Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "Black Hat"

Total Search Results : 15

Security Conferences: Advice From The Trenches

July 30, 2013 11:52 AM
IT security conferences can offer enriching experiences, but also might be draining and irritating without proper planning. Here are some tips for making sure you make the most of your conference experience.

9 Technologies Security Researchers Will Break At Black Hat

July 29, 2013 05:14 PM
This week's Black Hat USA Conference in Las Vegas will showcase hacks, tools and ideas that will once again challenge the way we think about IT security. Here are nine technologies that will be on the firing line as security researchers discuss and demonstrate vulnerabilities and exploits.

The Dark Side of the Internet of Things

March 25, 2013 12:37 PM
From cameras to industrial controls to GPS systems, the increased connectivity of devices leads to increased risks.

Vendors Roll Out Mobile Security, Vulnerability and Forensics Tools

August 06, 2012 12:37 PM
Mobile device management (MDM) is top of mind for many nowadays, so it's not surprise that mobile security was a focus at Black Hat. Learn more about MDM products announced during the show, as well as new vulnerability management and forensics tools.

Those Free Mobile Apps May Come at a Price: The Latest BYOD Threat

July 26, 2012 02:48 PM
Research from Black Hat shows that even legitimate mobile apps can still pose threats. Researchers share why, and how companies can address enterprise app security.

Research: New SOHO Router Vulnerabilities May Put Enterprises at Risk

July 09, 2012 01:37 PM
A researcher will present findings at Black Hat later this month regarding a new vulnerability in small office, home office wireless routers that gives an attacker root-level access, along with the ability to extract arbitrary files from the router file systems, including plain-text passwords.

Black Hat Will Once Again Show Our Security Weaknesses

August 01, 2011 11:15 AM
The most important thing about Black Hat is the reality check it provides on just how insecure everything really is, from computers to networks to mobile devices to industrial and other systems that are now increasingly connected and exposed. And this week’s Black Hat will be no exception, as several scheduled demos will display just how scary some of these security holes can be.

Cisco Says It Can't Confirm PIX Flaw

August 15, 2006 10:51 PM
After nearly three weeks of investigating a potential vulnerability in its PIX 500 Series Security Appliances, Cisco on Tuesday said it hasn't been able to confirm that the flaw is

Black Hat: Vista Vulnerable To Stealthy Malware Despite Body Cavity Search

August 04, 2006 04:00 AM
A security researcher demonstrated how to trick the Windows Vista Beta 2 kernel, x64 edition, into allowing any unsigned device driver to be loaded onto a user's system. This opens

Cisco's Chief Security Officer Explains NAC Strategy Shift

August 03, 2006 07:00 PM
At the Black Hat security conference in Las Vegas this week, Cisco Systems chief security officer John Stewart discussed recent developments in Cisco's network admission control (NAC) initiative as well

 1 | 2  | Next Page » 

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers