IT Expert Blog

Essential Elements of a Cybersecurity Program

By Scott Van Den Elzen | - Nov. 03, 2015

Cybersecurity is getting a lot more attention these days, even if it is not all the attention it deserves.  (Did you know that breaches are still increasing faster than spending on cybersecurity?  Some of the best data in this space comes from the federal government – here’s a good synopsis:  Federal Cybersecurity Breaches Mount Despite…

Depending on Open Source software is Risky Business (and Heartbleed proves it!)

By Scott Van Den Elzen | - May. 07, 2014

By all accounts, Heartbleed is the worst security flaw in the history of the Internet.  What it is and why it is so bad has been talked about ad nauseum, so I won’t bore you with those kinds of details, but here are a couple places to learn more about it if you are not…

Is DevOps really the next Great Thing in IT?

By Scott Van Den Elzen | - Apr. 12, 2013

The Good Many of the DevOps movement’s founders come from the IT Ops world, and are asking the right question: What is important to the Business, and how do we, in IT Ops, align our efforts with what the Business cares about? The Dev guys already figured this out, quite a while ago. The first…

Is ITIL doing you any good?

By Scott Van Den Elzen | - Apr. 09, 2013

I have been thinking lately about success and failure in the IT Department, particularly as it relates to ITIL. Lots of IT organizations implemented ITSM systems built around the ITIL framework… but the magical results many dreamed of are nowhere to be found.  Folks are still struggling to find the promised productivity and availability gains,…

FREE REPORT

Cybersecurity Protection Strategies, Engaging VisibleOps

In a world where cybersecurity threats are increasingly complex, organizations must adopt robust practices to secure their IT operations.

“The VisibleOps Handbook” series produced by IP Services, in partnership with the IT Process Institute, provides a framework to address these challenges, focusing on creating transparent and auditable IT processes.

Learn more about these risks in IP Service's Free Report: "Cyber Attack Primer".

Get the Report