Search
  • Best Practice
  • Certifications
  • Content Hub
  • Training
  • Consulting Partners
  • My AXELOS
  • Store
  • Community
  • About Us
  • Successful candidates register
  • Global Partner Programme
  • Log in / Create profile
    • Log in
    • Create user profile
    • Global Partner Login
    •  
  •   View Basket
Axelos Corporate Site
Home > Search

Search

Content Results
Store Results
Filter
Filter
Filter
332 Results found for 'Big Data'
{"searchTerm":"Big Data","result":"332"}

Showing 1 - 10 of 332
View
25
50
All
Reset

EU regulations promise shake-up for organizations’ data protection
Blog
Published 02 Jun 2016
Is your organization ready for the biggest shake-up of data protection laws in 20 years? The European Union’s General Data Protection Regulation will take effect from this year with the aim of giving EU citizens greater control of what happens to their data and containing t...
Cyber resilience|Data protection|RESILIA|Risk management|Sensitive data|Skills
Internet of Things: balancing benefits with data security
Blog
Published 25 May 2016
Just because you can connect a device to the internet doesn't mean you should. While connected devices (commonly called the “Internet of Things”) can deliver new services, there needs to be security, privacy and clear ownership of data. The endgame for the Internet of ...
Behaviour|Cyber resilience|Data protection|Processes|RESILIA|Sensitive data|Vulnerability
Agile Alliance 2018 - Day 3 recap
Blog
Published 09 Aug 2018
And just like that, we’re done with Day 3 of Agile 2018 ! I’m hoping that by now any readers are aware of the previous two posts about days 1 and 2, but if not...here they are: Day 1 Day 2 The last hurrah - final thoughts from Agile 2018 The focus of the po...
Agile|Benefits realization|Big Data|Business information management|Customer Engagement|Customer needs|Learning
Service Strategy: ahead of its time
Blog
Published 11 Nov 2016
I remember the divide in the industry when we published Service Strategy in the summer of 2007. Whilst a minority said it was inspirational, the majority questioned what right IT had in trying to shape business strategy. Zoom forward more than a decade, where the Fourth...
Capabilities|Collaboration|IT services|ITIL|Skills|Strategy execution|Value
SMEs, cyber risk and resilience – to invest or not to invest?
Blog
Published 18 Jan 2016
How much do Small and Medium Sized Enterprises ( SMEs ) have to fear from cyber-attack? The high profile cyber attacks of the past year have involved much bigger commercial fish than companies in the SME market. But that doesn’t render them immune – far from it. 74% of s...
Cyber resilience|Cyber-attack|Data Protection|RESILIA|Risk management|Vulnerability
Getting the basics right before you buy in the “bots”
Blog
Published 09 Jan 2019
Automation today, and certainly in the future, can do many things equally if not better than humans, providing efficiency and cost savings. Ideally this also allows people to do more interesting work. The opportunity is clear that – as artificial intelligence becomes yet m...
Benefits realization|Big Data|IT service management (ITSM)|ITIL|Knowledge management|Processes|Service management
2019 cyber risk landscape: key threats and lessons
Blog
Published 20 Nov 2018
As part of the CBI Cyber Security Conference 2018 , experts hosted a future looking session to “examine the latest threat intelligence and emerging risks for businesses in the cyber security landscape”. The panel considered what threat and risk issues boards need to be addr...
Best practice|Cyber resilience|Cyber security|Cyber-attack|GDPR|Threats
Tips for managing transformation and change
Blog
Published 23 Feb 2018
Scott Harberd shares his experience of implementing PPM software during a period of transformation and change for one of the UK’s largest airlines. Following a period of rapid growth and promotion to the FTSE 100, the organization was outwardly successful but highly i...
Benefits realization|Change management|Communication|IT transformation|Maturity models|Project and Programme Management (PPM)
The unknown unknowns: tackling the ongoing challenge of cyber resilience
Blog
Published 30 Aug 2016
No matter how sophisticated an organization’s technical controls, there is always a risk of attack. In this day and age, with the great speed at which technology is advancing, the constant evolution of threats makes it impossible for any business to be 100% protected; what th...
Cyber resilience|Cyber-attack|Processes|RESILIA|Threats|Vulnerability
What is configuration management and what we can learn from a fridge freezer?
Blog
Published 30 Nov 2016
Configuration Management requires a disciplined approach to be functional. It’s about having a record of your systems, what’s happened to those items and the details of the relationships between the items on your list. It’s commonly used in IT, military or commercial aviatio...
Change management|Information systems|IT Service Management (ITSM)|IT services|Processes|Value
1 2 ... 34 >
Axelos
  • FAQs
  • Contact
  • Policies
  • Licensing
  • Legal
  • Privacy
  • Cookies
  • Accessibility
  • Best Practice Feedback
  • LinkedIn
  • Twitter
  • Facebook
  • Youtube
  • ITIL
  • RESILIA
  • PRINCE2
  • PRINCE2 Agile®
  • AgileSHIFT
  • MSP
  • M_o_R
  • P3M3®
  • P3O
  • MoP
  • MoV
You're about to be logged off...
As your session has been inactive for a while, you'll shortly be logged out for security purposes. If you'd like to remain logged in, please select the appropriate button below.