Most IT professionals take for granted their virtual private network (VPN) infrastructure. Yet VPNs have played a major role in some of the most damaging data breaches on record. This paper offers five do’s and don’ts that will dramatically improve your ability to protect yourself against VPN-based attacks.
Kathryn Cave looks at the big trends in tech
Rupert Goodwins’ unique angle on tech change
Phil Muncaster reports on China and beyond