-
Research: Gen AI Changes the Value Proposition of Foreign Remote Workers
Gestión de seguridad de la información Digital ArticleBut replacing U.S. workers with foreign talent isn’t as easy as supplying them with ChatGPT. -
What the 2024 CrowdStrike Glitch Can Teach Us About Cyber Risk
Gestão de Segurança de TI Digital ArticleEfforts to manage cyber risk must be transparent, structured, justifiable, and agile. - SPONSORED CONTENT FROM Broadcom
Unlocking the Value of Network Observability
IT management ResearchBriefing Paper Sponsored By Broadcom - SPONSORED CONTENT FROM Commvault
Cyber Resilience in a New Era of Rigorous Compliance Mandates
Cybersecurity and digital privacy ResearchBriefing Paper Sponsored By Commvault -
How to Red Team a Gen AI Model
Gestão de Segurança de TI Digital ArticleThe harms that generative AI systems create often differ from other forms of AI in both scope and scale. -
How the Cloud Is Changing Data Science
Analytics and data science Digital ArticleHere’s what leaders need to know in this shifting landscape. - SPONSOR CONTENT FROM AMAZON BUSINESS
Create Smart Business Buying Efficiencies With Integrations
Digital transformation Sponsor ContentSponsor content from Amazon Business. - SPONSOR CONTENT FROM MICROSOFT X AMD
Enhance Your Geo-Distributed Apps with Networking Services that Go the Distance
IT security management Sponsor ContentSponsor content from Microsoft x AMD. - SPONSORED CONTENT FROM Intel
The Strategic Importance of a PC Refresh
IT security management ResearchWhite Paper Sponsored By Intel -
What It Takes to Sell Cloud-Based Software to the U.S. Government
Cybersecurity and digital privacy Digital ArticleComplying with FedRAMP is worth the investment. -
Boards Are Having the Wrong Conversations About Cybersecurity
IT management Digital ArticleA survey of 600 directors suggests that growing awareness of cyber risk isn’t enough to drive better preparedness. -
Is Your Board Prepared for New Cybersecurity Regulations?
IT security management Digital ArticleA proposed SEC rule would require companies to disclose their cybersecurity governance capabilities. - SPONSORED CONTENT FROM Broadcom Software
Taming IT Complexity through Effective Strategies and Partnerships
Digital transformation ResearchResearch Report Sponsored By Broadcom Software -
Raytheon CEO Gregory Hayes: How Ukraine Has Highlighted Gaps in US Defense Technologies
Business and society Digital ArticleHow does a company that gets two million hack attempts each week think about security? -
What Russia’s Ongoing Cyberattacks in Ukraine Suggest About the Future of Cyber Warfare
Cybersecurity and digital privacy Digital ArticleAnd how organizations around the world can prepare -
7 Pressing Cybersecurity Questions Boards Need to Ask
IT security management Digital ArticleDon’t leave concerns about critical vulnerabilities for tomorrow. -
The Cybersecurity Risks of an Escalating Russia-Ukraine Conflict
Cybersecurity and digital privacy Digital ArticleNow is the time to revisit your business continuity plans. -
Quantum Computing for Business Leaders
Technology & Operations Magazine ArticleQuantum computers can solve problems exponentially faster than classical computers can. They will bring about two huge changes: an end to our current... -
Is Third-Party Software Leaving You Vulnerable to Cyberattacks?
Cybersecurity and digital privacy Digital ArticleThe SolarWinds hack highlights the importance of vetting your vendors. -
Cyberattacks Are Inevitable. Is Your Company Prepared?
Cybersecurity and digital privacy Digital ArticleThe first time you test your plan shouldn’t be during a crisis.
-
Mossack Fonseca: Panama Papers
Technology & Operations Case Study11.95View Details Mossack Fonseca, a Panama-based law firm, specializes in Corporate Law, fiduciary services, investment advice, and international business. In April 2016,... -
Hydropack India Pvt. Ltd.: Resolving a Data Breach
Technology & Operations Case Study11.95View Details In April 2018, Amit Darekar, director of operations at Hydropack India Pvt. Ltd. (Hydropack), was focused on revamping the company's information technology... -
HBR Insights Future of Business Boxed Set (8 Books)
165.00View Details Business is changing. Will you adapt or be left behind? Get up to speed and deepen your understanding of the topics that are shaping your company's future... -
Everybody Knows: Russia and the Election
Global Business Case Study11.95View Details Following a contentious presidential race, Donald Trump's 2016 election destabilized America's status quo. Academics, journalists, politicians and the... -
The Phoenix Project: Remediation of a Cybersecurity Crisis at the University of Virginia
Innovation & Entrepreneurship Case Study11.95View Details This case was designed to facilitate discussion of how a cyberattack was remediated by a major public university. Students are challenged to think through... -
PopVote: Assessing the Risk of DDoS (A)
Technology & Operations Case Study11.95View Details In this series of case studies, students learn to identify, assess, and control the risks of distributed denial of service (DDoS) attacks in a real-world... -
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy
Technology & Operations Case Study11.95View Details In 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components of widely used industrial control... -
iPremier (B): Denial of Service Attack (Graphic Novel Version)
Technology & Operations Case Study5.00View Details Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure... -
iPremier (C): Denial of Service Attack (Graphic Novel Version)
Technology & Operations Case Study5.00View Details Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure... -
iPremier (A): Denial of Service Attack (Graphic Novel Version)
Technology & Operations Case Study11.95View Details Describes an IT security crisis, and raises issues of risk management, preparation for crisis, management of crises, computer security, and public disclosure... -
Security Breach at TJX
Technology & Operations Case Study11.95View Details The chief security officer of TJX Companies Inc. (TJX) faces a dilemma on his first day on the job. The company has discovered in December 2006, a computer... -
Avalon Information Services, Inc.
Sales & Marketing Case Study11.95View Details The Privacy Review Committee of Avalon Information Services must decide how to deal with concerns voiced by its retail supermarket customers about the...