More from The Register
General Motors turns key on bug bounty program
With a zillion suppliers under the hood of most cars, this could get interesting
Toyota Yaris Hybrid: Half-pint composite for the urban jungle
Vulture at the Wheel Little mixer won’t excite but it cuts the mustard in the city
Toyota recalls 625,000 hybrids: Software bug kills engines dead with THERMAL OVERLOAD
Prius owners look less smug
Toyota chucks 50 MEELLION BUCKS at AI car tech
Buddies up with Stanford and MIT boffins to drive down road injuries and deaths
Data theft prevention
This data theft prevention report focuses on how to stay secure while you innovate from a broader, in-scope, more intelligent in application perspective.
Strengthening networks and endpoints with behaviour-based protection
How integrated, intelligent solutions from IBM can detect and help prevent threats from the network perimeter to remote endpoints
Licensing, compliance and audits in the cloud era
VMTurbo conducted this survey to investigate the challenges organisations face maintaining software licensing compliance and strategies they implement.
The 8 high-risk cyber threats that put all organisations at risk
In the Threat Report, Forcepoint Security Labs explores trends that pose significant risk for data theft and how to tackle them.