Latest Technology News

Zyxel Networks launches WBE660S Wi-Fi 7 BE22000 Triple-Radio NebulaFlex Pro Access Point

Zyxel Networks has expanded its portfolio with the launch of the WBE660S Wi-Fi 7 BE22000 Triple-Radio NebulaFlex Pro Access Point, marking its entry into the Wi-Fi 7 market. This new product is specifically designed to cater to the needs of managed service providers (MSPs) and small- to medium-sized businesses (SMBs).

The WBE660S is an enterprise-grade access point that features a triple radio BE22000 architecture. It utilizes a broader 320MHz channel, which enables it to deliver speeds that are significantly faster -- up to five times -- compared to the Wi-Fi 6/6E solutions. This high-speed connectivity is particularly beneficial for applications that demand high bandwidth, such as video streaming, broadcasting, online gaming, and VR/AR, ensuring users experience seamless and latency-free connectivity.

Continue reading

JEDEC officially recognizes CAMM2 standard -- smaller RAM modules to cram more into less space

Old memory module

Laptops are soon going to benefit from a major memory boost thanks to the recognition of a new standard. CAMM2 is the successor to the familiar SO-DIMM form factor, and its significantly smaller size opens up potential for more memory to be installed into less space.

JEDEC, the organization that defines many computing and electronics standards, has published JESD318: Compression Attached Memory Module (CAMM2) Common Standard. CAMM2 is 57 percent thinner than SO-DIMMs and also has the potential for higher clock speeds. The memory has already been used by Dell as a proprietary memory type, but now it is likely to see wider adoption.

Continue reading

How organizations can get a handle on cloud security [Q&A]

Cloud data protection

As cloud-based enterprises continue to grow, the security threats in the cloud grow with them. Organizations operate in complex, multilayered environments that leave security teams scrambling to protect all of their organization's assets and resources. In fact, they may not even be aware of all of them.

What are the biggest risks they face today? And how can organizations mitigate their vulnerabilities?

Continue reading

Kodi 21 'Omega' hits a major development milestone -- download it now! [Updated]

Woman watching Kodi

Kodi 21 -- codenamed 'Omega' -- is the next version of the hugely popular home theater software. The Kodi Foundation released the first beta version of the program two months ago, introducing a number of new features, fixes, and cleanups.

Today, a brand new build arrives, which will be much more appealing to those users seeking greater stability from the software.

Continue reading

Ubuntu-based Linux Mint 21.3 'Virginia' Beta now available for download

The beta release of Linux Mint 21.3, code-named "Virginia," has been released today. You can choose from three desktop environments -- Cinnamon, Mate, and Xfce. Based on Ubuntu 22.04, the Linux Mint 21.3 beta should offer a stable and versatile platform suitable for a wide range of software and applications. Scheduled for support until 2027, this version combines updated software with refinements and new features to enhance the desktop experience.

The beta version addresses several crucial areas to enhance user experience. The Snap Store is disabled by default in this release, aligning with Linux Mint's approach to package management. Users seeking to re-enable it can find guidance in the Linux Mint user guide. For those using Virtualbox, the beta provides solutions for common visual issues like black or garbled screens, including adjustments in graphic controller settings.

Continue reading

Beyond phishing: The top employee security risks you're probably not measuring

While we all know email is a big target for attackers, it’s important to remember that email is not the only risk vector. As companies use more tools and features, the risks grow too. Email is just one piece of the puzzle, which is why it is crucial to consider a wide range of employee security behaviors to get a holistic view of your risks. By doing so, you can focus resources more efficiently.

Human Risk Management (HRM) is a vital part of cyber security. Even if you have technological safeguards in place, HRM plays a substantial role in your overall security stance. Here I highlight some of the employee cyber risks that often get overlooked and how we can better keep an eye on them in real time.

Continue reading

Three methods to improve organizational data quality today

Data

Our modern business landscape transforms constantly, yet the value of data endures. However, thriving companies don’t merely amass data -- they cultivate meaningful data.

Leaders must have trustworthy data to unlock organizational insights, but inaccurate data is still rampant in most organizations. This data costs leaders far more than missed opportunities. According to industry research, bad data costs U.S. enterprises $3.1 trillion annually. Still need convincing about the benefits of data quality? Let’s discuss the benefits of high-quality data and explain how leaders can adopt a leading data management strategy today.

Continue reading

The coming AI economic revolution: Can artificial intelligence reverse the productivity slowdown?

