This review first appeared in issue 350 of PC Pro.
Veritas Backup Exec (BE) has always been one of our top choices for on-premises data protection. It delivers a comprehensive range of backup and recovery services. The BE Simple licensing plans make it very affordable for SMBs, and BE 22.2 on review introduces plenty of new and welcome features.
Microsoft 365 (MS365) backups now support SharePoint and Teams as well as Exchange Online and OneDrive. Microsoft Azure Object Lock provides ransomware-protected immutable cloud storage, backups to ReFS volumes can be accelerated, anomaly detection protects backup scripts from tampering, and BE now uses the FIPs-compliant deduplication engine from Veritas’ enterprise NetBackup product.
The simple yearly subscription service is based only on compute instances, which can be a physical system, a virtual machine or ten MS365 users. The starter five-instance Simple Core Pack costs an agreeable £489 per year, and Veritas generously includes a bonus instance for an extra ten MS365 users.
Deployment is swift; we installed BE on a Dell PowerEdge R760xs Windows Server 2022 host in 20 minutes. After declaring our physical servers using their IP addresses, BE pushed the remote agent to them while for our Hyper-V systems, we just needed the agent loaded on the host to secure all its virtual machines.
Adding our VMware vSphere host was simple, and we only had to provide its IP address and credentials. MS365 couldn’t be any easier, either: we added our tenant using the link provided by BE and entered the unique device code it generated for us.
All four components of MS365 can be secured (Image credit: Future)Backup job creation is simple, too: you just select sources from the list presented and choose from a range of predefined strategies. These include backup to disk or cloud, and you can add extra stages in the job for local and offsite backup, replication to other disk stores or conversion to VMs, and add an essential air gap by migrating backup data to tape drives attached to the BE host.
BE supports plenty of storage locations, including physical and virtual disks, cloud, tape, deduplicating stores and network shares. For our tests, we created a local store on the BE server, used a multi-TB share on a Synology NAS appliance and added immutable cloud storage using an Amazon S3 bucket with Object Lock enabled.
Veritas takes data protection very seriously, and the job wizard always advises you to enable encryption. You can choose from 128-bit or 256-bit AES encryption and, if required, only allow the user that created the key for a job to recover data from it.
Data restoration is another pleasant experience: you select a source, view its files, folders or volumes, pick a recovery point and decide where to send them. Creating a simplified recovery disk brings bare metal recovery into play, BE’s Instant GRT (granular recovery technology) is used to restore items such as SQL databases and the Instant VM Recovery feature takes seconds to create a new VM from a backup set. MS365 backups require a deduplicating store, and the best practice is to apply encryption at the store and not the job level otherwise data reduction may not be as efficient. We created one job to protect our Exchange, OneDrive, SharePoint sites and Teams data and used the restore wizard to recover data by choosing a component and selecting a time point.
SMBs that want every data backup and recovery angle covered will love Backup Exec 22.2. It offers a superb range of features, is a strong candidate for protecting virtual environments, cloud support is excellent and it’s very competitively priced.
This review first appeared in issue 350 of PC Pro.
We hoped to include the MultiSync E274FL in our annual group test of “everyday” monitors, but NEC has kept us waiting for this enterprise-friendly screen.
Especially friendly when the E274FL combines three alluring properties: a low price, USB-C docking and integrated wired networking.
As immediately became clear when I put it on my desk, it also produces excellent whites. It’s this, rather than a huge color gamut, that’s most important to office workers after all. The panel’s evident quality was backed up in our tests, where it covered 95% of the sRGB gamut with an average Delta-E of 1.08 and maximum of 3.03. Those are strong figures, even if film lovers won’t be wowed by DCI-P3 coverage of 75%, or print designers by 70% of the Adobe RGB gamut.
A measured contrast ratio of 3,493:1 also confirms that this is an MVA panel rather than IPS. MVA stands for multidomain vertical alignment, and it’s far more commonly found in curved, gaming monitors than monitors aimed at enterprises. Its use here shows that Sharp (maker of the panel and co-owner of the NEC brand) has matured the technology enough to rival IPS. For instance, the faint yellow bias that used to be seen in MVA screens isn’t visible here.
Connect over USB-C and the display supplies 60W of power (Image credit: Future)I’m also used to seeing high refresh rates and low response rates on MVA panels, but the E274FL’s 60Hz and 6ms are bog-standard times. Office workers hoping for a speed advantage in after-hours gaming sessions will be out of luck.
