More from The Register
Curiosity photographs mysterious metal object on Martian rock
Shiny 'flower' sets Mars-watchers aflutter
UK cops caught using 12 MILLION Brits' mugshots on pic database
'Reliability' of face-matching tech vexes legal eagle
German minister fingered as hacker 'steals' her thumbprint from a PHOTO
Merkel's iris print could be next
Today’s most dangerous security threats
This paper describes the impact of data centre threats and it reveals the latest methods, tools and techniques used by attackers to exploit data centre resources.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Executive’s guide to Windows Server 2003 End of Life
Bit9 + Carbon Black offers an advanced security solution that your organization can deploy as a compensating security control in lieu of regular patching and updates that are no longer available from Microsoft.
Network DDoS protection
Distributed denial of service (DDoS) attacks have grown dramatically in frequency, size and complexity. Learn how to combat this rising threat.