-
Using VoIP to Compete
Innovation Magazine ArticleSince Alexander Graham Bell’s day, businesses have bought telephone services the same way they’ve purchased electricity, janitorial functions, and water for the cooler—as packaged offerings defined by an outside provider. Sure, companies could choose from a menu of configuration options and service plans, but, in the end, the phone company or vendor called the shots. […] -
Where to Focus Your Company's Limited Cybersecurity Budget
Technology & Operations Digital ArticleThree cybersecurity investments to target. -
The Crucial Role of ID Verification in the Digital Economy
Technology and analytics Digital ArticleHow the technology could expand opportunities for millions of people and make the digital economy more dynamic, inclusive, and secure. -
To Regain Consumers' Trust, Marketers Need Transparent Data Practices
Technology & Operations Digital ArticleA trusting relationship between customer and business is essential. -
Say Goodbye to Cookies
Technology and analytics Digital ArticleZero-party data yields better insights — and offers consumers more control. -
6 Actions CEOs Must Take During a Cyberattack
Technology & Operations Digital ArticleLessons from the Colonial Pipeline ransomware attack. -
We Googled You
Labor Magazine ArticleHathaway Jones’s CEO has found a promising candidate to open the company’s flagship store in Shanghai. Should a revelation on the Internet disqualify her now? -
Design Your Organization to Withstand Future Disasters
Leadership & Managing People Digital ArticleThe threats we face - to life, business continuity, property, and reputation - will not end as our masks come off. -
The AI Transparency Paradox
Strategy & Execution Digital ArticleTransparency helps fight algorithmic bias. But it also leaves organizations vulnerable to cyber attacks. -
New Cybersecurity Regulations Are Coming. Here’s How to Prepare.
Technology and analytics Digital ArticleDon’t wait to assess the potential impact on your organization. -
Companies Need to Rethink What Cybersecurity Leadership Is
Cybersecurity and digital privacy Digital ArticleA framework for boards and C-suite executives. -
Sizing Up Your Cyberrisks
Strategy & Execution Magazine ArticleEvery year the damage done by cyberbreaches seems to grow bigger. It looks as if hackers just keep getting more effective. But cybersecurity experts Parenty... -
The Dark Side of Customer Analytics
Business ethics Magazine ArticleAn insurance company finds some intriguing patterns in the loyalty card data it bought from a grocery chain—the correlation between condom sales and HIV-related claims, for instance. How can both companies leverage the data responsibly? -
Cyber Risk Is Growing. Here’s How Companies Can Keep Up
Cybersecurity and digital privacy Digital ArticleLeaders must fundamentally rethink how they measure cybersecurity performance. -
Most Companies Can't Handle Cybersecurity Alone
Technology & Operations Digital ArticleFew organizations have the right tools, people, infrastructure, and processes to protect themselves. -
The Flaws in Obama's Cybersecurity Initiative
Technology & Operations Digital ArticleA global problem requires a global solution. -
Saving the Internet
Innovation Magazine ArticleCyberspace can be made safer from the chaos and crime that threaten to overwhelm it. But most recipes for security and order come at a very steep price: the loss of the Internet’s creative potency. -
How Facebook’s Annual “Hacktober” Campaign Promotes Cybersecurity to Employees
Cybersecurity and digital privacy Digital ArticleWith a month of security competitions, games, and T-shirts. -
Navigating Cybersecurity Risks in International Trade
Technology & Operations Digital ArticleRules - and anxieties - vary from country to country. -
How to Keep Cyberattacks from Tanking Your Balance Sheet
Cybersecurity and digital privacy Digital ArticleThe average cost of a data breach reached $4.35 million in 2022, according to IBM’s Cost of a Data Breach Report in 2022.
