-
4 Areas of Cyber Risk That Boards Need to Address
Technology & Operations Digital ArticleHow companies can build a long-term strategy that will keep them secure. -
8 Questions About Using AI Responsibly, Answered, Chinese Version
Technology & Operations Big IdeaGenerative AI tools are poised to change the way every business operates. As your own organization begins strategizing which to use, and how, operational... -
The New Risks ChatGPT Poses to Cybersecurity
Cybersecurity and digital privacy Digital ArticleNow is the time for private- and public-sector leaders to step up. -
AI Regulation Is Coming
Technology & Operations Magazine ArticleFor years public concern about technological risk has focused on the misuse of personal data. But as firms embed more and more artificial intelligence... -
How to Avoid the Ethical Nightmares of Emerging Technology
Technology & Operations Big IdeaNext-generation technologies are poised to cause society-shaking shifts at unprecedented speed and scale. Generative AI, quantum computing, blockchain,... -
The Devastating Business Impacts of a Cyber Breach
Technology & Operations Digital ArticleNo company can afford to underestimate the long-term financial costs. -
Where Is Tech Going in 2023?
AI and machine learning Digital ArticleSix trends that will define the next year, according to McKinsey experts. -
Customer Data: Designing for Transparency and Trust
Analytics and data science Magazine ArticleDon’t sacrifice long-term goodwill for short-term benefits. -
Boards Are Having the Wrong Conversations About Cybersecurity
IT management Digital ArticleA survey of 600 directors suggests that growing awareness of cyber risk isn’t enough to drive better preparedness. -
How to Keep Cyberattacks from Tanking Your Balance Sheet
Cybersecurity and digital privacy Digital ArticleThe average cost of a data breach reached $4.35 million in 2022, according to IBM’s Cost of a Data Breach Report in 2022. -
A New Gold Standard for Digital Ad Measurement?, Chinese Version
Technology & Operations Digital ArticleAs the digital ad measurement landscape changes, companies should consider marketing mix models calibrated with ad experiments. -
Human Error Drives Most Cyber Incidents. Could AI Help?
Technology & Operations Digital ArticleThe pros and cons of relying on machine intelligence to de-risk human behavior. -
AI Prompt Engineering Isn't the Future
Technology & Operations Digital ArticleAsking the perfect question is less important than really understanding the problem you're trying to solve. -
What Do We Know About False News?
Web-based technologies Big IdeaA roundup of the latest thinking -
What? Me, Worry?
Intellectual property Magazine ArticleMost executives think they’re security conscious—they change their passwords and shred important documents and so forth. But what rarely crosses their minds, says espionage expert H. Keith Melton, is that cloak-and-dagger types really are after their valuables. Just because you’re not paranoid, he observes, doesn’t mean they’re not following you. Melton, the author of Ultimate […] -
The Digital World Is Changing Rapidly. Your Cybersecurity Needs to Keep Up.
Technology & Operations Digital ArticleCompanies need to do more to understand when and how their software is failing. -
A Tool to Help Boards Measure Cyber Resilience
Technology & Operations Digital ArticleProper oversight starts with gathering the right information. -
How We All Can Fight Misinformation
Web-based technologies Big IdeaEveryone needs to take action. -
How to Curate Your Digital Persona
Organizational Development Digital ArticleYour public data tells a story. Is it telling the right one? -
Cybersecurity's Human Factor: Lessons from the Pentagon
Strategy & Execution Magazine ArticleWith cyberattacks soaring, corporations must step up efforts to protect their IT networks. Most firms could learn from the U.S. military, which has been...
