System76 unveils open source 'Launch Configurable Keyboard' for Linux, Windows, and macOS that is made in the USA
System76 makes and sells excellent computers running Linux-based operating systems. The company's laptops and desktops can be had with your choice of the popular Ubuntu or the company's own Ubuntu-based Pop!_OS. For many years now, System76 has been a huge proponent of both the Linux and open source communities. Quite frankly, Linux users all over the world are very lucky to have System76 computers as an option.
And now, PC manufacturer System76 is becoming an accessory maker too. You see, after teasing the product for months, today, the company officially unveils its newest product -- the "Launch Configurable Keyboard." Yes, folks, it is a mechanical keyboard made in the USA with a focus on open source. The Launch has both open source firmware and hardware. Even the configuration software -- which runs on Linux, Windows, and macOS -- is open source.
New platform wants to simplify application security
The transition to agile development, the rise of microservices, and an increased reliance on cloud services for business operations due to the pandemic have all contributed to an explosion in software development and a dramatic reduction in software delivery time.
But as the speed and complexity of application development skyrockets, application security professionals increasingly find themselves unable to keep up. Silicon Valley startup ArmorCode has produced a next-generation application security solution that consolidates three key AppSec needs into a single intelligent platform and it's raised $3 million in seed financing to develop it further.
Virtual room technology delivers secure customer interactions for the finance sector
One of the problems the finance and banking sector has had during the pandemic has been reduced branch access and the inability to hold face-to-face meetings.
Identity specialist OneSpan has introduced a technology called Virtual Room. Using this, financial institutions and their customers can digitally review and sign documents together without having to combine multiple tools and apps.
TP-Link launches four new affordable Kasa smart home products
A smart home is a happy home as far I am concerned. Since going all-in on smart devices in my house, my life has been much improved. I can control my thermostat without getting out of bed, and when I leave a room, I can tell Google to turn off the light. If I hear a bump in the night, I can pull out my phone or tablet to monitor my Wi-Fi cameras. We are living in the future, and it is great.
Today, popular company TP-Link launches a quartet of new smart home products under its Kasa branding. There is the Kasa Smart Wi-Fi Mini Plug (EP10), Kasa Smart Wi-Fi Outdoor Plug (EP40), Kasa Spot, 24/7 Recording (KC400), and the Kasa Spot Pan Tilt, 24/7 Recording (KC410S). Basically, it is a pair of 2K Wi-Fi cameras and a couple of Wi-Fi power outlet adapters.
Get 'Mastering Windows Security and Hardening' ($27.99 value) FREE for a limited time
COVID-19 leads to a year of cybersecurity challenges
Over the past 12 months, the COVID-19 pandemic has created the perfect environment for cybercrime to flourish, according to Verizon's 2021 Data Breach Investigations Report.
The report analyzed 29,207 quality incidents, of which 5,258 were confirmed breaches. With large numbers of people working remotely, phishing attacks increased by 11 percent, while attacks using ransomware rose by six percent.
Microsoft invites you to take part in a Windows 10 Bug Bash
Microsoft has announced a new Windows 10 Bug Bash for people taking part in the Insider program. The Bug Bash gives the company a chance to gather more information about problems with the operating system, and gives participants the opportunity to earn rewards.
The Bug Bash is available right now and runs until May 17. Microsoft has set up quests to check various elements of Windows 10 including using Desk Management to check storage, and testing the magnifier tool.
Microsoft is closing down its Azure Blockchain Service
Microsoft has announced that its Azure Blockchain Service is to close down this fall. The end date for the complete closure is September 10, but the company has already put a stop on new deployments and signups.
No big announcement has been made about the closure of the service which has been around since 2015 when Microsoft partnered with ConsenSys. The decision leaves existing users with just four months to find an alternative home for their ledgers.
Instagram now lets you proudly display your preferred pronouns such as ve, xyr, and zir
Sex and gender are two different things. For many people, these match. Using myself as an example, I was born biologically male and identify my gender as such. I prefer to be called "him" and "he." For some other people, however, their gender does not match their sex. And yes, despite what some ignorant people may think, this is absolutely factual -- sex is biology while gender is a social construct.
This is why you really can't assume someone's gender or pronouns. Just because someone looks to you like they are biologically female, for instance, that doesn't mean the person wants to be referred to as "she" or "her." Heck, some people identify as a gender that is neither male or female. In theory, there are infinite genders -- and infinite pronouns.
Microsoft releases new PowerToys update with important fixes and changes
It feels like it has been a while since the last PowerToys update, but today that changes. Microsoft has released PowerToys v0.37.2 bringing a couple of key changes to the suite of utilities for Windows 10.
Anyone hoping to see the appearance of the Video Conference Mute tool will remain disappointed. As this is only a minor version number increase, however, it is not really surprising that there are no major additions.
Microsoft releases KB5003173 cumulative update for Windows 10 20H2 and 2004
Anyone running Windows 10 version 2004 or 20H2 has a new cumulative update to install in the form of KB5003173. The update takes Windows build numbers up to 19041.985 and 19042.985.
Cumulative updatse like this are rarely über-exciting, and KB5003173 is no different. Although Microsoft has not introduced any major changes with the update, the release remains an important security update, and it's a good idea to get it installed.
More than half of IT environments still contain WannaCry/NotPetya vulnerabilities
A new report from cloud-native network detection and response company ExtraHop shows that on the fourth anniversary of the WannaCry attack a high percentage of IT environments are still running known vulnerabilities.
It shows the continuing use of ill-advised and insecure protocols, including Server Message Block version one (SMBv1), which was exploited by the WannaCry ransomware variant to encrypt nearly a quarter of a million machines worldwide, and is still found in 67 percent of environments.
Cloud misconfigurations make 90 percent of companies vulnerable
A large majority of companies that move to multi-cloud environments are not properly configuring their cloud-based services according to a new report from Aqua Security.
Over 12 months, Aqua's research team analysed anonymised cloud infrastructure data from hundreds of organizations. These were divided into SMBs and enterprises based on the volume of cloud resources they scanned.
Six ways GRC tech can help organizations meet CMMC requirements
All organizations have to monitor and protect data. But, monitoring and protecting data is even more essential for those that work with the Department of Defense (DoD). The DoD has witnessed a growing number of threats, vulnerabilities, and cyberattacks aimed at its contractors. As a result, the DoD has established a framework for companies to adhere to, to prove compliance in protecting defense data.
The framework is called Cybersecurity Maturity Model Certification (CMMC). And, like CCPA or HITRUST, specifies a unified set of cybersecurity standards required by all DoD contractors by the end of 2020. While old DoD compliance standards allowed self-certification, CMMC requires third-party validation to compete for government contracts. Certified organizations must be audited every three years to verify ongoing compliance.
HP adds security by design for home and business users
HP is launching a newly integrated portfolio of secure by design PCs and printers, hardware-enforced endpoint security software, and endpoint security services to protect its customers from growing cyber threats.
The HP Wolf Security portfolio builds on the company's security research to offer a unified portfolio focused on delivering comprehensive endpoint protection and cyber-resiliency.
Most Commented Stories
© 1998-2024 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.