This website uses technical, customisation and analytical cookies, both first-party and third-party, to anonymously facilitate browsing and analyse statistics on use of the website. Learn more
Catalog Advanced Search
13 items were found using the following search criteria
-
Mapping the Cyberwar Battlefield
Kodama, Matt; Ladd, BillArticle HBS-F1309Z-EStrategyEvery day, hackers use the global network to steal information and compromise businesses. Organizations today have to rethink their defenses and move from reaction to anticipation. In this Vision Statement, Matt Kodama and Bill Ladd of Recorded Future use semantic analysis to track where and when cyber-attacks happen, a method which could help companies predict and head off attacks more reliably. Due to the highly graphical nature of the Vision ...Starting at €8.20
-
The Danger from Within
Upton, David M.; Creese, SadieArticle HBS-R1409G-EStrategyThe 2013 cyberattack on Target is just one recent example of a growing phenomenon: attacks involving connected companies or direct employees. According to various estimates, at least 80 million of these attacks occur in the United States each year--but the number may be much higher, because they often go unreported. Upton and Creese head an international research project whose goal is to aid organizations in detecting and neutralizing threats fro...Starting at €8.20
-
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy
Narayanamurti, Venkatesh; Ellis, RyanCase HBS-KS1013-EInformation TechnologiesIn 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components of widely used industrial control systems. These new, previously unknown vulnerabilities-what are known as "zero-days"-were potentially very serious. Zero-day vulnerabilities are key components of computer viruses, worms, and other forms of malware. Vendors and security firms seek these flaws in order to patch and fix insecure so...Starting at €8.20
-
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy Epilogue
Narayanamurti, Venkatesh; Ellis, RyanCase HBS-KS1014-EInformation TechnologiesThis epilogue accompanies case 2029.0. In 2011, Dillon Beresford, a computer security expert, discovered a series of new vulnerabilities impacting components of widely used industrial control systems. These new previously unknown vulnerabilities-what are known as "zero-days"-were potentially very serious. Zero-day vulnerabilities are key components of computer viruses, worms, and other forms of malware. Vendors and security firms seek these flaws...Starting at €8.20
-
The Vulnerability Economy: Zero-Days, Cybersecurity, and Public Policy, Teaching Note
Narayanamurti, Venkatesh; Ellis, RyanTeaching Note HBS-KS1120-EInformation TechnologiesTeaching note for KS1013.Starting at €0.00
-
"They Burned the House Down"
Lynton, Michael; Ignatius, AdiArticle HBS-R1507J-EIn 2014 Sony Pictures Entertainment was subjected to the most devastating hack in corporate history. Highly sensitive data--salary details, private e-mails (some of them harshly critical of top Hollywood talent), unreleased movies--was leaked for all the world to see. For good measure, the hackers wiped out everything on Sony Pictures' servers. Then they threatened retaliation against any theaters that proceeded with the release of "The Interview...Starting at €8.20
-
Who Should Take the Fall (Commentary for HBR Case Study)
Seijts, JanaArticle HBS-R1507Z-EStrategyWhen a mobile-payment company is hacked, business slips. The board believes that having someone publicly take the fall will stabilize the situation, but the CEO feels that no one is really to blame. Should he offer to resign himself? Expert commentary comes from Cary Horenfeldt of MasterCard, Asia Pacific, and Kanina Blanchard of Opportunity Creation, a consultancy that focuses on crisis and issues management. For teaching purposes, this is the ...Starting at €8.20
-
Who Should Take the Fall (HBR Case Study)
Seijts, JanaArticle HBS-R1507X-EStrategyWhen a mobile-payment company is hacked, business slips. The board believes that having someone publicly take the fall will stabilize the situation, but the CEO feels that no one is really to blame. Should he offer to resign himself? Expert commentary comes from Cary Horenfeldt of MasterCard, Asia Pacific, and Kanina Blanchard of Opportunity Creation, a consultancy that focuses on crisis and issues management. For teaching purposes, this is the ...Starting at €8.20
-
Cybersecurity's Human Factor: Lessons from the Pentagon
Winnefeld, James A. Sandy; Kirchhoff, Christopher; Upton, David M.Article HBS-R1509G-EStrategyWith cyberattacks soaring, corporations must step up efforts to protect their IT networks. Most firms could learn from the U.S. military, which has been tightening its cyberdefenses for the past six years. In the past year alone, it adroitly repelled more than 30 million intrusions. A focus on reducing human error is core to the military's heightened security. As is true in the private sector, mistakes by administrators and users open the door to...Starting at €8.20
-
Cyber Breach at Target, Teaching Note
Srinivasan, Suraj; Paine, Lynn S.Teaching Note HBS-118073-ETeaching note for case 117027.Starting at €0.00