More from The Register
General Motors turns key on bug bounty program
With a zillion suppliers under the hood of most cars, this could get interesting
General Motors issues STOP DELIVERY for 2,800 corvettes over defects in 2015 model
Faulty air bags and parking brake cables halt sales
Unlock and start General Motors cars with a $100 box of tricks – hacker
Flap over crap OnStar app yak, all will be revealed at DEF CON yap
General Motors to intro HANDS-FREE DRIVING tech by 2016
Mary Barra's firm will also get your cars chatting to each other
The 8 high-risk cyber threats that put all organisations at risk
In the Threat Report, Forcepoint Security Labs explores trends that pose significant risk for data theft and how to tackle them.
Securing Your Network and Application Infrastructure
A range of industry analysts, consultants, and hands-on security experts provided responses to this question.
NoSQL does not have to mean no security
A basic introduction into NoSQL, the security implications for NoSQL, and how IBM InfoSphere Guardium solutions can help speed the deployment of NoSQL.
Maximising the benefits of the virtual classroom
This e-book explores common challenges facing academic institutions planning for, deploying and maintaining a VDI environment ensuring maximum value.