Idwell on Service Management

Thoughts on how to design and implement IT Service Management


Leave a comment

How will ITSM play its part fighting the IT security threat? 

Threats of terrorism mean that IT security is no longer just about business integrity issue, it has become a political issue.  As the profile and importance of security grows, ITSM will increasingl…

Source: How will ITSM play its part fighting the IT security threat? | SITS Community


Leave a comment

Continuous Security Key to Defending Your Data Well

Defending data isn’t easy. If it were, we wouldn’t see new data breach headlines on a weekly—or sometimes even daily—basis. That said, defending data also isn’t rocket science. A new report from Nuix highlights some of the major concerns with protecting data, and also illustrates some of the ways in which consistent vigilance is half …

Source: Continuous Security Key to Defending Your Data Well – DevOps.com


Leave a comment

The difference between job roles and functional positions and how it relates to “adopt and adapt” 

Blog post discussing the importance of the distinction and differences between job roles and functional positions within ITSM for organizations.

Source: The difference between job roles and functional positions and how it relates to “adopt and adapt” – AXELOS Blog Post