Successful cyberattacks often result from isolated decisions made without fully considering the potential consequences.
Managing Technology
Page 3 of 18
-
Manage The Risks of Software Reuse
Code reuse is common, but leaders must be aware of potential vulnerabilities to mitigate exposure to risk.
-
Building Cyber Resilience Before the Next Attack Occurs
Lessons and insights from past cyberattacks can help companies prepare and respond more successfully to future threats.
-
The Ransomware Dilemma
Deciding whether to pay up when cybercriminals hold data hostage may depend on choices made long before an attack.
-
Preserving Privacy While Sharing Data
Using differential privacy to safeguard personal information when sharing data still requires a high level of expertise.
-
Charting a Route to Success in Technology Mergers
In a Q&A, two Alaska Airline executives discuss the technology integration challenges of a corporate acquisition.
-
The Questions Leaders Should Be Asking in the New Era of Digital Transformation
In this era of upheaval, business leaders must reconsider the assumptions that rule their decision-making processes.
-
When Gradual Change Beats Radical Transformation
Evolutionary digital transformation may work better than radical change for some companies.
-
Design for Cybersecurity From the Start
Leaders can take steps to shift their product development teams toward a mindset of designing for cybersecurity.
-
Developing an Ethical Technology Mindset
Technology has become central to how all companies — not just tech companies — run their businesses and compete in the 21st century. At the same time, the pace of change, increased uncertainty, and the rising demand on organizations to address societal challenges have pushed the issue of ethical and trustworthy technology to the top of the executive agenda.