Operations | Monitoring | ITSM | DevOps | Cloud

ITSM

The latest News and Information on IT Service Management, Service Desk and related technologies.

What is The ITIL Priority Matrix And How to Use One

Done well, an ITIL Priority Matrix can decrease service downtime, improve customer and employee experience, and make request and change processes more efficient. In this video, we'll cover what a Priority Matrix is, how it works, and the pros and cons of using one. We'll also identify some essential concepts you need to be familiar with.

Mastering ITAD: A Guide to Secure IT Asset Disposition

Ever wonder what happens to all those old computers and smartphones when businesses upgrade their tech? It's not as simple as tossing them in the trash. Enter the world of IT asset disposition, or ITAD for short. This growing field focuses on responsibly managing the lifecycle of technology equipment, from reuse to recycling. It's a crucial process that balances data security, environmental concerns, and regulatory compliance. In this article, we'll explore the ins and outs of ITAD.

Microsoft Crowdstrike Recovery Tool: How it Works and Last Updates

Tools that simplify recovery processes are invaluable and this article is example of that statement. The new Microsoft CrowdStrike Recovery Tool is a new solution designed to assist IT and system administrators in swiftly addressing issues caused by the problematic CrowdStrike update that affected millions of Windows systems.

8 Crowdstrike IT Outage Stats To understand How it Affected the World

On July 19 2024, there was a significant IT disruption caused by a faulty software update to the Crowdstrike Falcon Sensor for Windows systems. The update led to widespread system crashes and the "Blue Screen of Death" (BSOD), affecting numerous sectors globally, including major airlines, banks, and media outlets. The incident grounded approximately 1,500 flights in the United States, disrupted banking transactions, and caused various media services to go offline.

The Critical Role of the CMDB in Security and Vulnerability Management

Effective security and vulnerability management is crucial to safeguard organizations from ever-evolving cyber threats. At the core of these practices lies the Configuration Management Database (CMDB), a powerful resource that offers a centralized view of an organization's IT infrastructure. The CMDB plays a pivotal role in upholding robust security and vulnerability management strategies – empowering organizations to proactively identify, evaluate and address risks to their IT systems and data.

AI As It Stands: Unpacking IT Trends at SolarWinds Day

The SolarWinds IT Trends Report 2024 – AI: Friend or Foe? indicated tension in the IT industry’s outlook on artificial intelligence (AI). While there is excitement about its potential to drive productivity, concerns linger around data quality, security, and regulation. At the recent SolarWinds Day event, I sat down with Krishna Sai, Senior Vice President of Engineering, and Cullen Childress, Senior Vice President of Product Management.

What's happening with ITSM in 2024?

The lines between IT service management (ITSM) and AIOps are blurring. The Gartner Hype Cycle for ITSM, 20241 discusses this exciting convergence. Traditionally, ITSM has focused on structured processes and best practices. AIOps brings valuable new capabilities to service management, including automation, correlation, machine learning, and real-time insights. This convergence augments established ITSM frameworks and processes rather than replace them.

Bridging the Gap: Enhancing Cybersecurity through IT, Security, and Business Alignment

Bridging the Gap: Enhancing Cybersecurity through IT, Security, and Business Alignment The discussion explores the role of IT and security teams in technology and the challenge of translating these efforts into business understanding for resource allocation. It emphasizes the need to reinvent approaches to bridge gaps between IT, security, and business understanding. The importance of breaking down organizational silos, adopting the Secure by Design standard, and aligning with the CIO and CISO to enhance security is highlighted.

How To Become A Fractional Executive

Learning how to become a fractional executive begins with understanding the unique dynamics and demands of this role. Are you… From building the necessary skills to creating a personal brand and network, the journey is multifaceted but rewarding. This article is for: Fractional executives offer their expertise on a part-time or contract basis, making it an appealing career for those with a wealth of experience who seek flexibility and diversity in their professional lives.