-
Cloud Syzygy Technologies: Cloud-Based Computing
Technology & Operations Case Study8.95View Details The president of Cloud Syzygy Technologies (CST) had recently returned from the Pacific Telecommunications Council conference, where he discussed ways... -
A Leader's Guide to Cybersecurity: Why Boards Need to Lead--and How to Do It
Cybersecurity threats are on the rise. As a leader, you need to be prepared to keep your organization safe. Companies are investing an unprecedented amount... -
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy Epilogue
Technology & Operations Case Study5.00View Details This epilogue accompanies case 2029.0. In 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components... -
The Year in Tech, 2024: The Insights You Need from Harvard Business Review
22.95View Details A year of HBR's essential thinking on tech--all in one place. Generative AI, Web3, neurotech, reusable rockets to power the space economy--new technologies... -
The Year in Tech, 2022: The Insights You Need from Harvard Business Review
22.95View Details A year of HBR's essential thinking on tech--all in one place. From quantum computing and next-generation digital health tools to virtual reality training... -
Cleveland Clinic Abu Dhabi
Organizational Development Case Study15.05View Details In 2006, the Cleveland Clinic and Mubadala Investment Company partnered with a bold ambition to deliver world class healthcare in the United Arab Emirates.... -
Data Privacy in Practice at LinkedIn
Management Case Study8.95View Details -
IPremier Co. (B): Denial of Service Attack
Technology & Operations Case Study5.00View Details Supplements the (A) case. -
The Year in Tech, 2023: The Insights You Need from Harvard Business Review
A year of HBR's essential thinking on tech--all in one place. Easy-to-use AI tools, contactless commerce, crypto for business, the mature metaverse--new... -
ChoicePoint (B)
Strategy & Execution Case Study5.00View Details Supplements the (A) case. -
iPremier (C): Denial of Service Attack (Graphic Novel Version)
Technology & Operations Case Study5.00View Details Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure... -
Security Breach at TJX
Technology & Operations Case Study8.95View Details The chief security officer of TJX Companies Inc. (TJX) faces a dilemma on his first day on the job. The company has discovered in December 2006, a computer... -
Atlanta Ransomware Attack (A)
Management Case Study8.95View Details This case describes the March 2018 Ransomware attack on the information technology (IT) systems of the city of Atlanta and the response by Mayor Keisha... -
Grupo Martica
Technology & Operations Case Study8.95View Details Grupo Martica commissions a computer security expert to conduct an audit of its systems, network, and processes. This audit reveals that Martica is quite... -
Chinese Online 2018-2020: Turnaround
Organizational Development Case Study8.95View Details Chinese Online (COL) was one of China's largest Chinese-language digital content distributor. Its offerings ranged from literature, audio, TV, film, and... -
Ransomware Attack at Springhill Medical Center, Spanish Version
Management Case Study15.05View Details In July, 2019, Springhill Medical Center ("SMC") in Mobile, Alabama fell prey to a malicious ransomware attack that crippled the hospital's internal network... -
Network Associates: Securing the Internet
Global Business Case Study8.95View Details Follows one company's path through the uncharted terrain of government regulation and the Internet. In March 1998, Network Associates announced it would... -
Ethical Machines: Your Concise Guide to Totally Unbiased, Transparent, and Respectful AI
30.00View Details What will you do when your AI misbehaves? The promise of artificial intelligence is automated decision-making at scale, but that means AI also automates... -
Cybersecurity (Reading Guide)
No data is completely safe. Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you... -
Ola Electric: Igniting Conversations on Privacy
Management Case Study8.95View Details In 2022, Ola Electric Mobility Private Limited (Ola Electric), a motor vehicle manufacturing company based in Bengaluru, India, was embroiled in a privacy...
-
4 Areas of Cyber Risk That Boards Need to Address
Technology & Operations Digital ArticleHow companies can build a long-term strategy that will keep them secure. -
8 Questions About Using AI Responsibly, Answered, Chinese Version
Technology & Operations Big IdeaGenerative AI tools are poised to change the way every business operates. As your own organization begins strategizing which to use, and how, operational... -
The New Risks ChatGPT Poses to Cybersecurity
Cybersecurity and digital privacy Digital ArticleNow is the time for private- and public-sector leaders to step up. -
AI Regulation Is Coming
Technology & Operations Magazine ArticleFor years public concern about technological risk has focused on the misuse of personal data. But as firms embed more and more artificial intelligence... -
How to Avoid the Ethical Nightmares of Emerging Technology
Technology & Operations Big IdeaNext-generation technologies are poised to cause society-shaking shifts at unprecedented speed and scale. Generative AI, quantum computing, blockchain,... -
The Devastating Business Impacts of a Cyber Breach
Technology & Operations Digital ArticleNo company can afford to underestimate the long-term financial costs. -
Where Is Tech Going in 2023?
AI and machine learning Digital ArticleSix trends that will define the next year, according to McKinsey experts. -
Customer Data: Designing for Transparency and Trust
Analytics and data science Magazine ArticleDon’t sacrifice long-term goodwill for short-term benefits. -
Boards Are Having the Wrong Conversations About Cybersecurity
IT management Digital ArticleA survey of 600 directors suggests that growing awareness of cyber risk isn’t enough to drive better preparedness. -
How to Keep Cyberattacks from Tanking Your Balance Sheet
Cybersecurity and digital privacy Digital ArticleThe average cost of a data breach reached $4.35 million in 2022, according to IBM’s Cost of a Data Breach Report in 2022.