Latest blogs from AXELOS

The unknown unknowns: tackling the ongoing challenge of cyber resilience

  • 30 August 2016
  • Cyber resilience, Cyber-attack, Processes, RESILIA, Threats, Vulnerability
No matter how sophisticated an organization’s technical controls, there is always a risk of attack. The role of the IT Security Manager is...

ITIL® Practitioner Guiding Principles in action: Start Where You Are

  • 26 August 2016
  • Frameworks, Information Management, IT Service Management (ITSM), ITIL, Maturity Models
When embarking on any project, the hardest part is knowing where to begin. But as the Guiding Principles of ITIL Practitioner recommend, my view is...

5 popular misconceptions about ITIL®: ‘ITIL is a standard’, and other folk stories

  • 25 August 2016
  • Frameworks, IT Service Management (ITSM), ITIL, Requirements, Roles, Training
We recently asked our community to share their experiences of misconceptions about ITIL. Our members responded by listing challenges and success...

The digital ransom note - the scourge of Ransomware

  • 24 August 2016
  • Cyber resilience, Cyber-attack, Encryption, ITIL, Training, Vulnerability
The risk of being held to ransom is no longer just a phenomenon of the physical world - the digital world is subject to the menace of...

ITIL® Misconceptions: "You don’t need to worry about culture when adopting the ITIL framework."

  • 21 August 2016
  • Behaviour, Change management, Communication, Frameworks, ITIL, Stakeholder management
Should IT organizations worry about culture when adopting the ITIL® framework? Thinking that they shouldn’t is a misconception.

The orchestra’s conductor: the skills needed to be a Programme Manager

  • 19 August 2016
  • Best Practice, Communication, Leadership, Programme Management, Project and programme management (PPM)
Programme Managers or Directors play a critical role in an organization, often acting as the conduit between strategy and execution.

Where did that cyber-attack come from? That’s not your problem!

  • 17 August 2016
  • Cyber resilience, Cyber-attack, RESILIA, Threats, Training, Vulnerability
Why is there an obsession with where a cyber-attack originates?

Using ISO/IEC 20000 and ITIL to deliver business value

  • 16 August 2016
  • Governance, IT Service Management (ITSM), ITIL, Processes, Requirements, Value
ITIL and ISO/IEC 20000, the international standard for service management, have enjoyed a long and mutually supportive relationship.

How to distinguish a change initiative and the best practice principles to deploy for governance

  • 15 August 2016
  • Best practice, Change management, Governance, MSP, PRINCE2, PRINCE2 Agile
In the past 30 years the Northern Ireland Civil Service has seen an increased focus on delivering change and less on “business as usual...

ITIL® Practitioner Guiding Principles in action: Working Iteratively

  • 12 August 2016
  • Communication, IT Service Management (ITSM), IT services, ITIL, Processes, Project management
Why is working in silos a problem in technology and how can the ITIL Practitioner guiding principle of “working iteratively” help?
1 2 >