According to 2015 research reports published by Ponemon, Mandiant, and others, median intruder dwell time in a target network prior to detection ranges from just under to just over 200 days. That is a little over six months and as everyone agrees, totally unacceptable.
The Desperate Need for Accuracy and Efficiency in Security for Detecting Network Intruders and Other Threat Actors Quickly
By David Monahan on Apr 14, 2016 2:37:49 PM
2016: Looking Ahead at ITSM—Want to Place Any Bets?
By Dennis Drogseth on Jan 22, 2016 12:52:29 PM
I thought I’d begin the year by making some predictions about what to look for in 2016 in the area of IT service management (ITSM). For those of you who have been following my blogs with any regularity, and particularly for those who sat in on our webinar for the research report “What Is the [...]
Why Analytics and Automation Are Central to ITSM Transformation
By Dennis Drogseth on Nov 9, 2015 11:12:00 AM
In research done earlier this year, we looked at changing patterns of IT service management (ITSM) adoption across a population of 270 respondents in North America and Europe. One of the standout themes that emerged from our findings was the need for the service desk to become a more automated and analytically empowered center of [...]
The Future of ITSM: How Are the Roles (and the Rules) Changing?
By Dennis Drogseth on May 28, 2015 8:09:36 AM
Both the “rules” and the “roles” governing IT service management (ITSM) are evolving to support a far-broader need for inclusiveness across IT, and between IT and its service consumers. Recent EMA research, “What Is the Future of IT Service Management?” (March 2015), exposed a number of shifting trends that might surprise many in the industry. [...]
ITIL and the Elusive Configuration Manager (among other) Roles
By Dennis Drogseth on Mar 30, 2011 9:46:47 AM
I had originally intended to make this blog about mental health. A supportive article for those of you trying to support change in your own environment wrestling with the stubbornly persistent caricatures and silos still so dominant in many IT organizations. It was inspired by a rather nasty line in a novel my one of [...]