The top five security stories of 2010

Stuart Sumner
clock

The cyber threat continued to evolve throughout 2010 but what were the most significant stories of the year?

This was an important year for IT security, with many new developments that changed not only the way we need to approach security, but the nature of the threat it's designed to defeat. Security ...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

You may also like
500 AI models optimised for Core Ultra processors, says Intel

Chips and Components

The models can be used across the Core Ultra range of CPUs, GPUs and NPUs

clock 02 May 2024 • 2 min read
EU opens disinformation probe against Meta as elections loom

Compliance

Comes as Meta closes key disinformation tracking tool

clock 01 May 2024 • 2 min read
Microsoft, Google and Snap report strong quarterly results, IBM and Intel less so

Finance and Reporting

Microsoft and Google see AI investments bearing fruit

clock 26 April 2024 • 4 min read

More on Security

Vanta: Cybersecurity spend should be 30% of the IT budget

Vanta: Cybersecurity spend should be 30% of the IT budget

Currently it's 9% in the UK

clock 03 May 2024 • 4 min read
Security Excellence Awards – winners revealed!

Security Excellence Awards – winners revealed!

The technologies, projects, partners and people leading the way in cybersecurity

clock 03 May 2024 • 2 min read
Next's CISO: Learn from attackers to boost cyber defences

Next's CISO: Learn from attackers to boost cyber defences

Collaboration, knowledge sharing, agility – there’s a lot that cyber criminals do right

Tom Allen
clock 02 May 2024 • 4 min read