Latest blogs from AXELOS

Cyber Resilience: developing a new language for all

  • 23 April 2015
  • Confidentiality, Cyber Resilience, Cyber-attack, Identity, Vulnerability
All too often we read about ‘cyber warfare’, ‘cyber spies’, ‘cyber terrorism’ or many other terms that only...

PRINCE2 Agile™ for Practitioners - How Using Agile Will Help Support the PRINCE2® Principles

  • 21 April 2015
  • Agile, Best Practice, Learning, Management, Project and programme management (PPM), Project Management
Agile delivery principles are increasingly attracting the attention of organizations looking for the most appropriate approach to help meet their...

The War on Cyber: Protecting Ourselves Against Weaponization

  • 17 April 2015
  • Confidentiality, Cyber Resilience, Cyber-attack, Identity, Vulnerability
The words “cyber” and “weapon” are often used together, with those staging cyber-attacks described as “weaponizing...

Issues in corporate governance and service governance as a solution

  • 14 April 2015
  • Best Practice, Governance, IT Services, Service Management
The justification for service governance is summed up neatly in the words of a CEO I know, when asked how things in the company were going: he said...

Getting human to human in ITSM

  • 09 April 2015
  • Best Practice, Collaboration, Communication, IT Services, Service Management
In ITSM you need the skills to influence people beyond having a process and that’s all about relationships, interaction and successful...

Building Service Monitoring as a Service with an Eye on the Cloud: Service Monitoring Service

  • 07 April 2015
  • Best Practice, Cloud Computing, IT Services, Service Management
Application teams know their applications. We know our Service Monitoring Service. We need to quantify very simple inputs that will enable our...

Managing the Customer Interface with Best Practice Guidance - and not only in ITIL®!

  • 02 April 2015
  • Adopt and Adapt, Best Practice, Customer Experience, IT Services, Service Management
The customer interface is the place where an organization meets its customers but in ITSM it’s something no one talks about enough, even...

MoP® and PMI - the Yin and Yang of portfolio management

  • 01 April 2015
  • Best Practice, Change management, Portfolio Management, Processes, Project sponsorship, Strategy execution, Training
In this blog, Portfolio Director and author Craig Kilford discusses the most prominent similarities and differences between AXELOS' Management...

Have you heard the one about the three judges...? A Cyber story to be aware of

  • 31 March 2015
  • Anti-Virus Software, Best Practice, Cyber Resilience, Cyber-attack, Privacy, Threats, Vulnerability
The case of the three UK judges sacked for viewing pornography using their official IT accounts raised some serious questions for the people...

The perils of cyber-attack – and the new solution

  • 26 March 2015
  • Behaviour, Best Practice, Cyber Resilience, Identity, Threats, Training, Vulnerability
In the world of cyber resilience, barely a week goes by without another company falling victim to cyber-attack – and to the penalties that...
< 1 ... 42 43 44 ... 48 >