More from The Register
Bonking with Apple has POUNDED mobe operators' wallets
... into submission. Weve squeals, ditches payment plans
Euro consumers have TOO MUCH choice – telco operators
Let us meeeeerrrrrge, GSMA begs European Commission
Leaked: Mobile operators' SCARE campaign against net neutrality
Video streaming won't work but paedo sites will
'National roaming' law: Stubborn UK operators to be FORCED to share
Gov: Frenchies can't have a better signal than us Brits
Empowering E-commerce against unpredictable demand
Exploring common challenges facing E-commerce platform and B2C website managers planning for the holiday shopping rush and bolstering services to meet customer demands.
Magic Quadrant for identity governance and administration
Organizations are moving to IGA solutions such as IBM Security Identity Governance and Administration to help improve compliance and lower total cost of ownership.
2015 Cyber Risk Report
This comprehensive report culminates a year-long effort by one of the most capable and respected security research organizations in the world.
Use actionable threat intelligence to protect your digital business
Key characteristic of actionable threat intelligence and learn how to maximize threat intelligence to protect your digital business from targeted cyber-attacks.