Filter Results
:
(36)
Show Results For
- All HBS Web (36)
- Faculty Publications (8)
Show Results For
- All HBS Web (36)
- Faculty Publications (8)
←
Page 2 of
36
Results
- Web
Transferring Data - Research Computing Services
or hand deliver (i.e., “Sneaker Net”) electronic data on a external portable storage device. This can included devices like flash drives. Note that if the data are Level 3 or higher, the external portable storage unit must be encrypted...
View Details
- Web
Tips for Working Remotely | Information Technology
device. Attackers are beginning to leverage vulnerabilities in social media apps (WhatsApp, Twitter) to access your entire phone. Secure devices with passcodes or passwords and enable encryption on all your devices. Make sure you've...
View Details
- 07 Jan 2015
- What Do You Think?
SUMMING UP: What Are the Limits On Workplace Transparency?
the Internet? How many of us have then received offers for products that we didn't yet know we needed? Organizational transparency today most often is associated with good management practice There is a movement afoot to thwart personal transparency. The market for...
View Details
Keywords:
by James Heskett
- 27 Jul 2019
- Op-Ed
Does Facebook's Business Model Threaten Our Elections?
with its Messenger, Instagram and WhatsApp acquisitions. This would create an encrypted messaging platform that would emphasize small groups over public content. While that may seem like a step towards privacy it may have the opposite...
View Details
Keywords:
by George Riedel
- 01 Dec 2020
- News
A New Approach to Contact Tracing
Bluetooth in Android and Apple smartphones to determine proximity between people, and thus assess their potential exposure to the coronavirus. A random ID attached to a user’s phone number generates temporary, encrypted IDs. When users’...
View Details
- 01 Aug 2002
- News
For Alumni Only: Breakthrough Insights Program Debuts
on Network Associates' efforts to market its encryption software algorithms globally, despite national security concerns raised by the U.S. government. By Tuesday afternoon, participants seemed to have settled back into the classroom...
View Details
Keywords:
Laura Singleton
- 28 May 2019
- News
Ask the Expert: In Security
implement security systems and services based on what they believe will work best for them and their customers, individual consumers should think carefully about several factors when considering a cloud-security provider: Does the service provider View Details
- 01 Dec 2000
- News
Everything Old Is New Again: The History of Technological Frontiers
noted that the United States has failed in its attempts to protect encryption techniques as a national military asset. Content remains the most difficult area to control and thus promises to be the enduring freedom of this new frontier....
View Details
- 07 Jun 2016
- First Look
June 7, 2016
iPhone 6S with enhanced security measures that enflamed a debate on privacy and public safety around the world. The iPhone 6S, amid a heightened concern for privacy following the 2013 revelation of clandestine U.S. surveillance programs, employed a default View Details
Keywords:
Sean Silverthorne
- 15 Oct 2001
- Op-Ed
Lessons from the Rubble
policies that reversed the government's historical control over encryption technologies, the complex formulas that allow Internet or cell phone users to scramble, or disguise, their communications. In the late 1990s, the Clinton...
View Details
Keywords:
by Debora L. Spar
- 13 Feb 2019
- News
We’re All Going to Get Hacked
perfect. Encryption is a common technology that we use for very important protection of information. It’s a very expensive computation. It takes a lot of computer power, a lot of electricity, and it creates a lot of heat, but computers...
View Details
- Web
Copying Files to/from the HBSGrid - Research Computing Services
Level 3 data must not be stored on user devices or portable media unless the device or media is encrypted. Level 4+ data must not be stored on user computing devices (i.e. laptops, smartphones, tablets), but may be stored on external View Details
- 04 Mar 2016
- Research & Ideas
Is E-commerce at Risk in Apple's Security Dispute with the FBI?
customers and their business. One of their main claims to fame, and what they focused on with tokenization and Apple Pay, is their ability to keep things secure by heavily encrypting the data passing through their devices and systems. If...
View Details
- 06 Apr 2016
- What Do You Think?
As Tim Cook, How Would You Tackle Apple's Next Challenge?
(NRF) or encrypted lightwaves. Time is a wasting. Lead or get out of the way.” Is product security a potential distraction for Apple’s leadership? What do you think? Original Column We’ve spent the last month discussing issues associated...
View Details
- 24 Apr 2020
- Op-Ed
Lessons from the NFL: Virtual Hiring, Leadership, Building Teams and COVID-19
Despite all this, the online draft will certainly not be the same. Apart from the lost entertainment value—NFL draft fashion has become a much-watched spectacle in recent years—there are concerns about potential technical challenges. The draft will be conducted via the...
View Details
- 10 Apr 2018
- First Look
First Look at New Research, April 10, 2018
Case 318-079 Apple: Privacy vs. Safety (B) This case supplements “Apple: Privacy vs. Safety (A),” covering select events in 2017, including a mass shooting in which U.S. law enforcement was not able to access the shooter’s encrypted...
View Details
Keywords:
Sean Silverthorne