More from The Register
Curiosity photographs mysterious metal object on Martian rock
Shiny 'flower' sets Mars-watchers aflutter
Nude celeb iCloud hack: Feds seize Chicago man's computers
‘Targeted attack’ traced back to IP address
Fireworks expected from Oracle at Flash Memory Summit
Comment Mentions for wine, wiener dogs and wetsuits also possible during presentation
Street Culture: Reg man's snazzy snaps of punky London go on display
Captures capital's sharp, stylish side from 1976 to 1988
The 8 high-risk cyber threats that put all organisations at risk
In the 2015 Threat Report, Websense Security Labs explores trends that pose significant risk for data theft and how to tackle them.
OpenStack for enterprise: The tipping point cometh
A brief history of the OpenStack cloud operating system, its releases and projects, and significant enterprise adoptions.
Strengthening networks and endpoints with behaviour-based protection
How integrated, intelligent solutions from IBM can detect and help prevent threats from the network perimeter to remote endpoints
State of security operations 2015
HP Security Intelligence and Operations Consulting has assessed the capabilities of 87 security operations centers worldwide. This updated report bring you the latest information.