Blog Posts Tagged with "2010"

A88973e7d0943d295c99820ab9aeed27

Bandwidth Usage Statistics for Q4 2010

January 26, 2011 Added by:Simon Heron

A lot of business time and bandwidth is being taken up. With data leaks being such a concern, it is probably time companies create policies to address usage and find ways of enforcing them, as these figures suggest this is not being done at the moment...

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

State of IT: Employment Recap for 2010

January 12, 2011 Added by:Mike Meikle

According to a December 2010 Dice report, IT hiring will enjoy a 10% to 20% bump. This will be focused in a few key areas, Development, Infrastructure and Project Management. This data corroborated by a recently released Technisource’s IT HIRE Intelligence survey...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Identity Theft Resource Center 2010 Breach Report

January 04, 2011 Added by:Headlines

Breaches happen. Consumers, government and the business community need to stop acting like ostriches with their heads in the sand. Second, the concept of “risk of harm” is not acceptable for determining notification. This is true especially if the company involved is allowed to define risk of harm...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Six Cool Hacks from 2010

December 28, 2010 Added by:Headlines

Kelly Jackson Higgins has assembled an examination of six "cool" hacks from 2010. The list has a little of everything from the ethical to the not so ethical of hackers, many made headlines, and some are little known...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Ten Security Events of 2010

December 27, 2010 Added by:Headlines

2010 has proved to be a most eventful year for the information security field. From the WikiLeaks "Cablegate" disclosures to Chinese state-sponsored hacking, the Stuxnet virus to Google's WIFI intrusions, 2010 will certainly be remembered as a benchmark year.

Comments  (0)