IT Automation software is used by enterprise networks to manage large swaths of machines in a single go.
They function with a client/server relationship where an administrator can remotely access systems within the network in order to work with them.
In other words, they function a lot like botnets, and for the most part, are botnets.
This Saturday we will be examining IT automation software packages for vulnerabilities in both the client and server software.
We will also be discussing the Hacker Halted conference that took place this week.
Place: HackMiami Space @ Sun Electronics Warehouse
690 NW 14th Street