Welcome to the 21st century, where securing your legacy computing environment means trying to protect legacy systems that were never intended to do what they do today. A better approach is to protect users on whatever device they use and create a more secure environment overall.
Jon Collins’ in-depth look at tech and society
Phil Muncaster reports on China and beyond
Kathryn Cave looks at the big trends in tech