AI

The artificial intelligence revolution is here to stay, and a large part of the reason is the massive economic impact of the technology on the industries it has touched. Effectively implementing AI into a business’s operation requires an incredible amount of planning and precision, as well as consideration of all of the ethical and regulatory challenges associated with the use of the technology.

One of the primary reasons AI has become such an exciting and dominant technology is its ability to process data faster than human workers. In many industries, we have seen efficiency increase by allowing AI and automation to take over simpler and more labor-intensive tasks, enabling human workers to spend more time on tasks that require a more human quality.

Continue reading

Balancing AI with insider risk management

web threats

AI has officially taken off, yet organizations are squarely divided on their use in the workplace.  Organizations that encourage the use of AI and Large Language Model (LLM) tools for productivity are willing to accept the security risk but often lack the policies, education, and controls required to mitigate potential security risks, including those posed by insiders.

On the other hand, companies that take a hard line against the tools by implementing strict rules against any installation or use of AI-LLMs may cause their employees to be less productive. Fortunately, there is a middle ground that balances productivity with security and, importantly, with insider risk management.

Continue reading

Threads is about to gain millions more users as Meta prepares for EU launch in a matter of days

Threads logo on smartphone

Concern surrounding Elon Musk and his control of Twitter, or X as he decided to rename it, caused an exodus of users seeking a new social media home. The likes of Mastodon and Bluesky have proved popular, but it was Meta's Threads that generated the greatest levels of excitement.

Right from the offset, however, Threads fell victim to strict European data privacy regulations meaning it was unable to launch in the EU. Now this is set to change, with Meta counting down to an EU launch of Threads on December 14 giving the potential for millions of new user to access the service.

Continue reading

SABRENT Multi-Port USB-C Hub is the perfect Christmas stocking-stuffer for under $20

The holiday season brings an array of deals, and for those in search of tech accessories, the current offer on the SABRENT Multi-Port USB-C Hub (HB-SHPU) really stands out. Designed for functionality and convenience, this hub is now available for less than $20, making it a very attractive stocking-stuffer.

Constructed from lightweight aluminum, the hub is both portable and durable, suitable for travel and daily use. It features efficient heat dissipation, ensuring reliability during prolonged use. Currently, it is offered at $19.80, marked down from $24.99!

Continue reading

Advanced authentication: 5 steps to enhance security and user experience

With the development of new technologies, cyber threats are becoming more sophisticated, and personal data remains one of the most desirable targets. The Verizon Data Breach Investigations Report states that 49 percent of hacks use credentials.  

Traditional authentication methods, such as username and password with standard Multi-Factor Authentication (MFA), are no longer sufficient to protect sensitive information and systems from unauthorized access. According to Microsoft, there are 1287 password attacks every second. Consequently, businesses must adopt more sophisticated and layered methods of user authentication. One of these methods is Advanced Authentication.

Continue reading

How to stop digital twins from being used against you

Digital twins

Digital twins are growing in leaps and bounds. These virtual representations of real-world devices are essentially digital proxies for enterprises -- delivering insights into an asset’s data, processes, operation states, and lifecycle. This is particularly beneficial in achieving better visibility in smart factories, or accurately predicting how devices might perform in connected healthcare.

In creating digital twin simulations and running models, however, there’s a problem. Doubling the data and doubling the digital assets of any company is, in effect, doubling the cybersecurity surface area. This increases the chances of exposure and sensitive company information falling into the wrong hands. Without proper safeguards, the risk is that digital twins can be turned against their owners. Amidst a landscape of record growth in the Internet of Things (IoT), let’s look at how to safely leverage the power of digital twins.

Continue reading

Best Windows apps this week

Five-hundred-and-seventy-two in a series. Welcome to this week's overview of the best apps, games and extensions released for Windows 10 and 11 on the Microsoft Store and elsewhere in the past seven days.

Windows 10's official support will run out in October 2025. Microsoft confirmed that customers will be able to extend support beyond that month for a price.

Continue reading

How AI can help app developers keep up with changing regulations [Q&A]

A changing regulatory landscape can prove difficult for app developers as they need to make sure they remain compliant and keep up with evolving rule sets.

We spoke to Pedro Rodriguez, head of engineering at AI-powered compliance intelligence platform Checks, to find out how AI can help mobile app developers to handle data responsibly and keep up with ever-changing global regulations,

Continue reading

© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.