Lastest news

CIS controls for protecting IT infrastructure

Cybersecurity is one of the most worrisome issues for companies today....

Success story BCI Seguros together with Conytec Consultores

BCI Seguros, a leading firm on its market in Chile, placed...

Consider you vulnerable assets over the long term…

When we refer to vulnerabilities and cybersecurity, we mean weaknesses in...

5 benefits of implementing NLP in your organization

NLP stands for Natural Language Processing.If we add NLU ( If...

Reduce the risk of cyberattacks by 30% by simply applying patches

Some time ago, in one of by presentations, I shared with...

5 steps to initiate your ITSCM practice

I am one of the people who try to find a...

Objective: business continuity (thanks to IT)

...Or how to start your ITSCM practice in only 5 steps

Optimization of the Service Desk with ITIL problem management

I am a big fan of Problem Management (in essence, it...

CMDB without ITAM? A complete failure!!

Tackling a CMDB implementation project is no trivial matter (it is...

The importance of proper change management (I)

One of our Proactivanet coworkers, José Luis Fernández, illustrates with 2...

CMDB modeling and IT service quality

For me, this always has seemed to be a rather critical...

Bad practices in service provision (1 of 2):

ITIL has become the de facto standard for implementation of good...