Published 17 Oct 2016
What is currently a typical starting point when organizations are thinking about protection against cyber threat and how often is that the right place to start? Organizations can start from one of three places when thinking about protection against cyber threat: Strategic...
Published 25 Oct 2017
Cybercrime is a lucrative business. And not just for the hackers. The figures of how much the cyber security market is worth – and will be worth – vary, but they’re all huge. It’s said that $75 billion was spent in 2015. That by it’ll be $155.4 billion in 2019. Maybe $231.94...
Cyber resilience|Cyber security|Cyber-attack|Learning|RESILIA|Threats|Training
Published 10 Aug 2016
Working on projects to develop new software with developers in a different country - in other words, remotely - poses certain problems that cry out for the practical approaches enshrined in ITIL ® Practitioner’s guiding principles. The scenario I describe, unfortunately...
Communication|IT Service Management (ITSM)|IT services|ITIL|Processes|Project management
Published 15 Apr 2020
Since Google first began sharing details of its approach to massive-scale web operations - Site Reliability Engineering, or SRE - many organizations have adopted aspects of the SRE approach to help deal with the emerging complexity of modern software systems. However, there...
Benefits realization|Cloud services|Customer needs|End-User Experience|Information systems|IT service management (ITSM)|ITIL|Service management
Published 08 May 2019
The major reason I think ITIL ® practitioners should be looking at the Intermediate module – Release, Control and Validation – is summarized in one word: DevOps. DevOps has become the latest way to describe collaboration, agile, and leaner enterprise working but ITIL’s R...
Agile|DevOps|IT services|ITIL|Knowledge management|Service management
Published 23 Feb 2018
Scott Harberd shares his experience of implementing PPM software during a period of transformation and change for one of the UK’s largest airlines. Following a period of rapid growth and promotion to the FTSE 100, the organization was outwardly successful but highly i...
Benefits realization|Change management|Communication|IT transformation|Maturity models|Project and Programme Management (PPM)
Published 04 Nov 2015
Though a performance analytics and testing company, SOASTA use ITIL ® best practice to consider key processes for any application lifecycles and have applied them to their development methodology. In this blog, Dan discusses a little of what they have learned so far. ...
Best Practice|Change management|End-user experience|Methodologies|Processes
Published 30 Nov 2016
Configuration Management requires a disciplined approach to be functional. It’s about having a record of your systems, what’s happened to those items and the details of the relationships between the items on your list. It’s commonly used in IT, military or commercial aviatio...
Change management|Information systems|IT Service Management (ITSM)|IT services|Processes|Value
Published 03 Sep 2018
Traditionally, ITSM has not been agile. People have tended to focus more on having robust processes and rather than considering “what do we need?”, they have asked “what more can we put in to processes ?”. This level of “over-control” has happened because of over-enginee...
Agile|Customer needs|IT service management (ITSM)|ITIL|Processes|Stakeholder engagement
Published 25 Sep 2017
AXELOS' "Cyber Stories from the Frontline" brings to life the reality of cybercrime for organizations today and from the perspective of those who have first-hand experience How often do we hear stories of how multi-national corporations have been hacked via third-party s...
Cyber security|Cyber-attack|Information systems|Processes|Threats|Vulnerability