-
How One Major Healthcare Firm Became the Leader in Innovative AI Use
AI and machine learning Digital ArticleInterviews with the Blue Cross Blue Shield of Michigan management team identified seven principles that guided their actions. -
When Cyberattacks Are Inevitable, Focus on Cyber Resilience
Cybersecurity and digital privacy Digital ArticlePreparing for an attack that breaches your defenses is the best way to minimize the damage it can do. -
AI Will Increase the Quantity — and Quality — of Phishing Scams
AI and machine learning Digital ArticleHow businesses can prepare now. -
Preventing the Next Big Cyberattack on U.S. Health Care
Cybersecurity and digital privacy Digital ArticleFive actions that can help avoid a repeat of the Change Healthcare debacle. -
Preventing Ransomware Attacks at Scale
Cybersecurity and digital privacy Digital ArticleDesigning software that’s resilient against the most common cyberattacks is possible — and significantly more cost effective than dealing with the fallout of a hack. -
Bring Human Values to AI
AI and machine learning Magazine ArticleSpeed and efficiency used to be the priority. Now issues such as safety and privacy matter too. -
Why Data Breaches Spiked in 2023
Risk management Digital ArticleAnd what companies can do to better secure users’ personal information. -
How Data Collaboration Platforms Can Help Companies Build Better AI
AI and machine learning Digital ArticleThese platforms can be used to address data quality, problematic bias, and privacy concerns. -
6 Ways AI Could Disrupt Your Business
AI and machine learning Digital ArticleAsk these questions now to plan for the challenges ahead. -
How to Vet a Corporate Intelligence Vendor
Business management Digital ArticleFour questions to help ensure a prospective partner aligns with your company’s needs, risk tolerance, and ethics. -
A Practical Guide for Marketers Who Want to Use GenAI
AI and machine learning Digital ArticleUnderstanding the risks, rewards, and how to get started. -
How Leaders Can Be Stewards of “Good Tech”
AI and machine learning Digital ArticleFormer IBM CEO Ginni Rometty on driving positive, meaningful change for individuals, our organizations, and our world. -
How Leading Consultancies Can Better Manage AI Risk
Technology and analytics Digital ArticleEight steps to navigate this new technological landscape strategically and ethically. -
It’s Time for Boards to Take AI Seriously
AI and machine learning Digital ArticleFocus on five guiding principles. -
How to Capitalize on Generative AI
AI and machine learning SpotlightA guide to realizing its benefits while limiting its risks -
What's Your Gen AI Strategy?
Management Digital ArticleArtificial intelligence is arguably one of our generation's most transformative technological advancements, and its applications in business are wide-ranging... -
A Tool to Help Boards Measure Cyber Resilience
Cybersecurity and digital privacy Digital ArticleProper oversight starts with gathering the right information. -
The Crucial Role of ID Verification in the Digital Economy
Technology and analytics Digital ArticleHow the technology could expand opportunities for millions of people and make the digital economy more dynamic, inclusive, and secure. -
6 Actions CEOs Must Take During a Cyberattack
Cybersecurity and digital privacy Digital ArticleLessons from the Colonial Pipeline ransomware attack. -
How the Best Chief Data Officers Create Value
Technology and analytics Digital ArticleCDOs need to focus on four spheres of influence.
-
23andMe: Which Business Model(s)?
