The 7 Security Changes CIOs Need To Make Now

by Niall Browne of LiveOps As our personal and professional lives become more intertwined, the amount of digital data stored and accessed by companies, their employees and staff is staggering. From banking records to medical information, personal identifiers and business transaction histories, a treasure trove of sensitive information is a tempting target to cybercrooks. Moreover,…

Better Outcomes: Integrating Defect and Problem Management

While a primary objective of ITIL’s Problem Management process is to prevent problems and resulting incidents from happening, most organizations commonly start implementing Problem Management with a reactive approach. This is commonly referred to as “reactive” Problem Management (PM) because, as its name implies, a service disruption has already occurred. On the other hand, “proactive”…