IT departments, on the other hand, will be delighted. While the RJ-45 port gives users fast and secure access to the office network, it gives administrators a way to track their assets and even take control of the OSD without needing to touch the device itself. For example, they may decide that rather than allow the screens to hit their peak brightness – stated as 250cd/m2, but 297cd/m2 in our unit’s case – that the monitor stays in one of its two Eco modes. These lock it to either 30% or 70% brightness, and while the former is dim I found the latter mode to be more than bright enough.
End users should find the OSD relatively easy to navigate. It uses a joystick, with its one quirk being that you need to press right to select an option rather than pressing down as people may be used to. But I don’t expect many calls to the support team to check; trial and error is your friend, and the OSD is extremely quick to respond to commands.
Naturally, this monitor ticks all the ergonomic boxes. There’s a low blue light mode, TCO certification and superb flexibility: 120mm of height adjustment, 170° of easy swivel in both directions, and a pivot mode. Often the latter is pointless owing to a lack of contrast and viewing angles in a vertical orientation, but that definitely doesn’t apply to the E274FL.
With height adjustment, swivel and pivot, the E274FL is supremely flexible (Image credit: Future)I mentioned right at the top that this is a docking monitor, and if you connect over USB-C then it supplies 60W of power to connected laptops; plenty for all the machines in our Labs this month, but I would have liked to see 100W to feed more powerful MacBooks. There are three USB-A ports, and it’s reassuring to see a USB-B port as well; this means you can share peripherals between a laptop on USB-C and a PC that uses the HDMI or DisplayPort inputs.
NEC also provides a pair of reasonable 1W speakers. As their power output suggests, these aren’t going to rock your world, but they’re fine for the occasional YouTube clip and video calls. Before you buy, there’s one final thing to consider. This is a 1,920 x 1,080 panel, and across a 27in diagonal that means text isn’t crisp. There’s a fuzziness to character edges in Word and Excel. This may not have a tangible effect on most workers’ productivity, but a new generation of employees used to pixel-sharp displays on their phones and tablets may not be impressed.
Still, that resolution is reflected in the price. A price that includes a three-year warranty, which covers backlight failures too. If the MultiSync E274FL had arrived in time for our group test, it would have blown away the similarly priced competition for its quality and its connectivity – which is why it walks away with a Recommended award.
Prime Minister Mette Frederiksen announced plans for her visit after U.S. Vice President JD Vance visited a U.S. air base in Greenland last week and accused Denmark of underinvesting in the territory.
(Image credit: Evgeniy Maloletka)
This review first appeared in issue 350 of PC Pro.
Many business backup solutions require a dedicated Windows Server host, but Nakivo’s Backup & Replication (NBR) is far more amenable as it can be deployed to just about any platform you care to name. It will run happily on a Windows host, but also supports Linux, VMware vSphere, Nutanix AHV, AWS EC2, Raspberry Pi and all the main NAS appliance vendors, including Qnap and Synology.
On review is NBR 10.9, which includes bare metal recovery where you use its new Bootable Media Wizard to restore physical Windows and Linux servers from selected backups. Malware protection is now available, with NBR integrating with a range of third-party antivirus products, and all MS365 components, including Teams, can be protected.
Licensing is equally versatile. There are five versions available, with options for perpetual licenses or per-workload subscriptions. Nakivo cuts through any confusion with a cost calculator on its website. We’ve shown the price for an Enterprise 10-server perpetual license with a two-year 24/7 support contract here.
For testing, we chose Qnap’s TS-855eU-RP short-depth 8-bay rack NAS and used the QuTS Hero App Center to load the NBR package. NBR comprises three service components, with a Director for browser-based management, Transporters to handle backup, replication and recovery operations, and Repositories for storing backups.
After adding protected systems to NBR’s inventory, it pushed the transporter service to our physical Windows servers and workstations; note that Mac clients are still not supported. For Hyper-V, the service just needed loading on our host, while for our VMware vSphere host, we only had to provide its credentials for agentless VM backups.
Our Qnap appliance received a default local repository but this was on its system SSDs, so we created another on a large-capacity RAID5 pool. During creation, you must enter the absolute path, which can be found from an SSH session using the Linux List command.
