Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Starkiller Phishing Kit Bypasses MFA Security
Security Operations & Management Starkiller Phishing Kit Bypasses MFA Security

The widespread adoption of multifactor authentication has long been championed as a critical bulwark against account takeovers, but a formidable new threat known as "Starkiller" is demonstrating the limitations of this security standard. This advanced Phishing-as-a-Service (PhaaS) tool represents a

Palo Alto CEO: Enterprise AI Adoption Lags by Years
Infrastructure & Network Security Palo Alto CEO: Enterprise AI Adoption Lags by Years

The Hype vs. Reality: A Cautious View on the AI Revolution While the public narrative is dominated by the explosive growth of artificial intelligence, a leading voice in cybersecurity is urging a more measured perspective. Nikesh Arora, CEO of Palo Alto Networks, contends that despite the

Securing Attack Surfaces: A Strategic Approach to Mobile Risk
Editorial Securing Attack Surfaces: A Strategic Approach to Mobile Risk

97% of executives use personal devices to access their work accounts, but these aren’t designed to defend against espionage, zero-click exploits, or data exfiltration. So convenience has come with a tradeoff of vulnerability. In today’s hybrid world, the smartphone in a leader’s pocket holds

New Spyware Sells Nation-State Spying to Anyone
Endpoint & Device Security New Spyware Sells Nation-State Spying to Anyone

The sophisticated tools of digital surveillance, once confined to the shadowy arsenals of government intelligence agencies, are now being packaged, marketed, and sold on the open market to anyone with a few hundred dollars and a malicious intent. This research summary examines the alarming

What's It Like to Hunt Threats With a Modern NDR?
Endpoint & Device Security What's It Like to Hunt Threats With a Modern NDR?

Stepping into the high-stakes world of a modern Security Operations Center (SOC) reveals a complex battleground where analysts race against time to decipher cryptic clues left by sophisticated adversaries. This exploration delves deep into the daily workflow of these digital defenders by

Defense Contractor Sold US Cyber Weapons to Russia
Infrastructure & Network Security Defense Contractor Sold US Cyber Weapons to Russia

The line separating a nation's most guarded digital secrets from the open market is often just one person's compromise, a single decision that can rebalance global power in the shadows of cyberspace. When a trusted executive within the military-industrial complex chooses personal profit over

APNIC Fosters Debate to Strengthen Internet Governance
Infrastructure & Network Security APNIC Fosters Debate to Strengthen Internet Governance

The charged atmosphere of the Asia Pacific Network Information Centre's Annual General Meeting was a clear testament to a governance model functioning not just in theory but in vibrant, often contentious, practice. Far from a ceremonial gathering, the event saw members pose sharp, unvarnished

Hackers Are Weaponizing Google's Gemini AI
Data Protection & Privacy Hackers Are Weaponizing Google's Gemini AI

The same artificial intelligence designed to streamline daily life and innovate industries is now being quietly repurposed in the digital shadows to orchestrate sophisticated cyberattacks. Recent findings from Google's own threat intelligence teams have confirmed a troubling trend: state-sponsored

Trend Analysis: Identity Attack Path Management
Identity & Access Management Trend Analysis: Identity Attack Path Management

The digital drawbridge and castle walls of traditional cybersecurity are proving increasingly ineffective against an enemy that already possesses the keys to the kingdom. In a landscape where nearly 80% of all breaches leverage compromised credentials, the focus of cybersecurity is shifting from

BeyondTrust Warns of Critical Flaw Allowing System Takeover
Data Protection & Privacy BeyondTrust Warns of Critical Flaw Allowing System Takeover

A single, maliciously crafted request sent across the internet could be all it takes for an attacker to seize complete control of an organization's most sensitive access management systems. This is the stark reality presented by a newly discovered vulnerability in BeyondTrust's core products, a

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later