Latest blogs from AXELOS

Taking the pain out of implementing configuration management systems

  • 07 May 2015
  • Information Management, ITIL, Management, Requirements, Service Desk, Service Management, Value
Configuration management systems (CMS) are the bedrock of IT service management (ITSM); they provide the tools and databases to hold and manage all...

Service Management beyond IT - a world of opportunity

  • 05 May 2015
  • Business Solutions, IT Service Management (ITSM), IT Services, ITIL, Requirements, Service Management
IT Service Management (ITSM) practitioners often forget that service management was not something they invented but rather a concept taken and...

Why every manager needs project management skills

  • 30 April 2015
  • Agile, Communication, Learning, Methodologies, PRINCE2, Project Management, Project Progress, Skills, Small Projects
To effectively implement all but the simplest of changes, managers need to be able to understand and manage projects, no matter what their...

Cyber Resilience: protecting the network or the data?

  • 28 April 2015
  • Cyber Resilience, Cyber-attack, Data Protection, RESILIA
What can organizations do to deal with the accelerating problem of cyber breaches? Do they protect their network or their data?

Cyber Resilience: developing a new language for all

  • 23 April 2015
  • Confidentiality, Cyber Resilience, Cyber-attack, Identity, Vulnerability
All too often we read about ‘cyber warfare’, ‘cyber spies’, ‘cyber terrorism’ or many other terms that only...

PRINCE2 Agile™ for Practitioners - How Using Agile Will Help Support the PRINCE2® Principles

  • 21 April 2015
  • Agile, Best Practice, Learning, Management, PRINCE2, PRINCE2 Agile, Project and programme management (PPM), Project Management
Agile delivery principles are increasingly attracting the attention of organizations looking for the most appropriate approach to help meet their...

The War on Cyber: Protecting Ourselves Against Weaponization

  • 17 April 2015
  • Confidentiality, Cyber Resilience, Cyber-attack, Identity, Vulnerability
The words “cyber” and “weapon” are often used together, with those staging cyber-attacks described as “weaponizing...

Issues in corporate governance and service governance as a solution

  • 14 April 2015
  • Best Practice, Governance, IT Services, ITIL, M_o_R, MoP, MoV, MSP, Service Management
The justification for service governance is summed up neatly in the words of a CEO I know, when asked how things in the company were going: he said...

Getting human to human in ITSM

  • 09 April 2015
  • Best Practice, Collaboration, Communication, IT service management (ITSM), IT Services, ITIL, Service Management
In ITSM you need the skills to influence people beyond having a process and that’s all about relationships, interaction and successful...

Building Service Monitoring as a Service with an Eye on the Cloud: Service Monitoring Service

  • 07 April 2015
  • Best Practice, Cloud Computing, IT Services, Service Management
Application teams know their applications. We know our Service Monitoring Service. We need to quantify very simple inputs that will enable our...
< 1 ... 76 77 78 ... 81 >