Other possibilities for repositories are local storage, network shares or cloud stores. Ransomware protection comes into play with NBR supporting immutable cloud storage from Amazon EC2 and S3, Microsoft Azure Blob, Wasabi and Backblaze B2.
Services can be extended to MS365 Exchange, SharePoint, OneDrive and Teams (Image credit: Future)Creating backup jobs is simple as options are based on the systems in your inventory. Just choose those you want to protect, assign a repository, set a schedule and decide how daily, weekly, monthly and yearly recovery points you want retained.
For our Hyper-V host, we chose the VMs to be included, and protecting our VMware vSphere system only required the host to be selected so any new VMs would be automatically added to the schedule. To use malware protection, you declare a “scan server” to NBR, which has the required antivirus software running on it.
MS365 licensing is separate, with ten users costing £252 per year, and it requires a special SaaS repository to store backups, which we found isn’t currently supported by QuTS Hero 5.1. Nakivo’s attentive support suggested creating an iSCSI target on the appliance and mapping it to a Windows system running the transporter service – hardly elegant, but it does work.
Recovery features are outstanding. Along with files and folders, granular restores can be used for MS365 items, SQL databases and on-premises Exchange objects. Disaster recovery is just as good, with Flash Boot jobs creating new VMs directly from the backup repository and facilities for replicating VMs as clones.
SMBs that don’t want their backup software tied to a Windows Server host will love Nakivo’s Backup & Replication 10.9 as they can run it on almost any hardware platform and OS they want. It’s good value, MS365 protection is handled well and it provides extensive data recovery services.
This review first appeared in issue 350 of PC Pro.
Hornetsecurity’s VM Backup is designed specifically to protect VMware and Hyper-V environments. It presents a clever management console where most operations can be carried out using nothing more than drag and drop.
VM Backup’s perpetual licenses are based only on the number of hosts, regardless of the sockets each one has. There’s also a subscription model where licensing is charged on the monthly number of VMs being backed up.
A perpetual Standard edition starts at £348 and allows you to back up five VMs per host. You can protect all VMs on each host with the Unlimited edition (£426 per host), while the Unlimited Plus edition on review ups the price to £536 and enables all the features VM Backup has to offer.
And features there are aplenty, with Unlimited Plus 9 enabling support for immutable cloud storage on Amazon S3 and Wasabi, and Azure Blob coming soon. When creating offsite backup locations, you configure these locations as immutable, which brings the Object Lock mechanism into play and turns them into ransomware-resilient WORM repositories.
We installed VM Backup on a Windows Server 2019 host and had our VMware and Hyper-V hosts declared in 15 minutes. After assigning a local hard disk backup repository, we dragged and dropped selected VMs onto it and started our first backups.
VM Backup supports local and external storage, iSCSI targets and UNC paths for NAS shares as backup destination options. For secondary off-site locations you can use physical devices, network shares, the free Offsite Backup Server app and standard or immutable cloud storage. We added a Synology NAS share for our on-site backups and an Amazon S3 bucket with Object Lock enabled for immutable off-site cloud storage.
Plenty of backup destinations are supported (Image credit: Future)Two predefined backup schedules are provided, but it’s easy to create your own with the preferred weekly and monthly recurrences, versioning and retention policies. Each job can include replication to the secondary location. You add VMs by dragging and dropping them on the desired schedule and retention policy icons.
Along with a cloud console for managing multiple VM Backup installations, Unlimited Plus adds constant data protection (CDP) which is enabled on selected VMs and set to run as often as every five minutes. Both Unlimited and Unlimited Plus provide inline deduplication for faster backups, and you can view your storage savings from the dashboard.
A wizard guides you through the data recovery process: you choose a VM, restore its virtual hard disk, clone it or boot it straight from a backup to its original host or to another one. If you need to retrieve a file, folder or on-premises Exchange item, VM Backup provides granular recovery technology (GRT) services.
For data restoration, all three VM Backup versions use the Sandbox & Verification feature to confirm the integrity of all backups. Along with verifying data, it runs a background job that clones a VM back to the original host and confirms that it runs correctly.
VM Backup is an affordable choice for Hyper-V and VMware environments. The Unlimited Plus version delivers a wealth of features at a great price, support for immutable cloud storage, adds valuable ransomware protection and it’s incredibly easy to use.
