Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Webinars

February 20, 2019

How can enterprises prevent "social engineering" attacks? Can users be trained to recognize such exploits and avoid them? Join Dark Reading as we invite top experts to discuss the most effective methods of defending against social engineering attacks.

February 14, 2019

In this Dark Reading webinar, top experts offer insight on the threat posed to Industrial control systems (ICS) systems, and how you can expand your security strategies to protect them.

January 30, 2019

The network has always been important, but as more enterprises embrace digital business initiatives, it becomes even more critical. However, many network environments have not kept pace with the rest of IT and are unable to meet business requirements without major changes. In this session, we'll explore the organizational culture that must shift to include network managers in digital initiatives, and the technical options available to help modernize network systems, including software-defined wide area network (SD-WAN) and network function virtualization (NFV), network automation, and cloud services.

January 17, 2019

When it comes to cloud security, consistency is everything - your cloud controls should mimic your on-premise implementations, so you have complete consistency of security policy enforcement across environments.

April 24, 2018

The Internet of Things (IoT) is one of the fastest-growing areas in the technology industry, enabling companies to connect with a multitude of devices, users and systems, and to learn from the data they collect. In fact, recent research has shown that over 60% of organizations have or are already planning on implementing an IoT solution, and more and more business leaders are understanding the immediate requirements around IoT deployment.
However, what are the biggest challenges in actually implementing and supporting these initiatives? IoT projects and applications can’t deliver quantifiable business benefits unless enterprises first create a reliable, secure IT infrastructure to support the hundreds or thousands of IoT endpoints and the tide of data they generate.