Blogs

­
3005, 2013

Security Automation Webcast

May 30th, 2013|Blog|

In today's world of near-constant updates and patching, keeping a network up-to-date and secure is no easy task. After all, every time a vendor discloses a security vulnerability, network security administrators must identify affected devices [...]

2005, 2013

BlueHat: An ICASI member benefit

May 20th, 2013|Blog|

One notable perk of ICASI's non-profit forum of trust is that members often invite other members to their usually exclusive internal security conferences. Thanks to ICASI, it's not unusual to see, for instance, some Cisco employee attend Intel's [...]