More from The Register
Fiat Chrysler recall BLUNDERING could lump carmaker with $105m fine – report
Crazy hack-my-brakes software flaw faces separate probe
Apple chief Cook cooks up rumours after BMW car talks, factory tour
Sometimes you get so lonely, sometimes you get nowhere
Hacker-friendly Chrysler hauled into court for class-action showdown
Black Hat 2015 Should have fixed this remote-control vulnerability last year, peeps
Firmware fixes and hybrid bundles make mutant MSAs meatier
HP boosts entry-level MSA arrays with flash
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Demand-driven application control: assuring application performance
The evolution of enterprise applications, the data centers in which they reside and the increasing expectations of businesses and end-users on the Quality of Service delivered.
Strategy considerations for building a security operations center
This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise security operations center (SOC).
The evolution of ransomware
How different types of ransomware work, not just from a technological point of view but also from a psychological viewpoint.