Skip to Main Content
HBS Home
  • About
  • Academic Programs
  • Alumni
  • Faculty & Research
  • Baker Library
  • Giving
  • Harvard Business Review
  • Initiatives
  • News
  • Recruit
  • Map / Directions
Faculty & Research
  • Faculty
  • Research
  • Featured Topics
  • Academic Units
  • …→
  • Harvard Business School→
  • Faculty & Research→
  • Research
    • Research
    • Publications
    • Global Research Centers
    • Case Development
    • Initiatives & Projects
    • Research Services
    • Seminars & Conferences
    →
  • Publications→

Publications

Publications

Filter Results: (47) Arrow Down
Filter Results: (47) Arrow Down Arrow Up

Show Results For

  • All HBS Web  (130)
    • Faculty Publications  (47)

    Show Results For

    • All HBS Web  (130)
      • Faculty Publications  (47)

      CybersecurityRemove Cybersecurity →

      ← Page 3 of 47 Results

      Are you looking for?

      →Search All HBS Web
      • September 2017 (Revised July 2018)
      • Case

      CyberArk: Protecting the Keys to the IT Kingdom

      By: Raffaella Sadun, David Yoffie and Margot Eiran
      CyberArk was the recognized leader in the Privileged Account Management (PAM) space, a cybersecurity subsegment it had essentially created to secure organizations’ IT systems and sensitive data. Over 17 years, the Israeli company had grown to a market capitalization of... View Details
      Keywords: Strategy; Growth and Development Strategy; Organizational Culture; Competitive Advantage; Information Technology; Cybersecurity; Information Technology Industry; Israel; United States
      Citation
      Educators
      Purchase
      Related
      Sadun, Raffaella, David Yoffie, and Margot Eiran. "CyberArk: Protecting the Keys to the IT Kingdom." Harvard Business School Case 718-418, September 2017. (Revised July 2018.)
      • February 2017 (Revised May 2017)
      • Case

      Rapid7

      By: Mitchell Weiss, Paul Gompers and Silpa Kovvali
      That Corey Thomas, vice president at Boston-based Rapid7, Inc., was about to enter his investor’s boardroom to negotiate a potential acquisition of Metasploit, LLC, was already an unlikely achievement of sorts. After all, Rapid7 was a venture-backed, corporate... View Details
      Keywords: Acquisition; Computer Hacking; Open-source; Corey Thomas; Rapid7; Exploit Testing; Mergers and Acquisitions; Cybersecurity; Computer Industry; North and Central America; Boston
      Citation
      Educators
      Purchase
      Related
      Weiss, Mitchell, Paul Gompers, and Silpa Kovvali. "Rapid7." Harvard Business School Case 817-077, February 2017. (Revised May 2017.)
      • Article

      Why Boards Aren't Dealing with Cyberthreats

      By: J. Yo-Jud Cheng and Boris Groysberg
      Keywords: Board Of Directors; Cybersecurity; Corporate Governance; AI and Machine Learning
      Citation
      Register to Read
      Related
      Cheng, J. Yo-Jud, and Boris Groysberg. "Why Boards Aren't Dealing with Cyberthreats." Harvard Business Review (website) (February 22, 2017). (Excerpt featured in the Harvard Business Review. May–June 2017 "Idea Watch" section.)
      • September 2016
      • Case

      Hewlett Packard Enterprise: The Dandelion Program

      By: Gary P. Pisano and Robert D. Austin
      This case describes Hewlett Packard Enterprise’s “Dandelion Program," which has developed a new service offering for the company’s clients by drawing on the special talents of people with autism. The company has deployed “pods” organized around 8 or 9 employees with... View Details
      Keywords: Organizational Behavior; Information Technology; Organizational Change and Adaptation; Leadership; Talent and Talent Management; Service Operations; Training; Diversity; Innovation and Invention; Technology Industry
      Citation
      Educators
      Purchase
      Related
      Pisano, Gary P., and Robert D. Austin. "Hewlett Packard Enterprise: The Dandelion Program." Harvard Business School Case 617-016, September 2016.
      • July 16, 2015
      • Article

      How Small Businesses Can Fend Off Hackers

      By: Lou Shipley
      If you wanted to hack a business, which one would you pick: A Fortune 500 company with a large digital-security budget and a team dedicated to protecting its cyberassets? Or a small enterprise that doesn’t employ a single IT security specialist? Security breaches at... View Details
      Keywords: Hack; Data Security; Small Business; Analytics and Data Science; Safety; Information Technology; Cybersecurity
      Citation
      Register to Read
      Related
      Shipley, Lou. "How Small Businesses Can Fend Off Hackers." Wall Street Journal (July 16, 2015).
      • 2014
      • Chapter

      Better Timing of Cyber Conflict

      By: Elisabeth Paulson and Christopher Griffin
      In this paper, we construct a model of cyber-weapon deployment and attempt to determine an optimal deployment time for cyberweapons using this model. We compare and contrast our approach to that in Axelrod and Iliev (R. Axelrod and R. Iliev. Timing of cyber conflict.... View Details
      Keywords: Cyber-weapons; Cyberwarfare; Cybersecurity; National Security
      Citation
      Read Now
      Related
      Paulson, Elisabeth, and Christopher Griffin. "Better Timing of Cyber Conflict." In Proceedings of the Third ASE International Conference on Cyber Security. Los Angeles, CA: Academy of Science and Engineering, 2014.
      • Forthcoming
      • Book

      Blockchain Forensics and Crypto-Related Cybercrimes

      By: Lin William Cong, Kim Grauer, Daniel Rabetti and Henry Updegrave
      This handbook provides an overview of various criminal activities related to cryptocurrencies, including investment scams, Ponzi schemes, rug pulls, ransomware attacks, money laundering, and darknet markets. We discuss the need for user protection and education,... View Details
      Keywords: Cyberattacks; Blockchain; Network; Cryptocurrency; Crime and Corruption; Cybersecurity; Governing Rules, Regulations, and Reforms; Law Enforcement; Technology Adoption
      Citation
      SSRN
      Related
      Cong, Lin William, Kim Grauer, Daniel Rabetti, and Henry Updegrave. Blockchain Forensics and Crypto-Related Cybercrimes. World Scientific Publishing, forthcoming.
      • ←
      • 1
      • 2
      • 3

      Are you looking for?

      →Search All HBS Web
      ǁ
      Campus Map
      Harvard Business School
      Soldiers Field
      Boston, MA 02163
      →Map & Directions
      →More Contact Information
      • Make a Gift
      • Site Map
      • Jobs
      • Harvard University
      • Trademarks
      • Policies
      • Accessibility
      • Digital Accessibility
      Copyright © President & Fellows of Harvard College.