Skip to Main Content
HBS Home
  • About
  • Academic Programs
  • Alumni
  • Faculty & Research
  • Baker Library
  • Giving
  • Harvard Business Review
  • Initiatives
  • News
  • Recruit
  • Map / Directions
Faculty & Research
  • Faculty
  • Research
  • Featured Topics
  • Academic Units
  • …→
  • Harvard Business School→
  • Faculty & Research→
  • Research
    • Research
    • Publications
    • Global Research Centers
    • Case Development
    • Initiatives & Projects
    • Research Services
    • Seminars & Conferences
    →
  • Publications→

Publications

Publications

Filter Results: (18) Arrow Down
Filter Results: (18) Arrow Down Arrow Up

Show Results For

  • All HBS Web  (18)
    • News  (7)
    • Research  (5)
    • Events  (1)
  • Faculty Publications  (3)

Show Results For

  • All HBS Web  (18)
    • News  (7)
    • Research  (5)
    • Events  (1)
  • Faculty Publications  (3)
Page 1 of 18 Results
  • 23 Sep 2016
  • News

Will Yahoo hack trigger better security checks?

  • 13 Feb 2019
  • News

We’re All Going to Get Hacked

evolving cyber threats. Rothrock lays out his solutions in his latest book, Digital Resilience: Is Your Company Ready for the Next Cyber Threat?, and we talk to him here about what that looks like in real terms—and why the C-suite should treat View Details
  • February 2017 (Revised May 2017)
  • Case

Rapid7

By: Mitchell Weiss, Paul Gompers and Silpa Kovvali
That Corey Thomas, vice president at Boston-based Rapid7, Inc., was about to enter his investor’s boardroom to negotiate a potential acquisition of Metasploit, LLC, was already an unlikely achievement of sorts. After all, Rapid7 was a venture-backed, corporate... View Details
Keywords: Acquisition; Computer Hacking; Open-source; Corey Thomas; Rapid7; Exploit Testing; Mergers and Acquisitions; Cybersecurity; Computer Industry; North and Central America; Boston
Citation
Educators
Purchase
Related
Weiss, Mitchell, Paul Gompers, and Silpa Kovvali. "Rapid7." Harvard Business School Case 817-077, February 2017. (Revised May 2017.)
  • 24 Feb 2016
  • HBS Seminar

David Brumley of Carnegie Mellon University

    Christina M. Wallace

    A self-described “human Venn diagram” Christina Wallace has crafted a career at the intersection of business, technology, and the arts. She is a Senior Lecturer in the Entrepreneurial Management Unit at Harvard Business... View Details

    Keywords: arts; venture capital industry; consumer products; service industry; internet
    • 07 Nov 2023
    • Research & Ideas

    When Glasses Land the Gig: Employers Still Choose Workers Who 'Look the Part'

    graphic designers, for instance, it is better to be female, and to have a high quality, professional-looking photo (with a small plus for glasses). Other hacks for programmers: Grow a beard and keep a View Details
    Keywords: by Scott Van Voorhis
    • Web

    Skydeck - Alumni

    Quantum computing has revolutionary potential, but it’s been stuck in the lab. John Levy (MBA 1979) thinks his startup has a way to make it an accessible superpower for business—and he is racing tech’s biggest names to make a... View Details
    • 22 Jul 2019
    • Book

    How to Be a Digital Platform Leader

    the solution. In prior writings, we called this strategy “coring.”5 There are several examples. In order to solve the problem of how to build an IBM-compatible personal computer during the 1980s, which IBM tried to control as a... View Details
    Keywords: by Martha Lagace
    • 06 Apr 2016
    • What Do You Think?

    As Tim Cook, How Would You Tackle Apple's Next Challenge?

    Summing Up--Is Product Security A Potential Distraction for Apple’s Leadership? The saga of Apple’s stand-off with the United States government over the Company’s refusal to assist the FBI in hacking its own iPhone product to aid in a... View Details
    Keywords: by James Heskett; Computer
    • 07 Sep 2016
    • What Do You Think?

    How Can the Threat of Networks Be Reduced?

    SUMMING UP Are Computers and Tech-Driven Networks In Their Twilight Years? Issues raised by the ascendancy of network technology are many and varied, judging from responses to this month’s column based on Joshua Cooper Ramo’s book, The... View Details
    Keywords: by James Heskett
    • Web

    Protecting Yourself Against Social Engineering | Information Technology

    act, you might be downloading a computer virus or malware. Email hacking and contact spamming It’s in our nature to pay attention to messages from people we know. And social engineers know this all too well,... View Details
    • 01 Jun 2003
    • News

    Up Against The Firewall

    else’s problem — until now. A phone call from the IT department reports that your company’s computer systems have been accessed by an intruder. Troves of business and financial data, your customers’ as well as your own, have been... View Details
    Keywords: Garry Emmons; Robert Austin; Computer Systems Design and Related Services; Computer Systems Design and Related Services; Computer Systems Design and Related Services
    • Web

    3 Technologies that Will Change the World - Course Catalog

    in the justice system and the industrialization of misinformation and hacking of elections. How can business leaders create great companies that enhance the value to society while earning a return for shareholders? Blockchain – Changing... View Details
    • 01 Jun 2016
    • News

    How Do We Win the Cyberwar?

    users control of other computers remotely is priced as low as $20. And business is booming. A PricewaterhouseCoopers survey found that global security incidents rose 38 percent in 2015—the biggest jump in the survey’s 12-year history.... View Details
    Keywords: Dan Morrell; illustrations by Victo Ngai
    • Profile

    Sebastian Vargas

    to take. Ultimately, it is up to you to embark on and complete the journey. As a kid, what did you want to be when you grew up? From an early age, I was good with computers and loved gadgets, so I wanted to be a software engineer. Growing... View Details
    • 01 Dec 2022
    • News

    Case Study: Your Call Is Important to Us

    Duncan for the company’s Hack Week competition, in which employees are invited to spend a week pursuing a passion project. Their idea for a personality-forward voice assistant won an award and, with it, some funding. “Seeing that Spotify... View Details
    Keywords: Computer Systems Design and Related Services; Computer Systems Design and Related Services
    • Person Page

    Media

    Media

    This lists media reports covering my firm dollarDEX Investments or me (or my colleagues), or columns written by me (or my colleagues). There are all... View Details

    • Web

    Print View - Course Catalog

    (TikTok), the misuse of AI in social contexts such as in the justice system and the industrialization of misinformation and hacking of elections. How can business leaders create great companies that enhance the value to society while... View Details
    • 1
    ǁ
    Campus Map
    Harvard Business School
    Soldiers Field
    Boston, MA 02163
    →Map & Directions
    →More Contact Information
    • Make a Gift
    • Site Map
    • Jobs
    • Harvard University
    • Trademarks
    • Policies
    • Accessibility
    • Digital Accessibility
    Copyright © President & Fellows of Harvard College.