top of page

Asylum's Atheneum

Micah Linehan
Sep 5, 20245 min read
Allowing Innovation by Technical Solution Independence
Last week, a congressional hearing took place to explore "The Dawn of Artificial Intelligence". There was plenty of hype (transformative,...
0 comments

Micah Linehan
Aug 22, 20245 min read
Secure LLMs and AI for Your Business
At this stage, organizations are exploring the capabilities of LLMs through hands-on experimentation. Most commonly they employ...
0 comments

Micah Linehan
Aug 15, 20245 min read
User Centric Technology Solutions
Modern users expect technology to simply "work", becoming frustrated when encountering cumbersome processes or user interfaces that...
0 comments

Micah Linehan
Jul 23, 20245 min read
Security Awareness - What to Do When the Breach Happens
Technology continues to advance quickly, making information security an ever more pressing priority for businesses.
0 comments

Micah Linehan
Jul 16, 20246 min read
AT&T Data Breach Exposes Further Risk When Combined With Quantum Computing's and AI's Encryption Breaking Capabilities
This most recent compromise from AT&T not only exposes the standard disclaimers of PII, Personal Communications including phone call records
0 comments


Micah Linehan
Jun 25, 20244 min read
Unlocking Success - Practical Solutions For Secure Businesses
Whether your aim is financial independence or making an impactful difference, these tried-and-tested strategies can help you unlock success.
0 comments

Micah Linehan
Jun 18, 20245 min read
Navigating Complexity: Simplified IT Services for Non-Technical Leaders
Navigating complexity can be intimidating for non-technical leaders.
0 comments

Micah Linehan
Jun 11, 20244 min read
Driving Business Growth With Understandable and Secure IT Solutions
Business users require user-friendly interfaces that allow them to easily access and manipulate data without the assistance of data experts.
0 comments

Micah Linehan
Jun 4, 20244 min read
Leveraging Security Tools for Deprecating Old Applications
Old technology poses a risk to businesses' security and compliance requirements.
0 comments

Micah Linehan
May 28, 20244 min read
Can Using One Device for Everything Compromise Them All?
Mixing personal computing on a business asset may seem like a convenience, however it exposes your organization to additional risks.
0 comments

Micah Linehan
May 23, 20247 min read
Microsoft's Windows Recall Captures Everything Is a Compliance Risk
Microsoft assures them that sensitive information such as passwords entered in private browsing windows won't be captured.
0 comments


Micah Linehan
May 23, 20248 min read
Implementing CISA's SCuBA Project in Your Cloud
CISA has published two Microsoft configuration baseline documents and developed an automated assessment tool called ScubaGear to analyze GWS
0 comments


Micah Linehan
May 23, 20245 min read
NIS2 Regulations and How They Affect Your Business
Businesses within scope will need to assess their categorization, eligibility for exemptions and NIS2Â obligations.
0 comments

Micah Linehan
May 23, 20242 min read
Microsoft Critical Asset Protection
Critical assets are IT resources essential to business, including data, applications and endpoint devices.
0 comments

Micah Linehan
May 23, 20246 min read
Cloud First and Cloud Native for Everything?
The advantages of cloud-native architecture include scalable and resilient apps, increased agility, and reduced operational costs.
0 comments
bottom of page