AXELOS Community hosted Whaling Week, a look into the results of a successful Whaling attack in your organization. We now present four of the best replies from throughout the week.
I was first introduced to ITIL® in 2009 when I completed the ITIL Foundation certification. But my journey didn’t really start until 2012.
In my career I’ve been part of a variety of service transition projects and while every project is unique there are key aspects that should always be considered.
Creating awareness among employees about the damage a successful phishing attack can cause is the key to an organization’s cyber resilience.
The fear of being refused, not knowing how much to ask for or to explain why it is deserved stops many asking for a rise. Read our tips to help you do this.
Organizations need to consider their process governance before developing new enterprise ITSM tools. Adopting and adopting ITIL processes can help them do this.
Today, many senior managers are still unable to distinguish between programmes and projects and which approach would be most suitable when implementing organizational change.
Developing new applications with a combination of ITIL®, DevOps and agile methods is transforming results for customers.
One element of PRINCE2 that I use on every project I’m involved with is product-based planning.
Agile's speed and flexibility are vital in ITSM and adopting ITIL Practitioner's Guiding Principles can help problem managers benefit from its approach.
Organizations adopting a bi-modal or two speed approach to projects need a framework which supports both agile and traditional methods of project management.