Poster

Blog

Malicious hackers are ubiquitous in today’s cyberspace.

While they’re growing in numbers, we need to aggressively defend against them.

This blog site shares our thought leadership in cyber protection via unusual paradigms.

We believe in special technologies to protect effectively. Contributions from readers are welcomed.

Please contact us if you have papers on special protection paradigms to share.

We will blog post the contributions if they are deemed practically useful to the community.

2022 Apr

14

We are augmenting hygiene detection-based technologies with detection-less means in our email gateway

We are augmenting hygiene detection-based technologies with detection-less means in our email gateway

COVID situation has injected a “situational” dimension into the classic People, Process, and Technology perspective. What that was already tricky enough is now becoming...

2022 Apr

5

Just Eat Takeaway.com improves its product security with DerScanner

Just Eat Takeaway.com improves its product security with DerScanner

Just Eat Takeaway.com, a European food delivery marketplace, uses a static code analyzer DerScanner to improve the security of developed applications.

2022 Feb

28

Top future skills for CIOs in 2022

Top future skills for CIOs in 2022

We spoke to leading CIOs and tech leaders to understand what are some of the future skills that tomorrow’s CIOs need to build in...

2022 Feb

3

4 Key Considerations for Your ITSM Implementation in 2022 – ITCC

4 Key Considerations for Your ITSM Implementation in 2022 – ITCC

Author: Athena Dynamics & IT Care Center Copyright © 2021 All Rights Reserved That’s IT Author: Athena Dynamics & IT Care Center Copyright ©...

2022 Jan

12

Enterprise digitalisation is now mandated by the new “C”, Covid, rather than C-suite: Ken Soh, BH Global Corporation

Enterprise digitalisation is now mandated by the new “C”, Covid, rather than C-suite: Ken Soh, BH Global Corporation

Enterprise digitalisation is now mandated by the new “C”, Covid, rather than C-suite: Ken Soh, BH Global Corporation Author: Athena Dynamics & ETCIOCopyright ©...

2021 Dec

27

DerScanner’s vulnerability database now includes Log4Shell zero-day threats – DerSecur

DerScanner’s vulnerability database now includes Log4Shell zero-day threats – DerSecur

DerScanner’s vulnerability database now includes Log4Shell zero-day threats Author: Athena Dynamics & DerSecurCopyright © 2021 All Rights Reserved DerSecur has updated the vulnerability database...

2021 Dec

23

Finding the Right Managed Services Platform – ITCC

Finding the Right Managed Services Platform – ITCC

Finding the Right Managed Services Platform Author: Athena Dynamics & IT Care CenterCopyright © 2021 All Rights Reserved That’s IT A managed service provider (MSP) was struggling...

2021 Dec

23

Surprising Flexibility of Asset Management – ITCC

Surprising Flexibility of Asset Management – ITCC

Surprising Flexibility of Asset Management Author: Athena Dynamics & IT Care CenterCopyright © 2021 All Rights Reserved That’s IT On its surface, Asset Management seems to...

2021 Dec

23

5 ‘Must Have’ IT Ticketing Software Features – ITCC

5 ‘Must Have’ IT Ticketing Software Features – ITCC

5 ‘Must Have’ IT Ticketing Software Features Author: Athena Dynamics & IT Care Center Copyright © 2021 All Rights Reserved That’s IT As your...

2021 Dec

15

Why is Apache Log4j vulnerability so serious?

Why is Apache Log4j vulnerability so serious?

Why is Apache Log4j vulnerability so serious?   Author: Nyan Tun Zaw, VP, Athena Dynamics Advisory Editor: Ken Soh, CEO, Athena Dynamics Up until...