Most enterprise IT professionals agree that securing the network only at the perimeter is inadequate for today's data centers. Once malware has managed to make its way behind the firewall by latching onto an authorized user (or other means), it can move easily from workload to workload. This lateral movement is possible due to lack of sufficient internal network controls regulating server-to-server or east-west network traffic.
Jon Collins’ in-depth look at tech and society
Phil Muncaster reports on China and beyond