More from The Register
Unlock and start General Motors cars with a $100 box of tricks – hacker
Flap over crap OnStar app yak, all will be revealed at DEF CON yap
General Motors issues STOP DELIVERY for 2,800 corvettes over defects in 2015 model
Faulty air bags and parking brake cables halt sales
Ford: Our latest car gizmo will CHOKE OFF your FUEL if you're speeding
Fighting automatic regulation with automatic adherence
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
OpenStack for enterprise: The tipping point cometh
A brief history of the OpenStack cloud operating system, its releases and projects, and significant enterprise adoptions.
Ensure a more secure future
Insights for CIOs regarding transforming the security organization into five core functional areas. This paper concludes the series by looking at securing the greater future.
Use actionable threat intelligence to protect your digital business
Key characteristic of actionable threat intelligence and learn how to maximize threat intelligence to protect your digital business from targeted cyber-attacks.