 2021. -
The Digital World Is Changing Rapidly. Your Cybersecurity Needs to Keep Up.
Technology & Operations Digital ArticleCompanies need to do more to understand when and how their software is failing. -
Blockchain Will Help Us Prove Our Identities in a Digital World
Technology & Operations Digital ArticleIt's already working in Estonia. -
The Role of Data in Platform Thinking
Management Digital ArticleDigital platforms have completely reshaped everyday life in the modern world; nevertheless, innovation leaders do not always understand the importance... -
The Digital-Piracy Dilemma
Technology & Operations Digital ArticleDo buzz and publicity outweigh the lost sales? - SPONSORED CONTENT FROM Mastercard
Balancing Digital Innovation and Customer Trust in the Middle East and Africa
Information management ResearchBriefing Paper Sponsored By Mastercard -
Ransomware Attack at Springhill Medical Center
Management Case Study11.95View Details In July, 2019, Springhill Medical Center ("SMC") in Mobile, Alabama fell prey to a malicious ransomware attack that crippled the hospital's internal network...