Brazil's foreign ministry revealed that the administration of Jair Bolsonaro, the right-wing predecessor of current President Luiz Inácio Lula da Silva, had conducted espionage against Paraguay.
(Image credit: Chiang Ying-ying)
National Democrats sent in millions for the liberal's campaign while Trump endorsed — and Musk financed — the conservative's. Abortion, redistricting and Tesla could come before the court.
(Image credit: Vincent Alban)
Republicans won special elections in two Florida Congressional districts. The margins of victory in the heavily-Republican districts were significantly narrower than in November.
(Image credit: Joe Raedle)
I review the best camera phones, but I recently bought myself a dedicated camera. I carry a Galaxy S25 Ultra and an iPhone 16 Pro daily, yet I just bought a camera that's intentionally simpler.
My phones boast optical zoom up to 5X and digital reach well beyond that. I chose a camera with a fixed lens and a field of view slightly wider than my natural vision.
I'm continually impressed by what the best camera phones achieve, but Samsung, Apple, and every phone maker could learn a lot from a camera like the Fujifilm X100VI and today’s best point-and-shoot cameras.
An iPhone 16 Pro (left) with a Galaxy S25 Ultra (right) (Image credit: Future / Lance Ulanoff)My Galaxy S25 Ultra has five cameras, and the iPhone 16 Pro has four. Their largest sensors barely top three-quarters of an inch diagonally. The smallest, for the periscope zoom, are minuscule: 0.4 inches (Samsung) and 0.33 inches (iPhone).
My Fujifilm X-T5 uses an APS-C sensor – smaller than a full-frame (35mm film size) but still around 1.12-inches diagonally. That dwarfs any smartphone sensor.
The largest smartphone sensors currently are the one-inch sensors used by makers like Oppo and Xiaomi. Curiously, these aren't found in models you can buy in the US.
Camera phones do the opposite of what they should Orchids at the New York Botanical Garden, shot with my Fujifilm X-T5 (Image credit: Philip Berne / Future)Why this focus on sensor size? Because it's the spec that really counts, especially on phones where the difference between the smallest and largest sensors is vast, not marginal.
So why don't Samsung or Apple use a full frame sensor? They demand power and physical space – luxuries smartphones lack.
Unfortunately, smartphones often make the opposite error. Instead of one great sensor, they cram in so many tiny sensors that none produce genuinely memorable images.
It’s ambitious what smartphones attempt. Today’s best range from wide-angle (near 18mm) to telephoto (200mm+), with a wide f/1.6 aperture and macro focus. You can buy an 18-200mm camera lens, but not a lens that is this fast (even f/2.8) without spending thousands.
Every smartphone chases the holy grail: an ultra-wide to super-telephoto zoom with microscopic focus. It's unrealistic. To chase it, makers cut corners, yielding phones technically capable but often failing to capture keepers – photos worth saving, printing, and cherishing – real photos.
Apple and Samsung, meet my new friend Fujifilm Fine details and soft bokeh, shot with my Fujifilm X-T5 (Image credit: Philip Berne / Future)Fujifilm gets it. The camera world is buzzing about the Fujifilm X100VI – it's the blueprint smartphones should follow. It uses a large APS-C sensor and a fixed 23mm lens (a 35mm equivalent). It captures phenomenal photos.
No magic here. Fujifilm pairs a great sensor with a versatile prime lens. A fixed lens often means fewer elements, yielding sharper, brighter images. With its 40MP, you can crop digitally and still have a print-worthy resolution.
Image 1 of 3(Image credit: Philip Berne / Future)Shot with my Fujifilm X-T5Image 2 of 3(Image credit: Philip Berne / Future)Shot with my iPhone 16 ProImage 3 of 3(Image credit: Philip Berne / Future)Shot with my Galaxy S25 UltraI crave this from camera phones: one large sensor, not five tiny ones. One superb lens, not a jumble of folded glass and pinholes. Use the space saved from extra sensors for one real camera with a resolution for digital zoom.
The big problem with the Fujifilm X100VI is that you can't buy one. Every reputable retailer has the camera back ordered for months, and the aftermarket is rife with shady scams or folks selling the camera at a 25% markup.
Taking smartphone photography to the edge Like this, but make the camera really good (Image credit: Future / Lance Ulanoff)That leaves an amazing opportunity for the smartphone market to step in with a stylish phone that focuses on high-quality photography instead of winning a spec war with megapixels and zoom.
