Latest blogs from AXELOS

Managing the Customer Interface with Best Practice Guidance - and not only in ITIL®!

  • 02 April 2015
  • Adopt and Adapt, Best Practice, Customer Experience, IT service management (ITSM), IT Services, ITIL, PRINCE2, Service Management
The customer interface is the place where an organization meets its customers but in ITSM it’s something no one talks about enough, even...

MoP® and PMI - the Yin and Yang of portfolio management

  • 01 April 2015
  • Best Practice, Change management, MoP, Portfolio Management, Processes, Project sponsorship, Strategy execution, Training
In this blog, Portfolio Director and author Craig Kilford discusses the most prominent similarities and differences between AXELOS' Management...

Have you heard the one about the three judges...? A Cyber story to be aware of

  • 31 March 2015
  • Anti-Virus Software, Best Practice, Cyber Resilience, Cyber-attack, Privacy, Threats, Vulnerability
The case of the three UK judges sacked for viewing pornography using their official IT accounts raised some serious questions for the people...

The perils of cyber-attack – and the new solution

  • 26 March 2015
  • Behaviour, Best Practice, Cyber Resilience, Identity, Threats, Training, Vulnerability
In the world of cyber resilience, barely a week goes by without another company falling victim to cyber-attack – and to the penalties that...

P3M3® v3.0 – the “big one” among best practices is coming

  • 24 March 2015
  • Best Practice, Management, Maturity models, P3M3, Processes, Project and programme management (PPM)
The latest version of P3M3, launching from April 2015, will provide PPM consultants and organizations they work with the evidence for whether...

The genesis of PRINCE2 Agile – a work of agile collaboration

  • 20 March 2015
  • Best Practice, Frameworks, Methodologies, PRINCE2, PRINCE2 Agile, Project Management
For those waiting to hear, or wondering, about progress regarding the development of PRINCE2 Agile: please be assured, your wait is nearly over!

Every Cyber Attacker is an Insider

  • 19 March 2015
  • Best Practice, Confidentiality, Cyber Resilience, Data protection, Frameworks, Risk management
What enterprise executives need to realize is that in today’s environment, every cyber attacker is a potential insider.

Delivering organizational value through service governance

  • 17 March 2015
  • Best Practice, Continual Service Improvement (CSI), Governance, IT services, ITIL, Service management, Value
An organization needs clarity and transparency to show leaders and boards of directors how well it’s operating, but without everybody having...

Taking the next step with ITIL®

  • 13 March 2015
  • Certification, IT Service Management (ITSM), ITIL, Qualifications
In addition to adding to our knowledge base of what works best in real life and the growing portfolio of good practice, we have also learned of...

AXELOS Career Paths – your professionalism journey starts here

  • 12 March 2015
  • Best Practice, Career Planning, CPD, IT service management (ITSM), Learning, Project and programme management (PPM), Recruitment, Skills
Professionalism is about understanding the specialist skills and knowledge you need in your job role and AXELOS' best practice qualifications...
< 1 ... 62 63 64 ... 67 >