Security & Privacy
Building Cyber Resilience Before the Next Attack Occurs
Lessons and insights from past cyberattacks can help companies prepare and respond more successfully to future threats.
Lessons and insights from past cyberattacks can help companies prepare and respond more successfully to future threats.
Deciding whether to pay up when cybercriminals hold data hostage may depend on choices made long before an attack.
Using differential privacy to safeguard personal information when sharing data still requires a high level of expertise.
Strategists weigh in on how companies should respond to cyberattacks when their systems and data are on the line.
Leaders can take steps to shift their product development teams toward a mindset of designing for cybersecurity.
AI techniques can generate training data that retains the predictive power of real-world data.
Lucas Bobroff of Pure Storage offers insights on preventing and responding to ransomware attacks.
Anticipating and withstanding cyberattacks — cyber resilience — must become a companywide concern.
The incoming U.S. president should resist overreaching and adopt a tempered approach to tech industry oversight.
An expert on tech industry regulation argues that the Biden administration should step back and let innovation flourish.
Tech leaders should consider data privacy and security issues while also maximizing customer experience.
Employee surveillance practices are increasing along with remote work arrangements. But can companies do it ethically?
MIT Sloan’s Sinan Aral discusses social media as a marketing tool that can have a positive impact — if used ethically.
Navigating chaos with sensemaking, elevating cybersecurity strategically, and disrupting yourself.
Most companies treat cybersecurity as an operational issue — and miss out on strategic opportunities.
Employers could use surveillance tools — with constraints — to keep workers safe and healthy.
With more people working remote, IT leaders face new challenges.
In a virtual work environment, organizations must reassess their cybersecurity risk profile and IT strategy.
Big data mining is no longer enough. Data exchanges will shape new economic ecosystems.
Understanding how cybersecurity and cyber resilience differ is key to effectively responding to cyberthreats.