Welcome to the 21st century, where securing your legacy computing environment means trying to protect legacy systems that were never intended to do what they do today. A better approach is to protect users on whatever device they use and create a more secure environment overall.
Mark Chillingworth on IT leadership
Phil Muncaster reports on China and beyond
Kathryn Cave looks at the big trends in tech