IDG's Top Enterprise Stories | | | Our top picks from IDG's editors | | | | | Poor training can sink a technical implementation, derail a digital transformation or leave you scrambling to fill gaps when employees leave. Here's how to structure you training practices for practical success. Read More ▶ | | | KnowledgeVault: Bitsight Organizations are increasing their use of third-party partners for outsourcing-but these partnerships can create security risks. Businesses need a way to quickly assess the security risk of new vendors, which is where a strong Vendor Relationship Management (VRM) strategy comes into play. Learn how partnering with the right VRM provider can help address risks in real time, speed-up decision making, and enable business growth. Read More ▶ | Some people aren't taking hardware vulnerabilities like Meltdown and Spectre seriously. Here's a point-by-point rebuttal to their arguments. Read More ▶ | | Edge computing is simply about pushing some of the cloud's processing and storage out near to the devices that produce and consume the data Read More ▶ | | | Enterprises in logistics, financial services and agriculture are betting on the digital ledger technology as the future for facilitating and verifying business transactions. Read More ▶ | | Peer-to-peer networks are emerging that use blockchain to manage cloud storage based on the sharing of excess drive and network capacity on PCs and in data centers. Those sharing their capacity not only get free storage, but can be paid in cryptocurrency. Read More ▶ | | Humans make irrational decisions under pressure. Security training needs to focus on changing behavior, not just raising awareness. Using effective analogies can help. Read More ▶ | | Microsoft has built an analytic playground with open-source Jupyter Notebooks in its cloud Read More ▶ | | Stop repeating yourself for no reason — and start taking back valuable time in your day. Read More ▶ | | Vendors are bundling endpoint detection and response (EDR) into endpoint security suites. CISOs want it, but they aren't sure how to consume it. Read More ▶ | | White Paper: Centrify Corporation The Centrify Zero Trust Security model assumes that untrusted actors already exist both inside and outside the network. Trust must therefore be entirely removed from the equation. Zero Trust Security requires powerful identity services to secure every user's access to apps and infrastructure. Read More ▶ | | | |