Filter Results:
(68)
Show Results For
- All HBS Web
(130)
- News (30)
- Research (68)
- Multimedia (2)
- Faculty Publications (64)
Show Results For
- All HBS Web
(130)
- News (30)
- Research (68)
- Multimedia (2)
- Faculty Publications (64)
Sort by
- March 2022
- Article
How to Prioritize the Improvement of Open-Source Software Security
By: Frank Nagle
Nagle, Frank. "How to Prioritize the Improvement of Open-Source Software Security." Brookings TechStream (March 2022).
- 24 Apr 2023 - 27 Apr 2023
- Conference Presentation
Diversity, Equity, & Inclusion: The Paradoxical Effect & Impact on Security
By: J. Carlos Vega, Hise O. Gibson, Nicole Gilmore and Larry Whiteside Jr.
Diversity, Equity, & Inclusion (DEI) is necessary to create the world class teams we need to defend against advanced threats and adversaries; however, the approach that most take often fails spectacularly. The panel challenges the current practices, the failings, and... View Details
"Diversity, Equity, & Inclusion: The Paradoxical Effect & Impact on Security." Paper presented at the RSA Conference, San Francisco, CA, USA, April 24–27, 2023.
- September 19, 2017
- Article
After Equifax Breach, Companies Advised to Review Open-Source Software Code
By: Ben DiPietro and Lou Shipley
It doesn’t make much sense: At a time when high-powered automated trading systems can execute stock sales in real time, some companies that rely on open-source software to help to run their businesses track their open-source use on spread sheets on paper.
Lou... View Details
Lou... View Details
Keywords: Software; Open-source; Security Vulnerabilities; Data Privacy; Hack; Applications and Software; Safety; Cybersecurity
DiPietro, Ben, and Lou Shipley. "After Equifax Breach, Companies Advised to Review Open-Source Software Code." Wall Street Journal (September 19, 2017).
- October 2024
- Case
EU's Digital Services Act and Digital Markets Act
By: David B. Yoffie and Sarah von Bargen
Since the early 2020s, the EU began passing regulations on digital platforms and their marketplaces. One of the first was the Digital Services Act package, consisting of the Digital Services Act (DSA) and the Digital Markets Act (DMA). These regulations were focused on... View Details
Keywords: Digital Platforms; E-commerce; Governing Rules, Regulations, and Reforms; Cybersecurity; European Union
Yoffie, David B., and Sarah von Bargen. "EU's Digital Services Act and Digital Markets Act." Harvard Business School Case 725-372, October 2024.
- April 2019 (Revised June 2019)
- Case
Voatz
By: Mitchell Weiss and Maddy Halyard
Nimit Sawhney scrolled through the tweet stream on his phone, unsure of what to make of it on August 6, 2018 or how to respond. Voatz, the Boston-based startup he co-founded and led, provided a mobile-voting platform. In March of 2018, had successfully piloted the new... View Details
- October 2022 (Revised September 2023)
- Case
SolarWinds Confronts SUNBURST (A)
On December 12, 2020, SolarWinds learned that malware had been inserted in its software, potentially granting hackers access to thousands and thousands of its 300,000 customers. General Counsel Jason Bliss needed to orchestrate the company response without knowing how... View Details
Keywords: Cyberattacks; Cybersecurity; Corporate Disclosure; Crisis Management; Customer Focus and Relationships; Legal Liability; Information Technology Industry; United States
Nagle, Frank, George A. Riedel, William R. Kerr, and David Lane. "SolarWinds Confronts SUNBURST (A)." Harvard Business School Case 723-357, October 2022. (Revised September 2023.)
- March 2022
- Article
From Proprietary to Collective Governance: How Do Platform Participation Strategies Evolve?
By: Siobhan O'Mahony and Rebecca Karp
When platform leaders change the rules guiding who can access and control a platform, the strategies of those who create value from the platform can be upended. Little research examines how platform participants adapt their strategies when a platform leader changes the... View Details
Keywords: Platform Governance; Access; Crowdsourcing; Applications and Software; Employees; Leadership Style; Cybersecurity; Risk Management
O'Mahony, Siobhan, and Rebecca Karp. "From Proprietary to Collective Governance: How Do Platform Participation Strategies Evolve?" Strategic Management Journal 43, no. 3 (March 2022): 530–562.
