Filter Results
:
(110)
Show Results For
-
All HBS Web
(110)
- News (25)
- Research (55)
- Multimedia (2)
- Faculty Publications (51)
Show Results For
-
All HBS Web
(110)
- News (25)
- Research (55)
- Multimedia (2)
- Faculty Publications (51)
- Web
Past Issues - Alumni
of Contents June 2016 How Do We Win the Cyberwar? We’re losing the war against hackers, and it’s costing business billions. Alumni cybersecurity experts tell us how we can turn the tide 2016 Alumni Achievement Awards Reflections and...
View Details
- Web
Faculty & Advisors - MBA
at Microsoft and later Vice President at Parallels. Corey was elected to the Cyber Threat Alliance Board of Directors and the Massachusetts Cybersecurity Strategy Council and is a former Board Member at The Home for Little Wanderers in...
View Details
- 06 Sep 2022
- Blog Post
Student Spotlight: Summer Internships in Business & Environment
partnering with the best companies at the intersection of energy and technology to provide financial capital, industry expertise and commercialization support. Energize invests in software-based solutions spanning renewable energy, critical infrastructure, climate...
View Details
- April 2021
- Case
Transforming BlackBerry: From Smartphones to Software
By: Ranjay Gulati and Nicole Tempest Keller
On the verge of failure, BlackBerry brought in John Chen as CEO in 2013 to orchestrate a bold turnaround of the company. Once an iconic leader in the smartphone market, BlackBerry was best known for its tactile QWERTY keyboard, strong security, and a focus on business...
View Details
Keywords:
Pivot;
Managing Change;
Turnaround;
Smartphone;
Change Management;
Leading Change;
Transformation;
Organizational Change and Adaptation;
Digital Platforms;
Change;
Information Infrastructure;
Applications and Software;
Competitive Strategy;
Cybersecurity;
Technology Industry;
Transportation Industry;
Canada
Gulati, Ranjay, and Nicole Tempest Keller. "Transforming BlackBerry: From Smartphones to Software." Harvard Business School Case 421-052, April 2021.
- 01 Dec 2019
- News
Bridging the Gap
along on the cradle-to-career trajectory. Dubbed Project Blue Sky and scheduled to launch in 2021, it will condense a four-year bachelor’s degree in IT and cybersecurity into two years, combining coursework with an on-the-job...
View Details
- February 2023
- Case
Ransomware Attack at Springhill Medical Center
By: Suraj Srinivasan and Li-Kuan (Jason) Ni
In July, 2019, Springhill Medical Center (“SMC”) in Mobile, Alabama, fell prey to a malicious ransomware attack that crippled the hospital’s internal network systems and public-facing web page. While the hospital rushed to securely restore the network, medical...
View Details
Keywords:
Disruption;
Communication;
Communication Strategy;
Decision Making;
Decision Choices and Conditions;
Judgments;
Corporate Accountability;
Corporate Disclosure;
Corporate Governance;
Governance Controls;
Policy;
Employees;
News;
Cybersecurity;
Digital Strategy;
Information Infrastructure;
Information Management;
Internet and the Web;
Crisis Management;
Resource Allocation;
Risk Management;
Negotiation Tactics;
Failure;
Business and Stakeholder Relations;
Attitudes;
Behavior;
Perception;
Reputation;
Trust;
Public Opinion;
Social Issues;
Health Industry;
United States;
Alabama
Srinivasan, Suraj, and Li-Kuan (Jason) Ni. "Ransomware Attack at Springhill Medical Center." Harvard Business School Case 123-065, February 2023.
- 24 Feb 2020
- Research & Ideas
The Hidden Vulnerabilities of Open Source Software
industry and application security companies, including developer-first security company Snyk and the Synopsys Cybersecurity Research Center (SCRC), the Linux Foundation and LISH were able to combine private usage data with publicly...
View Details
- December 2023
- Case
TikTok: The Algorithm Will See You Now
By: Shikhar Ghosh and Shweta Bagai
In a world where attention is a scarce commodity, this case explores the meteoric rise of TikTok—an app that transformed from a niche platform for teens into the most visited domain by 2021—surpassing even Google. Its algorithm was a sophisticated mechanism for...
View Details
Keywords:
Social Media;
Applications and Software;
Disruptive Innovation;
Business and Government Relations;
International Relations;
Cybersecurity;
Culture;
Technology Industry;
China;
United States;
India
Ghosh, Shikhar, and Shweta Bagai. "TikTok: The Algorithm Will See You Now." Harvard Business School Case 824-125, December 2023.
- May 2022
- Case
TikTok and National Security: Investment in an Age of Data Sovereignty?
By: Jeremy Friedman, Sarah Bauerle Danzman and David Lane
This case covers TikTok’s purchase of Musical.ly and the reaction of the United States government, including the review of the purchase by the Committee on Foreign Investment in the United States (CFIUS) and the reaction of the presidential administration of Donald...
View Details
Keywords:
Data Security;
Mergers and Acquisitions;
Cybersecurity;
Internet and the Web;
International Relations;
Laws and Statutes;
Globalized Firms and Management
Friedman, Jeremy, Sarah Bauerle Danzman, and David Lane. "TikTok and National Security: Investment in an Age of Data Sovereignty?" Harvard Business School Case 722-020, May 2022.
