Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Stefan Kempter on What is YaSM, Yet Another Service Management Model

In the dynamic field of IT Service Management (ITSM), innovation takes center stage through groundbreaking ITSM frameworks. YaSM, Yet Another Service Management Model, is one such remarkable approach that stands as a beacon of simplicity and adaptability. In the 69th episode of Ticket Volume, our host and InvGate Product Specialist, Matt Beran, dives into a captivating conversation with the visionary behind YaSM – none other than Stefan Kempter himself.

Enhance Your Customer Service with PagerDuty for ServiceNow CSM

In today’s fast-paced, digital-first landscape, delivering exceptional customer experience is paramount to business success. For customer service teams, that means maintaining service level agreements (SLAs) and ensuring swift responses to customer issues that can make or break your company’s reputation. Fortunately, PagerDuty has improved the way companies handle customer service teams and has built applications into ServiceNow’s CSM platform.

How to Identify Your Organization's Attack Surface

Our glossary page on attack surfaces defined the terms associated with the concept. This post provides information that'll help your organization identify its attack surface. Much like your lawn after a good rain, your attack surface will grow rapidly if left unchecked. Along with increases in attack surface size comes an increase in cybersecurity risk. That risk can’t be eliminated as attack surfaces are always evolving, but it must be carefully managed.

Which Gen Is Most Tech-Savvy? A Workforce Dilemma

Part one of a four-part series covering Ivanti’s latest research. Get the full series: According to new cybersecurity research by Ivanti, the employees who are the most tech-savvy aren’t necessarily the ones we’d presume, demographically speaking. Why is that? And what are the issues it creates for an enterprise?

Red Flag Reluctance: The Risk to Cybersecurity

Part two of a four-part series covering Ivanti’s latest research. Get the full series: Keeping an organization safe means getting near-real-time information about security incidents or breaches. But new research shows some employees are less inclined than others to report red flags, which puts your business at risk. Will your employees get in touch quickly if they have a security concern?

International Inconsistencies: How Cybersecurity Preparedness Varies Across Countries

Part three of a four-part series covering Ivanti’s latest research. Get the full series: An organization’s culture and training programs have a significant influence on security preparedness, but our research shows both are inconsistent at the country-to-country level. As we’ve seen in the previous posts in this series, employee demographics and their willingness to report security risks are hidden threats to your cybersecurity posture.

The Ins And Outs of Software Compliance

Software compliance protects your organization from legal, regulatory, and reputational damage. Done well, it stands as a fundamental pillar of your IT Asset Management (ITAM), by helping you keep track of your software assets and manage licenses effectively. Here, we will explore what this practice entails and how it can benefit your business both from an administrative and a financial perspective.