- July 16, 2015
- Article
How Small Businesses Can Fend Off Hackers
By: Lou Shipley
If you wanted to hack a business, which one would you pick: A Fortune 500 company with a large digital-security budget and a team dedicated to protecting its cyberassets? Or a small enterprise that doesn’t employ a single IT security specialist? Security breaches at... View Details
Keywords: Hack; Data Security; Small Business; Analytics and Data Science; Safety; Information Technology; Cybersecurity
Shipley, Lou. "How Small Businesses Can Fend Off Hackers." Wall Street Journal (July 16, 2015).
- Forthcoming
- Book
Blockchain Forensics and Crypto-Related Cybercrimes
By: Lin William Cong, Kim Grauer, Daniel Rabetti and Henry Updegrave
This handbook provides an overview of various criminal activities related to cryptocurrencies, including investment scams, Ponzi schemes, rug pulls, ransomware attacks, money laundering, and darknet markets. We discuss the need for user protection and education,... View Details
Keywords: Cyberattacks; Blockchain; Network; Cryptocurrency; Crime and Corruption; Cybersecurity; Governing Rules, Regulations, and Reforms; Law Enforcement; Technology Adoption
Cong, Lin William, Kim Grauer, Daniel Rabetti, and Henry Updegrave. Blockchain Forensics and Crypto-Related Cybercrimes. World Scientific Publishing, forthcoming.
- May–June 2025
- Article
Balancing Digital Safety and Innovation
By: Tomomichi Amano and Tomomi Tanaka
Designers of consumer-facing digital products have tended to focus on novelty and speed (“move fast and break things”). They’ve spent more effort on innovating than on anticipating how customers—and bad actors—might engage with products. But as digital products become... View Details
Amano, Tomomichi, and Tomomi Tanaka. "Balancing Digital Safety and Innovation." Harvard Business Review 103, no. 3 (May–June 2025): 120–127.
- October 2018
- Case
Fundraising at St. Camillus Hospital
By: Srikant M. Datar and Caitlin N. Bowler
St. Camillus is a fictional non-profit hospital in rural Maine facing a serious budget deficit. As Director of Marketing, Victoria Stern is building a team to modernize the hospital fundraising efforts. An interview with a promising candidate, who is also a digital... View Details
Keywords: Data Analysis; Data Privacy; Data Governance; Non-profit; Health Care; Fundraising; Data Security; Analytics and Data Science; Safety; Governance; Ethics; Health Care and Treatment; Cybersecurity
Datar, Srikant M., and Caitlin N. Bowler. "Fundraising at St. Camillus Hospital." Harvard Business School Case 119-027, October 2018.
- April 29, 2020
- Article
The Case for AI Insurance
By: Ram Shankar Siva Kumar and Frank Nagle
When organizations place machine learning systems at the center of their businesses, they introduce the risk of failures that could lead to a data breach, brand damage, property damage, business interruption, and in some cases, bodily harm. Even when companies are... View Details
Keywords: Artificial Intelligence; Machine Learning; Internet and the Web; Safety; Insurance; AI and Machine Learning; Cybersecurity
Kumar, Ram Shankar Siva, and Frank Nagle. "The Case for AI Insurance." Harvard Business Review Digital Articles (April 29, 2020).
- 2023
- Working Paper
Black-box Training Data Identification in GANs via Detector Networks
By: Lukman Olagoke, Salil Vadhan and Seth Neel
Since their inception Generative Adversarial Networks (GANs) have been popular generative models across images, audio, video, and tabular data. In this paper we study whether given access to a trained GAN, as well as fresh samples from the underlying distribution, if... View Details
Olagoke, Lukman, Salil Vadhan, and Seth Neel. "Black-box Training Data Identification in GANs via Detector Networks." Working Paper, October 2023.
- 2021
- Article
Evidence of Decreasing Internet Entropy: The Lack of Redundancy in DNS Resolution by Major Websites and Services
By: Samantha Bates, John Bowers, Shane Greenstein, Jordi Weinstock, Jonathan Zittrain and Yunhan Xu
This paper analyzes the extent to which the Internet’s global domain name resolution (DNS) system has preserved its distributed resilience given the rise of cloud-based hosting and infrastructure. We explore trends in the concentration of the DNS space since at least... View Details
Keywords: Domain Name System; Resilience; Entropy; Internet and the Web; Infrastructure; Performance Effectiveness; Safety; Cybersecurity
Bates, Samantha, John Bowers, Shane Greenstein, Jordi Weinstock, Jonathan Zittrain, and Yunhan Xu. "Evidence of Decreasing Internet Entropy: The Lack of Redundancy in DNS Resolution by Major Websites and Services." Journal of Quantitative Description: Digital Media 1 (2021).
