More from The Register
China's annual TV smear segment drags Nikon's name through the mud
Last year's effort saw Apple grovel
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Today’s most dangerous security threats
This paper describes the impact of data centre threats and it reveals the latest methods, tools and techniques used by attackers to exploit data centre resources.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.