Poster

Blog

Malicious hackers are ubiquitous in today’s cyberspace.

While they’re growing in numbers, we need to aggressively defend against them.

This blog site shares our thought leadership in cyber protection via unusual paradigms.

We believe in special technologies to protect effectively. Contributions from readers are welcomed.

Please contact us if you have papers on special protection paradigms to share.

We will blog post the contributions if they are deemed practically useful to the community.

2022 Aug

22

Enterprise Service Management as a Platform for Digital Transformation

Enterprise Service Management as a Platform for Digital Transformation

Enterprise service management – “the use of IT service management (ITSM) principles, practices, and capabilities by another business function to help improve its operations and...

2022 Jul

14

How to Succeed with IT Self-Service

How to Succeed with IT Self-Service

The IT self-service portal has long been sold as the solution to many of the corporate IT organization’s woes – with it providing “better,...

2022 May

12

Service Management’s Value – the ROI of ITSM

Service Management’s Value – the ROI of ITSM

Suppose you’re looking to introduce or extend your existing IT service management (ITSM) capabilities. You’ll likely need to justify the cost – perhaps in...

2022 May

11

Brainhack into the multiverse

Brainhack into the multiverse

Athena Dynamics Pte Ltd and NSHC are proud to support DSTA in bringing forth this year’s CDDC 2022 CTF and Cyber Training program to the IHL community. Please register...

2022 May

4

3 Reasons Why IT Needs Knowledge Management Right Now

3 Reasons Why IT Needs Knowledge Management Right Now

Knowledge management capabilities share information across an organization to benefit IT operations, services, experiences, and outcomes, plus the employees that enable them. In some...

2022 Apr

14

We are augmenting hygiene detection-based technologies with detection-less means in our email gateway

We are augmenting hygiene detection-based technologies with detection-less means in our email gateway

COVID situation has injected a “situational” dimension into the classic People, Process, and Technology perspective. What that was already tricky enough is now becoming...

2022 Apr

5

Just Eat Takeaway.com improves its product security with DerScanner

Just Eat Takeaway.com improves its product security with DerScanner

Just Eat Takeaway.com, a European food delivery marketplace, uses a static code analyzer DerScanner to improve the security of developed applications.

2022 Feb

28

Top future skills for CIOs in 2022

Top future skills for CIOs in 2022

We spoke to leading CIOs and tech leaders to understand what are some of the future skills that tomorrow’s CIOs need to build in...

2022 Feb

3

4 Key Considerations for Your ITSM Implementation in 2022 – ITCC

4 Key Considerations for Your ITSM Implementation in 2022 – ITCC

Author: Athena Dynamics & IT Care Center Copyright © 2021 All Rights Reserved That’s IT Author: Athena Dynamics & IT Care Center Copyright ©...

2022 Jan

12

Enterprise digitalisation is now mandated by the new “C”, Covid, rather than C-suite: Ken Soh, BH Global Corporation

Enterprise digitalisation is now mandated by the new “C”, Covid, rather than C-suite: Ken Soh, BH Global Corporation

Enterprise digitalisation is now mandated by the new “C”, Covid, rather than C-suite: Ken Soh, BH Global Corporation Author: Athena Dynamics & ETCIOCopyright ©...