Ironically, the rumored thin smartphones might nudge things this way. We've seen Samsung's teased Galaxy S25 Edge with only two rear lenses. The latest iPhone 16e uses just one, with a wide f/1.6 aperture, but its sensor remains small. Still, closer.
Give me an iPhone 17 with a massive sensor and a single wide lens – I’d be ecstatic. Forget the megapixel race and the lens count. Just give me light, captured beautifully through one great eye.
Staff that administer programs to help the elderly, disabled people and poor families with basic needs lost their jobs amid the Trump administration's layoffs.
(Image credit: Amy Sancetta)
Elon Musk’s SpaceX and Apple are reportedly in a spat that could ultimately lead to spotty signals for services like Starlink and iPhone satellite communications or a homogenous monopolistic satellite service – neither of which would be great for anyone.
The report comes from The Wall Street Journal (behind a paywall) who say sources familiar with the matter claim SpaceX is pushing US federal regulators to not allow Apple-funded satellite service Globalstar to expand its usage of limited satellite radio frequencies.
This comes after SpaceX and Apple have reportedly been in conversations to more closely collaborate on Apple’s growing satellite communication service, but with talks ending with no direct deal – instead SpaceX and T-Mobile will be able to offer their alternative to Apple’s satellite service on iPhones (with the service due to debut this summer).
Apple instead wants to rely on non-SpaceX networks to support its own satellite communication features – but if Musk’s company gets its way, Apple may struggle to expand without SpaceX’s backing.
Reach for the stars A Starlink dish allowing internet access in a remote place (Image credit: Starlink)As a quick and simple explanation: all satellites send signals to Earth using radio frequencies, and so to ensure service reliability, many parts of the world will license specific frequencies within the radio spectrum on a regional basis. This is to ensure two companies with satellites operating in the same place don’t get their signals all muddled together because they’re trying to use the same frequency.
SpaceX (or any other satellite company) would want to try and control as many of these frequencies as possible because it allows it to send more data, or send data more quickly – which ultimately leads to a better service for its customers.
But one company locking down too many frequencies in a region stops other companies from being able to offer satellite services there – leading to frustrating dead zones – or forces them to offer a worse service there because they can only use a limited band of frequencies. For consumers it also could lead to price gouging, as the service with the most (or total) satellite signal control can charge what it wants.
This latest contest over satellite frequencies likely won’t be the last, but it highlights an issue with this important communication frontier.
Getting reliable internet and signal service to remote services can only be a good thing – as we’ve already seen from people using their iPhone’s Emergency SOS via satellite tool to call for help when they had no other option – but if it isn’t handled with care we could end up with an overly fractured network or one that’s controlled by a lucky few that got there first.
You might also likeA hacker is claiming to have stolen a “highly sensitive” dataset from Check Point - but the company is looking to play down any concerns users might have.
The cybercriminal, going by the name of CoreInjection, posted about the dataset of compromised Check Point files on a cybercrime forum - and alleges that the information contains user credentials, employee contract information, and internal network maps, among other things.
A spokesperson from Check Point told TechRadar Pro that they “really wouldn’t call it a breach”, and added that this was “one account with limited access on a portal”. The firm’s statement assures that this is an “old, known and very pinpointed event,” that only involved a few organizations, and “ does not include customers’ systems , production or security architecture.”
Monitor your credit score with TransUnion starting at $29.95/month
TransUnion is a credit monitoring service that helps you stay on top of your financial health. With real-time alerts, credit score tracking, and identity theft protection, it ensures you never miss important changes. You'll benefit from a customizable online interface with clear insights into your credit profile. Businesses also benefit from TransUnion’s advanced risk assessment tools.
Preferred partner (What does this mean?)View Deal
“If this is completely fake, I’d be surprised”However, concerns have been raised in the cybersecurity industry, with Hudson Rock CTO, Alon Gal saying that there is a “high certainty” that Check Point has been hacked, with a threat actor appearing to have “gained access to an administrator account with serious privileges.”
Whilst the researcher argues he would be surprised, he also explains that the breach is “not yet officially confirmed”.
In Check Point’s official response, it confirmed a breach did occur, but that this was a long time ago, and that the hacker is just recycling old information which “falsely implies exaggerated claims which never happened.”
