Poster

Blog

Malicious hackers are ubiquitous in today’s cyberspace.

While they’re growing in numbers, we need to aggressively defend against them.

This blog site shares our thought leadership in cyber protection via unusual paradigms.

We believe in special technologies to protect effectively. Contributions from readers are welcomed.

Please contact us if you have papers on special protection paradigms to share.

We will blog post the contributions if they are deemed practically useful to the community.

2022 Nov

21

What ITSM Can Learn from the Football World Cup

What ITSM Can Learn from the Football World Cup

The FIFA World Cup Qatar 2022 tournament is poised to grab everyone’s attention between now and the end of 2022. It offers an interesting...

2022 Oct

19

The Key ITSM Success Challenges and How to Surmount Them

The Key ITSM Success Challenges and How to Surmount Them

If your organization struggles to achieve the IT service management (ITSM) it needs, it might be because of one or more of the common...

2022 Aug

22

Enterprise Service Management as a Platform for Digital Transformation

Enterprise Service Management as a Platform for Digital Transformation

Enterprise service management – “the use of IT service management (ITSM) principles, practices, and capabilities by another business function to help improve its operations and...

2022 Jul

14

How to Succeed with IT Self-Service

How to Succeed with IT Self-Service

The IT self-service portal has long been sold as the solution to many of the corporate IT organization’s woes – with it providing “better,...

2022 May

12

Service Management’s Value – the ROI of ITSM

Service Management’s Value – the ROI of ITSM

Suppose you’re looking to introduce or extend your existing IT service management (ITSM) capabilities. You’ll likely need to justify the cost – perhaps in...

2022 May

11

Brainhack into the multiverse

Brainhack into the multiverse

Athena Dynamics Pte Ltd and NSHC are proud to support DSTA in bringing forth this year’s CDDC 2022 CTF and Cyber Training program to the IHL community. Please register...

2022 May

4

3 Reasons Why IT Needs Knowledge Management Right Now

3 Reasons Why IT Needs Knowledge Management Right Now

Knowledge management capabilities share information across an organization to benefit IT operations, services, experiences, and outcomes, plus the employees that enable them. In some...

2022 Apr

14

We are augmenting hygiene detection-based technologies with detection-less means in our email gateway

We are augmenting hygiene detection-based technologies with detection-less means in our email gateway

COVID situation has injected a “situational” dimension into the classic People, Process, and Technology perspective. What that was already tricky enough is now becoming...

2022 Apr

5

Just Eat Takeaway.com improves its product security with DerScanner

Just Eat Takeaway.com improves its product security with DerScanner

Just Eat Takeaway.com, a European food delivery marketplace, uses a static code analyzer DerScanner to improve the security of developed applications.

2022 Feb

28

Top future skills for CIOs in 2022

Top future skills for CIOs in 2022

We spoke to leading CIOs and tech leaders to understand what are some of the future skills that tomorrow’s CIOs need to build in...