Corsair launches K70 RGB MK.2 LOW PROFILE mechanical gaming keyboards


I'm a huge fan of mechanical keyboards. While they are great for gaming, I find they are quite brilliant for general use too. Nothing makes me happier than typing away on a quality keyboard, and mechanical keyswitches often feel very premium.
My one complaint about mechanical keyboards is the height. It can be hard to get my arms/shoulders comfortable when the keyboard ands its keys are too high/thick -- a problem I don't have with Apple's non-mechanical -- yet very slim -- desktop keyboard. Today, Corsair announces two new keyboards that aim to help with this issue. You see, as the name implies, the new K70 RGB MK.2 LOW PROFILE mechanical gaming keyboards have -- you guessed it -- low profile switches and RGB lighting!
Western Digital unveils 15TB Ultrastar DC HC620 SMR HDD for data centers


For home computer users, it is crazy not to use a solid state drive -- especially when coupled with a good cloud backup plan. With that said, data centers are an entirely different beast. When you are looking to maximize storage on a budget -- and with physical constraints -- a hard disk drive still reigns supreme. That's why its so important for companies to continue to innovate when it comes to mechanical hard drives.
For example, last year, Western Digital released an impressive 14TB SMR HDD for data centers, and today, the company kicks it up a notch. The 3.5-inch Ultrastar DC HC620, as it is called, gets a slight 1TB bump. In other words, this new data center drive features a very spacious 15TB of storage. And yes, as the SMR in the name implies, the drive uses the innovative shingled magnetic recording.
Majority of CISOs believe security breaches are inevitable


According to research from Kaspersky Lab, 86 percent of CISOs believe that breaches are inevitable, but too many are stuck in a vicious circle of risk.
Financially motivated criminal gangs (40 percent) and malicious insider attacks (29 percent) are the biggest risks to their businesses, and these are the threats that are extremely difficult to prevent, either because they are launched by 'professional' cybercriminals or because they are assisted by employees who are expected to be on the right side.
Identity and access management a major concern for cloud deployments


According to a new report, 71.5 percent of violations on AWS occur around identity and access management (IAM).
The study from cloud security company Netskope analyzed the Center for Internet Security's Benchmarks for AWS. Many of the IAM violations found involve instance rules, role-based access controls, and access to resources or password policy requirements -- things that enterprises can easily address even without an external security solution.
Ring unveils its 'next generation neighbor experience'


You've no doubt heard of Ring -- there’s near constant ads for it on TV these days, some featuring Shaquille O’Neal.
Ring became famous for its video doorbell that shows you who is outside, without you needing to open the door. The company has since expanded into video security cameras and full security systems, complete with camera, doorbell, sensors and all. Coverage runs you $10 per month, much cheaper than the big names that tend towards $30.
Interest in Kodi declines following introduction of anti-piracy measures


The Kodi Media Center has developed something of a reputation as a platform for pirated content. Although the Kodi Foundation has tried to distance itself from this, it seems other measures are having an effect.
The anti-piracy coalition, Alliance for Creativity and Entertainment (ACE), along with new anti-piracy rules in the EU and UK, plus bans on Kodi boxes being sold via online marketplaces, has seen interest in Kodi decline sharply.
UK hits Facebook with maximum possible fine for Cambridge Analytica privacy scandal


The UK Information Commissioner's Office (ICO) has penalized Facebook for the Cambridge Analytica data scandal by fining it the maximum amount permissible under law.
But the fine is unlikely to make Facebook break a sweat. At just £500,000 ($645,000) the sum represents a miniscule percentage of the social network's income. There will undoubtedly be arguments that this is little more than a rap on the knuckles for failing to protect the private data of at least a million Facebook users in the UK.
Microsoft releases Windows 10 19H1 Build 18267 with expanded search indexing


Microsoft is still busy fixing the many problems that have blighted the Windows 10 October 2018 Update, but that hasn’t stopped development on the follow up, due out next spring.
Build 18267 for Insiders on the Fast ring, introduces -- among other things -- the ability for the OS to index all of your folders and drives, to make finding files on your PC much easier.
Leaked documents show Google now requires OEMs to provide 2 years of Android security updates


One of the problems with buying an Android phone over an iPhone is the fact that you don't know how long you can expect to receive updates. There has long been criticism of the fact that many Android handsets are quickly abandoned while Apple pushes out iOS updates for a number of years.
We've heard suggestions that Google might start requiring handset manufacturers to provide updates for a minimum period, and now it seems that this has indeed been mandated. A leaked copy of a contract between Google and OEMs shows that there is now a requirement to release security updates -- or face the consequences.
Why endpoint management is critical to your enterprise security strategy


Endpoints make the enterprise run, whether they are laptops or desktops running macOS, Windows or Linux; smartphones or tablets running iOS or Android; virtual machines or IoT devices. They’re found driving business on local networks, in remote offices and in the hands of traveling users.
However, endpoints also make the enterprise vulnerable. They are a favorite target of criminals who launch cyberattacks via ransomware, spyware, phishing and other malicious software. Over the past year alone, critical endpoint vulnerabilities have been discovered in popular OSs and applications and then exploited by WannaCry, Meltdown, Spectre, Petya, Fireball, Bad Rabbit and other harmful code. The challenge facing enterprises, then, is how to minimize the vulnerability of their endpoints and simultaneously maximize their value. While endpoint management is already a widely adopted IT practice, now is the time for IT teams to expand their efforts to include endpoint security. As we’ll see below, combining endpoint management and security can solve some of your most pressing issues.
How automation will impact education


There has been a lot of hype around how new technologies like automation will impact our way of life. Some live in fear that their jobs will be lost to humanoid robots, while others excitedly welcome bots like Amazon Alexa into their home. The impact of 'robots' -- itself an ill-defined category -- is widely discussed and hotly contested.
In the business world, most industries have much to gain from automation and robotics, but what this looks like in practice is a far cry from the wider speculation.
IT and the rise of connected cars


Volkswagen recently revealed that it is exploring using an innovative form of distributed-ledger (i.e., blockchain) technology called the IOTA "Tangle" to deliver software updates to its autonomous cars. The technology may be available to customers as early as Spring 2019. It’s just the latest in a seemingly unending stream of news about connected cars, a broad term that encompasses everything from cars with built-in GPS systems to fully autonomous, AI-driven semi trucks in the emergent IoT space.
While the topics of conversation are spanning everything from legislation to programming ethics, not enough air-time has been devoted to discussing exactly how the arrival of this new technology will change the charter for the IT teams who will be tasked with supporting the future of transportation.
Early adopters delay IoT purchases over security concerns


While people are still excited about Internet of Things technology, many are delaying buying over concerns about privacy and security.
A new survey from cyber security company F-Secure shows that 63 percent of early adopters are looking to purchase new devices, but 50 percent have delayed an IoT purchase because of security concerns.
Consumers will stop spending with businesses after a breach


New research finds that that 83 percent of consumers will stop spending with a business for several months in the immediate aftermath of a security breach or a hack.
More than a fifth (21 percent) will never return to a brand or a business post-breach, representing a significant loss of revenue, according to the study from secure payments provider PCI Pal.
Advanced SystemCare 12 includes a new privacy shield


Should you keep your system optimized or simply allow Windows to keep your computer in-check? A few years ago, data would build, junk would collate and it was relatively easy to cause a blue screen of death or even stop Windows from booting at all, requiring a system restore.
These days Windows 10 is far better engineered and will do a good job keeping your system maintained. With this in mind, system maintenance suites are turning their hand to security, adding features to enable you to keep yourself safe and secure whilst you browse the internet (although your security software should be more than capable…).
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.