More from The Register
Small number of computer-aided rifles could be hacked in contrived scenario
Year-long publicity effort hits bullseye ... in a way
LG G4: Be careful while fingering this leather-clad smartie pants
Review Removable battery, micro SD expansion? Walk this way...
The seven stages of advanced threats
Gain a deeper understanding of the seven stages of advanced threats and how they affect your organization
Assuring application performance at scale
Empowering data center operators with an open and programmable network that easily scales to thousands of compute and storage nodes.
Magic Quadrant on managed security services
This Magic Quadrant presents enterprise buyers with advice on selecting MSS providers to support global service requirements.
Breach response: How to prepare for the inevitable
To avoid being breached, you have to get it right every single time. To breach you, hackers only have to get it right once.