More from The Register
GSMA places operators' towel on Internet of Things deckchair
Tells devs how to use mobe networks for
GSMA: There are more mobile connections than PEOPLE... but WHO'S HOGGING them all?
We need to track the users
China's annual TV smear segment drags Nikon's name through the mud
Last year's effort saw Apple grovel
Today’s most dangerous security threats
This paper describes the impact of data centre threats and it reveals the latest methods, tools and techniques used by attackers to exploit data centre resources.
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.