- 2013
- Chapter
Privacy Breach Analysis in Social Networks
By: Frank Nagle
Over the past 5–10 years, online social networks have rapidly expanded, and as of March 2012 the largest online social network, Facebook, had over 901 million active members. The wealth of information users post in their social network profiles, as well as the... View Details
Keywords: Crime and Corruption; Social and Collaborative Networks; Social Media; Cybersecurity; Analytics and Data Science
Nagle, Frank. "Privacy Breach Analysis in Social Networks." In Mining Social Networks and Security Informatics, edited by Tansel Ozyer, Zeki Erdem, Jon Rokne, and Suheil Khoury, 63–77. Springer Science + Business Media, 2013.
- November 2023
- Article
Federated Electronic Health Records for the European Health Data Space
By: René Raab, Arne Küderle, Anastasiya Zakreuskaya, Ariel Dora Stern, Jochen Klucken, Georgios Kaissis, Daniel Rueckert, Susanne Boll, Roland Eils, Harald Wagener and Bjoern Eskofier
The European Commission's draft for the European Health Data Space (EHDS) aims to empower citizens to access their personal health data and share it with physicians and other health-care providers. It further defines procedures for the secondary use of electronic... View Details
Keywords: Analytics and Data Science; Cybersecurity; Information Management; Knowledge Sharing; Knowledge Use and Leverage; Health Industry
Raab, René, Arne Küderle, Anastasiya Zakreuskaya, Ariel Dora Stern, Jochen Klucken, Georgios Kaissis, Daniel Rueckert, Susanne Boll, Roland Eils, Harald Wagener, and Bjoern Eskofier. "Federated Electronic Health Records for the European Health Data Space." Lancet Digital Health 5, no. 11 (November 2023): e840–e847.
- 13 Aug 2024
- Research & Ideas
Why Companies Shouldn't Delay Software Updates—Even After CrowdStrike's Flaw
software update to the Falcon security platform managed by CrowdStrike, the giant cybersecurity company. “What happened in CrowdStrike is an illustration of the risk of picking up an upgrade immediately.” Greenstein’s work focuses on... View Details
- 04 May 2020
- Research & Ideas
Predictions, Prophets, and Restarting Your Business
awareness of cybersecurity issues. Combined with the ability to block ads, the growing costs of acquiring customers online, the experience of “Zoombombing,” and controls on consumer data by EU regulators and others, it’s unclear how much... View Details
Keywords: by Frank V. Cespedes
- September 2, 2021
- Article
The Digital Economy Runs on Open Source. Here's How to Protect It.
By: Hila Lifshitz-Assaf and Frank Nagle
Free and open source software (FOSS) is essential to much of the tech we use every day—from cars to phones to planes to the cloud. While traditionally, it was developed by an army of volunteer developers and given away for free, companies are increasingly taking a more... View Details
Keywords: Free And Open-source Software; FOSS; Open Source Distribution; Applications and Software; Collaborative Innovation and Invention; Organizations; Policy; Cybersecurity
Lifshitz-Assaf, Hila, and Frank Nagle. "The Digital Economy Runs on Open Source. Here's How to Protect It." Harvard Business Review Digital Articles (September 2, 2021).
- February 2024 (Revised May 2024)
- Case
Johnson Security Bureau: Building Multigenerational Success
By: Henry McGee, Annelena Lobb and David Muoser
Jessica Johnson-Cope, CEO of Johnson Security Bureau (JSB), pondered options for scaling the firm. JSB was the oldest Black-owned security firm in New York, and among the oldest Black-owned security firms in the United States. It provided mostly unarmed security guards... View Details
Keywords: Business Growth and Maturation; Gender; Race; Cybersecurity; Growth and Development Strategy; Competitive Strategy; Expansion; New York (state, US)
McGee, Henry, Annelena Lobb, and David Muoser. "Johnson Security Bureau: Building Multigenerational Success." Harvard Business School Case 824-040, February 2024. (Revised May 2024.)