More from The Register
China's annual TV smear segment drags Nikon's name through the mud
Last year's effort saw Apple grovel
Today’s most dangerous security threats
This paper describes the impact of data centre threats and it reveals the latest methods, tools and techniques used by attackers to exploit data centre resources.
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Network DDoS protection
Distributed denial of service (DDoS) attacks have grown dramatically in frequency, size and complexity. Learn how to combat this rising threat.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.