Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Cybercriminals Exploit AI Surge with SEO-Poisoned Malware
Endpoint & Device Security Cybercriminals Exploit AI Surge with SEO-Poisoned Malware

In the rapidly evolving digital landscape, a significant increase in the use of artificial intelligence (AI) tools has been met with a corresponding rise in cybersecurity threats. Cybercriminals have shifted their strategies to meticulously target AI enthusiasts, exploiting the popularity of

FCC Moves to Protect Undersea Cables from Foreign Threats
Infrastructure & Network Security FCC Moves to Protect Undersea Cables from Foreign Threats

In today's interconnected world, the security of undersea internet cables has become a vital national concern. Rupert Marais, an expert in telecommunications security, offers his insights into the actions being taken by the US to safeguard these critical infrastructures from foreign influences.

How Can Businesses Tackle Ransomware with Legacy Systems?
Identity & Access Management How Can Businesses Tackle Ransomware with Legacy Systems?

In recent times, the rise in ransomware attacks has mounted significant pressure on businesses worldwide, especially those heavily relying on legacy systems. Notable incidents at major retailers like Marks & Spencer and the Co-op have spotlighted the vulnerabilities these older infrastructures

Are SAP GUI Security Flaws a Threat to Your Data Privacy?
Infrastructure & Network Security Are SAP GUI Security Flaws a Threat to Your Data Privacy?

In today's world, where data security is paramount, understanding threats to critical systems is essential. Rupert Marais, an expert in endpoint and device security, sheds light on recent vulnerabilities discovered in SAP GUI, a crucial interface for many enterprises. These weaknesses, if

Are Cloud Misconfigurations Fueling Cryptojacking Threats?
Infrastructure & Network Security Are Cloud Misconfigurations Fueling Cryptojacking Threats?

In an era where cloud-based networks are becoming integral to businesses worldwide, threats exploiting such systems have risen sharply. Today, we have the privilege of speaking with Rupert Marais, an expert in endpoint and device security, to delve into the complexities of recent cybersecurity

Are Mobile Phishing Scams Undermining Your Security?
Endpoint & Device Security Are Mobile Phishing Scams Undermining Your Security?

In today's increasingly digital landscape, mobile phishing scams have become a significant cybersecurity threat that businesses cannot ignore. Alarmingly, nearly 60% of companies have reported incidents involving voice or text phishing attacks. Even though a substantial 77% encountered such attacks

Are MCP Vulnerabilities a Threat to AI Security?
Endpoint & Device Security Are MCP Vulnerabilities a Threat to AI Security?

In the ever-evolving landscape of artificial intelligence, the Model Context Protocol (MCP) has emerged as a critical infrastructure component, facilitating seamless interaction between AI models and diverse data sources. Recently, however, vulnerabilities in MCP have surfaced, challenging its

How Does Community Policing Prevent Online Scams?
Identity & Access Management How Does Community Policing Prevent Online Scams?

The rapid growth of digital communication has led to a rise in online scams targeting vulnerable individuals, leaving them susceptible to financial loss and emotional distress. One notable instance involved a man from Milford Haven, Pembrokeshire, who fell prey to a scam involving a fictional

ZuRu Malware Targets macOS Users with Trojanized Termius App
Endpoint & Device Security ZuRu Malware Targets macOS Users with Trojanized Termius App

Could your trusted apps be silently compromising your system security? Trusted applications, like the widely-used Termius app for managing SSH clients and servers, are an essential component of daily digital interactions. However, the recent discovery of a trojanized version exploits this trust,

Critical Bluetooth Vulnerabilities Threaten Popular Headphones
Security Operations & Management Critical Bluetooth Vulnerabilities Threaten Popular Headphones

Bluetooth technology, essential in many audio devices like headphones and earbuds, faces significant security challenges that jeopardize user privacy and safety. A comprehensive investigation by ERNW, a leading cybersecurity firm, unveiled critical vulnerabilities in the Bluetooth system-on-a-chip

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later