News, Reviews and Resources for ITSM Professionals.

Home » Posts tagged with "security"

Justin Timberlake, Asset Disposition & Rocking IT Security; Knowledge 16 – Day 2

Day 2 of Vegas! After an amazing breakfast (cake!) it was time for the first keynote of the day. Full Keynote this morning at #know16 pic.twitter.com/92wsVHCdAz — Jen Miller (@jenmillerboston) May 18, 2016 Drive The Service Revolution – Dan McGee, Chief Operating Officer, ServiceNow Dan opened the day in style with his take on what customers want: “what matters most to our customers?... 

Protecting our Data; a quick guide to password management

So here it is. I think we can safely say that it hasn’t been a great few weeks for security or protecting people’s personal information. At the time of press both Vodafone and Talk Talk had been hit by security breaches and there are lots of anxious customers worried if their personal data has been compromised. In the case of Vodafone, the data breach was external to Vodafone i.e. the data had... 

ITSM Industry News Roundup – Incl JP Morgan Chase Hack

No time to read all the interesting news and info floating around social media and appearing in your inbox? Read our round up of what we’ve found interesting this week. Why You Should Drop Staff Who Are Not Cloud Savvy – Cliff Saran explains why CIO’s need to lose traditional staff not ready to move to the cloud. Read more here Understanding Services – It’s Not Really Magic – Ryan Ogilvie... 

ITSM Industry Roundup

Fetching you the news! No time to read all the interesting info floating around social media and appearing in your inbox? Read our round up of what we’ve found interesting this week. Firms failing on security basics, says Websense – Businesses still failing on the basic requirements for information security such as visibility of their data assets, says security firm Websense. Read more here ITIL... 

How to manage third-party service, support and security

U.S. retailer Target saw one of the largest thefts of credit card data in recent history Productivity expert David Allen once stated that his approach, “Getting Things Done,” was based on the simple premise that you can’t do everything. In IT, we face this problem every day. Whether it is due to lack of domain specific expertise or simply not enough resources to handle all of our IT services,... 

Eight Principles for Transforming Cybersecurity

Enterprises today not only have to defend their assets – they must hunt. This article was contributed by Robert Stroud, Vice President at CA Technologies. Just five short years ago, cybercrime represented just 1% of all economic crime (source: PricewaterhouseCoopers, Global State of Information Security Survey, 2011). By 2011, that number jumped to 23%, and we can continue to expect those numbers... 

Security after Snowden – what do I need to do?

The implications of the revelations of ex-NSA employee Edward Snowden have been much discussed and many people who were not previously concerned with cyber-security are now wondering what they should be doing. This is a good thing – but the danger has not changed, only the perception of it. Most of the ideas outlined here were well known, at least in broad terms, before this, but those who argued... 

Enterprise Mobility Management: Concepts in Endpoint Management

Robert Casetta The following article has been contributed by Roberto Casetta, Vice President EMEA, at FrontRange. Empowering a mobile workforce is essential in any modern enterprise to meet business goals and remain competitive.  Mobility increases end user productivity, agility and job satisfaction, resulting in improved business performance.  Although workforce mobility is most often associated... 

The BYOD battle… and the ITSM war

38% of respondents think the IT department should be supporting any personal device, regardless of how much it is used for work purposes. Pat Bolger is chief evangelist at Hornbill Service Management. Bolger writes in this guest post for the ITSM Review to underline the big picture that exists across the BYOD landscape and how this use case model has affected and continues to impact the IT service... 

Product Group Tests

Article by Topic