IT Expert Blog
Is Change Management A Critical Factor In Trusted Computing?
I would propose this working thesis; no security breach happens without a change or a need for a change! Do you unequivocally know what has changed in your IT Footprint? Let’s start here think about your holistic IT environment starting from the physical aspects all the way to your applications and most importantly your data.…
Next Generation Security
Cybersecurity breaches seem to occupy too many headlines these days. There seems to be so many attention-grabbing examples of how inadequate information, applications, and IT security can impact our businesses. There is documented evidence that security breaches can affect brand, marketplace trust, customer privacy and identity, not to mention the bottom line. The proliferation of…
Why your Cybersecurity strategy needs DevOps
A chain is only as strong as its weakest link In the past few years, leaders have accepted that the human error is the biggest security risk to an organization, and organizations have responded with valuable policies and programs such as security awareness training and multi-factor authentication. Necessary, but not sufficient. Organizations must continue implementing more robust security measures, expanding…
What Do Castles and Internet Security Have in Common?
For the past two decades myself and a handful of others have been preaching the fact that organizations must look at security through a different set of glasses. For too many years we’ve been enamored with the bright shiny objects created by Symantec, IBM, Checkpoint and other technology companies where they want to keep the…
The Ultimate Backstop for Hospital Cybersecurity
By Bill Siwicki | April 15, 2016 “Healthcare entities that want to be well positioned against cybersecurity threats must know what resources they have, how those are configured, and tightly control any changes,” IT Process Institute chief executive Scott Alldridge said. IT Process Institute CEO Scott Allridge has cybersecurity advice for healthcare executives: Consider ITIL,…
Essential Elements of a Cybersecurity Program
Cybersecurity is getting a lot more attention these days, even if it is not all the attention it deserves. (Did you know that breaches are still increasing faster than spending on cybersecurity? Some of the best data in this space comes from the federal government – here’s a good synopsis: Federal Cybersecurity Breaches Mount Despite…
Depending on Open Source software is Risky Business (and Heartbleed proves it!)
By all accounts, Heartbleed is the worst security flaw in the history of the Internet. What it is and why it is so bad has been talked about ad nauseum, so I won’t bore you with those kinds of details, but here are a couple places to learn more about it if you are not…
Is DevOps really the next Great Thing in IT?
The Good Many of the DevOps movement’s founders come from the IT Ops world, and are asking the right question: What is important to the Business, and how do we, in IT Ops, align our efforts with what the Business cares about? The Dev guys already figured this out, quite a while ago. The first…
Is ITIL doing you any good?
I have been thinking lately about success and failure in the IT Department, particularly as it relates to ITIL. Lots of IT organizations implemented ITSM systems built around the ITIL framework… but the magical results many dreamed of are nowhere to be found. Folks are still struggling to find the promised productivity and availability gains,…
- « Previous
- 1
- …
- 8
- 9
- 10
FREE REPORT
Cybersecurity Protection Strategies, Engaging VisibleOps
In a world where cybersecurity threats are increasingly complex, organizations must adopt robust practices to secure their IT operations.
“The VisibleOps Handbook” series produced by IP Services, in partnership with the IT Process Institute, provides a framework to address these challenges, focusing on creating transparent and auditable IT processes.
Learn more about these risks in IP Service's Free Report: "Cyber Attack Primer".