More from The Register
Curiosity photographs mysterious metal object on Martian rock
Shiny 'flower' sets Mars-watchers aflutter
Nude celeb iCloud hack: Feds seize Chicago man's computers
‘Targeted attack’ traced back to IP address
Fireworks expected from Oracle at Flash Memory Summit
Comment Mentions for wine, wiener dogs and wetsuits also possible during presentation
Street Culture: Reg man's snazzy snaps of punky London go on display
Captures capital's sharp, stylish side from 1976 to 1988
Five key tenets of cybersecurity oversight
This report provides a non-technical overview every board of director can use to assess their organisation’s security posture.
Assuring workload performance through Pure Storage and VMTurbo
Three primary use cases for the VMTurbo Pure Storage Control Module are discussed, including assuring performance in both homogeneous and heterogeneous storage environments.
Strategy considerations for building a security operations center
This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise security operations center (SOC).
Internet of Things 2 report
Testing 10 popular home security systems. The results will make you feel anything but secure.