“This was handled months ago, and didn’t include the description detailed on this message. These organisations were updated and handled at that time, and this is not more than the regular recycling of old information. We believe that at no point was there a security risk to Check Point , its customers or employees,” the spokesperson told us.
In 2024, Check Point VPN software was targeted by hackers in order to gain access to corporate networks, although these attempts were largely unsuccessful, and Check Point outlined a simple and easy fix.
Via The Register
You might also likeStarting next season, a system of cameras will determine whether to award a first down rather than trot out a 10-yard chain. But humans will still decide where to spot the ball to begin with.
(Image credit: Phelan M. Ebenhack)
Sales of electric vehicles worldwide have been growing and the largest manufacturer of EVs is China's BYD. Their global revenue was over $100 billion in 2024, beating Tesla. To keep up that growth and to try to stave off the pain of U.S. tariffs, BYD is expanding in emerging markets. One of the markets where their cars are selling big is Brazil, where BYD is investing nearly a billion dollars in a factory. But as our Brazil correspondent tells us there have been some difficulties along the way.
(Image credit: Tuane Fernandes)
Tariffs are roiling stock markets — but making gold hotter than ever.
(Image credit: Christopher Furlong/Getty Images)
In the wake of the Salt Typhoon attacks that compromised most of the major telecommunications providers in the US, many in the upper echelons of power are pushing for offensive cyber operations against China.
The move would model a tit-for-tat strategy, in that China has struck the US, so the US should strike China, and vice-versa until they stop.
The difficulty with that strategy, as legendary threat intelligence analyst Marcus Hutchins explains, is that the US is woefully under regulated and underprepared for any escalation of cyber warfare with China.
Despite China’s claims that Volt Typhoon is actually a CIA asset, there is fairly reliable evidence to suggest that all of the ‘typhoon’ groups are Chinese state-sponsored actors, and it was Salt Typhoon that breached the US telecommunications networks by targeting and exploiting systems put in place under the Communications Assistance for Law Enforcement Act, (or CALEA for short).
This act, introduced in 1994, saw all major communications networks have ‘backdoors’ installed to monitor the communications of criminals.
However, as John Ackerly, CEO and co-founder of Virtru told me, “It's the same doors that the good guys use, that the bad guys can walk through,” - and walk through they did.
Hutchins writes that while the US certainly has the capability to launch offensive cyber operations on China, and would likely see success, the US is not prepared for the retaliation-in-turn that would come next.
For example, US critical infrastructure is woefully underequipped to protect against cyber attacks and relies heavily on outdated tech that in some cases hasn’t received an update in over a decade.
China and its Typhoons have been mapping this infrastructure for years, probing the defences and checking responses and recovery plans with small scale attacks in preparation for a much bigger strike that could be used should a hot conflict erupt between the two super powers.
But equally, Hutchins argues, this large scale attack would be just as effective as a response to US cyber offensives in China, and it can’t be patched any time soon.
Thanks to a lack of federal regulations governing cybersecurity in the US, the private sector has been largely left to its own devices to protect itself from cyber attacks, and Hutchins duly notes that its often cheaper for a company to ignore a cyber intrusion than it is to chase them down and evict them from the network.
It's also cheaper to continue using outdated tech to run systems than to spend billions of dollars replacing everything and training your staff to operate new systems. Who could’ve guessed that the private sector wouldn’t regulate itself?
Now throw into the mix a smattering of federal bodies that, because they are modelled on the US separation of powers, must rely on each other to get anything done.
As Hutchins puts it, “Ultimately, cybersecurity in the United States feels like trying to put together a puzzle; except, there’s no picture on the box, each piece has been distributed to a random entity, half of the entities aren’t even willing to disclose that they have any puzzle pieces, and nobody is sure who’s actually supposed to be the one building the puzzle.”
What’s more, China’s own regulations for cybersecurity at both the state and private sector levels are fairly robust, and have been for many years more than the US can hope to catch up to.
Convincing an administration to establish a body with complete cyber-regulatory oversight in the age of DOGE is one thing, convincing the private sector to spend the ever increasing billions to give their networks even a fighting chance at being resilient is another.
"Personally, I think that trying to deter China through offensive cyber operations would not only be unsuccessful, but also a huge mistake," Hutchins concludes. "I am not arguing that the US should bow down to China, or that it should not be able to defend itself, only that increasing offense[ive] cyber operations without the defencive capabilities to back them up, is a horrible idea.”
You might also like