- October 2022
- Background Note
Note on Cyberattacks and Regulatory Regimes
Describes common types of cyberattacks on enterprises and their costs, as well as the fragmentary regulatory regimes through which U.S. states and regulatory agencies at the start of 2021 attempted to encourage disclosure of cyberattacks and to pursue enforcement...
View Details
Keywords:
Regulations;
Regulatory Agencies;
Cyberattacks;
Governance;
Corporate Disclosure;
Cybersecurity;
Information Industry;
Information Technology Industry;
Health Industry;
Financial Services Industry;
United States
Nagle, Frank, George A. Riedel, William R. Kerr, and David Lane. "Note on Cyberattacks and Regulatory Regimes." Harvard Business School Background Note 723-392, October 2022.
- Web
Fraudulent Mobile Payment Alerts on the Rise | Information Technology
by calling the phone number on their website to verify the suspicious account activity. Never share personal account information over text or phone calls — legitimate institutions will not ask for you to provide passwords or account numbers. Would you like to receive...
View Details
- 01 Jun 2016
- News
How Do We Win the Cyberwar?
the threat, with analysts predicting it will grow to $170 billion by 2020. (In his proposed fiscal 2017 budget, President Obama requested a $5 billion increase in federal cybersecurity spending, up to $19 billion annually.) Money is one...
View Details
Keywords:
Dan Morrell; illustrations by Victo Ngai
- September 19, 2017
- Article
After Equifax Breach, Companies Advised to Review Open-Source Software Code
By: Ben DiPietro and Lou Shipley
It doesn’t make much sense: At a time when high-powered automated trading systems can execute stock sales in real time, some companies that rely on open-source software to help to run their businesses track their open-source use on spread sheets on paper.
Lou... View Details
Lou... View Details
Keywords:
Software;
Open-source;
Security Vulnerabilities;
Data Privacy;
Hack;
Applications and Software;
Safety;
Cybersecurity
DiPietro, Ben, and Lou Shipley. "After Equifax Breach, Companies Advised to Review Open-Source Software Code." Wall Street Journal (September 19, 2017).
- Career Coach
Austin Boral
(Founder), McKinsey & Company (Public & Social Sector Practice), New York City Economic Development Corporation (Strategy Department), Andrew Goodman Foundation (Board Member); Cybersecurity and Infrastructure Security Agency...
View Details
- 22 Sep 2017
- News
Turning a Disorder into an Opportunity
that are ideal for testing software as well as for working in cybersecurity and analytics. “These employees have found errors, faults, and gaps in IT systems that have gone undetected for years,” Fieldhouse says, adding Dandelion has been...
View Details
- 24 Apr 2023 - 27 Apr 2023
- Conference Presentation
Diversity, Equity, & Inclusion: The Paradoxical Effect & Impact on Security
By: J. Carlos Vega, Hise O. Gibson, Nicole Gilmore and Larry Whiteside Jr.
Diversity, Equity, & Inclusion (DEI) is necessary to create the world class teams we need to defend against advanced threats and adversaries; however, the approach that most take often fails spectacularly. The panel challenges the current practices, the failings, and...
View Details
"Diversity, Equity, & Inclusion: The Paradoxical Effect & Impact on Security." Paper presented at the RSA Conference, San Francisco, CA, USA, April 24–27, 2023.
- 05 Feb 2019
- News
Protecting the Power Grid
key component of solutions.” With increasing interdependence between the nation’s electric grid and the public internet, cybersecurity is gaining attention of both regulators and the public. “Foreign adversaries have regularly penetrated...
View Details
- Profile
Julio Cedeno
Julio met his wife, Sarah, at the university. After graduation, they moved to Houston where Julio began a six-year tenure with Chevron. Balancing act of work, marriage, and education Julio had interned with Chevron between his junior and senior years, contributing to...
View Details
Keywords:
Manufacturing/Energy
- October 2022 (Revised September 2023)
- Case
SolarWinds Confronts SUNBURST (A)
On December 12, 2020, SolarWinds learned that malware had been inserted in its software, potentially granting hackers access to thousands and thousands of its 300,000 customers. General Counsel Jason Bliss needed to orchestrate the company response without knowing how...
View Details
Keywords:
Cyberattacks;
Cybersecurity;
Corporate Disclosure;
Crisis Management;
Customer Focus and Relationships;
Legal Liability;
Information Technology Industry;
United States
Nagle, Frank, George A. Riedel, William R. Kerr, and David Lane. "SolarWinds Confronts SUNBURST (A)." Harvard Business School Case 723-357, October 2022. (Revised September 2023.)
- March 2022
- Article
From Proprietary to Collective Governance: How Do Platform Participation Strategies Evolve?
By: Siobhan O'Mahony and Rebecca Karp
When platform leaders change the rules guiding who can access and control a platform, the strategies of those who create value from the platform can be upended. Little research examines how platform participants adapt their strategies when a platform leader changes the...
View Details
Keywords:
Platform Governance;
Access;
Crowdsourcing;
Applications and Software;
Employees;
Leadership Style;
Cybersecurity;
Risk Management
O'Mahony, Siobhan, and Rebecca Karp. "From Proprietary to Collective Governance: How Do Platform Participation Strategies Evolve?" Strategic Management Journal 43, no. 3 (March 2022): 530–562.