More from The Register
General Motors turns key on bug bounty program
With a zillion suppliers under the hood of most cars, this could get interesting
Mitsubishi 'fesses up: We lied in fuel tests to make our cars look great
President hangs head in shame
General Motors issues STOP DELIVERY for 2,800 corvettes over defects in 2015 model
Faulty air bags and parking brake cables halt sales
Secure Mobile Development Best Practices
Covering the vulnerabilities hackers might use to launch an attack, and remediation tips that you can use to build security into your app.
Preparing for Private Cloud and Hybrid IT with Red Hat Cloud Infrastructure
IT organizations continue to run many of their traditional apps on premise, moving to private cloud, while using public shared cloud for selected “other” workloads.
Advanced Evasion Techniques for Dummies
This e-book explains how AETs defeat traditional security measures and how you can beat them, with special attention to the risks posed to industrial control systems
Moving Beyond User Names and Passwords
Move beyond user names and passwords, and see how a multi-factor authentication solution for on premises and cloud apps provides both security and simplest administration possible.