Published 17 Oct 2016
What is currently a typical starting point when organizations are thinking about protection against cyber threat and how often is that the right place to start? Organizations can start from one of three places when thinking about protection against cyber threat: Strategic...
Published 25 Oct 2017
Cybercrime is a lucrative business. And not just for the hackers. The figures of how much the cyber security market is worth – and will be worth – vary, but they’re all huge. It’s said that $75 billion was spent in 2015. That by it’ll be $155.4 billion in 2019. Maybe $231.94...
Cyber resilience|Cyber security|Cyber-attack|Learning|RESILIA|Threats|Training
Published 10 Aug 2016
Working on projects to develop new software with developers in a different country - in other words, remotely - poses certain problems that cry out for the practical approaches enshrined in ITIL ® Practitioner’s guiding principles. The scenario I describe, unfortunately...
Communication|IT Service Management (ITSM)|IT services|ITIL|Processes|Project management
Published 08 May 2019
The major reason I think ITIL ® practitioners should be looking at the Intermediate module – Release, Control and Validation – is summarized in one word: DevOps. DevOps has become the latest way to describe collaboration, agile, and leaner enterprise working but ITIL’s R...
Agile|DevOps|IT services|ITIL|Knowledge management|Service management
Published 23 Feb 2018
Scott Harberd shares his experience of implementing PPM software during a period of transformation and change for one of the UK’s largest airlines. Following a period of rapid growth and promotion to the FTSE 100, the organization was outwardly successful but highly i...
Benefits realization|Change management|Communication|IT transformation|Maturity models|Project and Programme Management (PPM)
Published 04 Nov 2015
Though a performance analytics and testing company, SOASTA use ITIL ® best practice to consider key processes for any application lifecycles and have applied them to their development methodology. In this blog, Dan discusses a little of what they have learned so far. ...
Best Practice|Change management|End-user experience|Methodologies|Processes
Published 30 Nov 2016
Configuration Management requires a disciplined approach to be functional. It’s about having a record of your systems, what’s happened to those items and the details of the relationships between the items on your list. It’s commonly used in IT, military or commercial aviatio...
Change management|Information systems|IT Service Management (ITSM)|IT services|Processes|Value
Published 03 Sep 2018
Traditionally, ITSM has not been agile. People have tended to focus more on having robust processes and rather than considering “what do we need?”, they have asked “what more can we put in to processes ?”. This level of “over-control” has happened because of over-enginee...
Agile|Customer needs|IT service management (ITSM)|ITIL|Processes|Stakeholder engagement
Published 25 Sep 2017
AXELOS' "Cyber Stories from the Frontline" brings to life the reality of cybercrime for organizations today and from the perspective of those who have first-hand experience How often do we hear stories of how multi-national corporations have been hacked via third-party s...
Cyber security|Cyber-attack|Information systems|Processes|Threats|Vulnerability
Published 27 Nov 2017
How can DevOps bring service improvements to IT service management (ITSM) in organizations and avoid throwing operations the “hot potato” of badly planned change projects? And what is the role for ITIL ® Practitioner’s 9 Guiding Principles – in particular start where y...
Collaboration|DevOps|IT Service Management (ITSM)|IT services|ITIL