Management Case Study11.95View Details In June 2021, 23andMe completed their IPO with the VG Acquisition Corp, a special-purpose acquisition company. Due to the COVID-19 pandemic, there was... -
IPremier Co. (B): Denial of Service Attack
Technology & Operations Case Study5.00View Details Supplements the (A) case. -
Cleveland Clinic Abu Dhabi (Abridged)
Organizational Development Case Study11.95View Details In 2006, the Cleveland Clinic and Mubadala Investment Company partnered with a bold ambition to deliver world class healthcare in the United Arab Emirates.... -
PharmaCo: Inject 1-Ransomware
Strategy & Execution Case Study5.00View Details Supplement to case W20218 -
ChoicePoint (A)
Strategy & Execution Case Study11.95View Details The CEO of ChoicePoint, a leading company in the rapidly growing U.S. personal data industry, must reexamine the company's business model after a serious... -
Cyber Breach at Target
Leadership & Managing People Case Study11.95View Details In November and December of 2013, Target Corporation suffered one of the largest cyber breaches till date. The breach that occurred during the busy holiday... -
The Year in Tech, 2022: The Insights You Need from Harvard Business Review
22.95View Details A year of HBR's essential thinking on tech--all in one place. From quantum computing and next-generation digital health tools to virtual reality training... -
A Leader's Guide to Cybersecurity: Why Boards Need to Lead--and How to Do It
35.00View Details Cybersecurity threats are on the rise. As a leader, you need to be prepared to keep your organization safe. Companies are investing an unprecedented amount... -
iPremier (B): Denial of Service Attack (Graphic Novel Version)
Technology & Operations Case Study5.00View Details Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure... -
BuyHive: A Digital Platform for the Transformation of Global Sourcing
Strategy & Execution Case Study11.95View Details The case focuses on key decisions facing a startup venture BuyHive, that is on the cusp of disintermediating the sourcing business with a new business... -
Atlanta Ransomware Attack (B)
Management Case Study5.00View Details This case describes the March 2018 Ransomware attack on the information technology (IT) systems of the city of Atlanta and the response by Mayor Keisha... -
Network Associates: Securing the Internet
Global Business Case Study11.95View Details Follows one company's path through the uncharted terrain of government regulation and the Internet. In March 1998, Network Associates announced it would... -
Alexa: A Pandora's Box of Risks
Strategy & Execution Case Study11.95View Details Launched in 2014, Amazon's Echo and Echo Dot smart speakers led the category's rapid adoption by households and enabled the penetration of artificial... -
HBR Insights Future of Business Boxed Set (8 Books)
165.00View Details Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future... -
PharmaCo: Inject 4-Large Breach and Phi Theft
Strategy & Execution Case Study5.00View Details Supplement to case W20218 -
The Year in Tech, 2023: The Insights You Need from Harvard Business Review
22.95View Details A year of HBR's essential thinking on tech--all in one place. Easy-to-use AI tools, contactless commerce, crypto for business, the mature metaverse--new... -
PharmaCo: Inject 5-Malware Infection
Strategy & Execution Case Study5.00View Details Supplement to case W20218 -
The Year in Tech, 2024: The Insights You Need from Harvard Business Review
22.95View Details A year of HBR's essential thinking on tech--all in one place. Generative AI, Web3, neurotech, reusable rockets to power the space economy--new technologies... -
Cybersecurity: The Insights You Need from Harvard Business Review
22.95View Details No data is completely safe. Cyberattacks on companies and individuals are on the rise and growing not only in number but also in ferocity. And while you... -
IPremier Co. (C): Denial of Service Attack
Technology & Operations Case Study5.00View Details Supplements the (A) case.
-
Using VoIP to Compete
Innovation Magazine ArticleSince Alexander Graham Bell’s day, businesses have bought telephone services the same way they’ve purchased electricity, janitorial functions, and water for the cooler—as packaged offerings defined by an outside provider. Sure, companies could choose from a menu of configuration options and service plans, but, in the end, the phone company or vendor called the shots. […] -
Where to Focus Your Company's Limited Cybersecurity Budget
Technology & Operations Digital ArticleThree cybersecurity investments to target. -
The Crucial Role of ID Verification in the Digital Economy
Technology and analytics Digital ArticleHow the technology could expand opportunities for millions of people and make the digital economy more dynamic, inclusive, and secure. -
To Regain Consumers' Trust, Marketers Need Transparent Data Practices
Technology & Operations Digital ArticleA trusting relationship between customer and business is essential. -
Say Goodbye to Cookies
Technology and analytics Digital ArticleZero-party data yields better insights — and offers consumers more control. -
6 Actions CEOs Must Take During a Cyberattack
Technology & Operations Digital ArticleLessons from the Colonial Pipeline ransomware attack. -
Use Open Source for Safer Generative AI Experiments
Management Digital ArticleThe public availability of generative AI models, particularly large language models (LLMs), has led many employees to experiment with new use cases, but... -
We Googled You
Labor Magazine ArticleHathaway Jones’s CEO has found a promising candidate to open the company’s flagship store in Shanghai. Should a revelation on the Internet disqualify her now? -
Design Your Organization to Withstand Future Disasters
Leadership & Managing People Digital ArticleThe threats we face - to life, business continuity, property, and reputation - will not end as our masks come off.