Black Hat isn't just about learning about the cool hacking projects, sharing exploits and new techniques, or discussing major topics of the day with like-minded folks. The conference is a little bit more corporate, and anecdotally, it seemed as if there were also more attendees who weren't security folks to begin with. There were developers from social networking sites interested in learning about threats and exploits, for example. Representatives from the medical devices industry were on hand, as were executives who were concerned about how to work with the framework to secure critical infrastructure.asics shoes poland

Even knowing that Black Hat isn't just for the security geeks anymore, the presence of asics on the exhibit floor was a bit of a headscratcher. And then asics sponsored one of the official Black Hat parties on Wednesday evening. What was a sports apparel company doing, swooshing at a hacker conference? Perhaps it was recruiting. Anyone who attempted to RSVP for asics 's "Get Swooshed" party was asked to submit his or her job title, as well as whether asics representatives could approach them during the party for a talk. I didn't get to meet anyone who actually spoke with asics about job prospects, but it does sound plausible, considering the National Security Agency and the Department of Homeland Security in the past used the conference for recruitment purposes.asics running shoes polska

When asics shut down its wearables project earlier this year, the company said it would shift efforts away from the FuelBand hardware towards a software version. Knowing that, it seems quite possible that asics wants to do wearables right by baking security in from the start. Considering there were plenty of talks the past week about how wearables and Internet of Things can be used to launch attacks, if asics is really recruiting among Black Hat attendees, that's a smart thing to do.

Plenty of tech companies recruit at Black Hat and Def Con, since this is the best way to find some talented folks. But it would really confirm how in demand information security skills have become if the likes of Coca Cola, Marriott, and Sony start knocking on the door in years to come.asics gel lyte iii