Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Phishing Mastermind Noah Urban Pleads Guilty: What Happens Next?
Malware & Threats Phishing Mastermind Noah Urban Pleads Guilty: What Happens Next?

In a case that has sent shockwaves through the cybersecurity world, Noah Urban, a key figure behind the notorious Scattered Spider cybercrime ring, has pleaded guilty. Urban, widely known by several online aliases including 'Sosa' and 'Elijah,' has been implicated in a series of

How to Successfully Deploy SASE for Modern Security Needs
Infrastructure & Network Security How to Successfully Deploy SASE for Modern Security Needs

Managing network and security architecture has grown significantly more complex compared to previous decades. Digital transformation initiatives, cloud adoption, and the exponential rise in remote work have profoundly changed the traditional security perimeter. Enterprise applications now

How Are Tax-Themed Phishing Attacks Evolving in 2025?
Infrastructure & Network Security How Are Tax-Themed Phishing Attacks Evolving in 2025?

Rupert Marais is our in-house Security specialist with expertise in endpoint and device security, cybersecurity strategies, and network management. In this interview, we dive into the intricacies of recent tax-themed email attacks, the underlying mechanisms of various malware, and the sophisticated

What Are the Best Business VPNs for 2025? Expert Reviews
Infrastructure & Network Security What Are the Best Business VPNs for 2025? Expert Reviews

In an era where businesses are increasingly reliant on digital connectivity, safeguarding sensitive data against cyber threats has become paramount. Today's cybercriminals are adept at exploiting vulnerabilities to gain unauthorized access to critical business information. A Virtual Private

Is Your Cybersecurity Strategy Ready for Evolving AI Threats?
Malware & Threats Is Your Cybersecurity Strategy Ready for Evolving AI Threats?

The rapid advancement of artificial intelligence (AI) is reshaping the cybersecurity landscape significantly, presenting both opportunities and challenges for organizations worldwide. AI-powered tools are now widely utilized for both defensive measures and offensive tactics, making the evolution of

Weekly Cybersecurity Update: Threats, Breaches, and Defensive Tips
Infrastructure & Network Security Weekly Cybersecurity Update: Threats, Breaches, and Defensive Tips

In today's rapidly evolving digital landscape, cybersecurity threats are becoming increasingly sophisticated and pervasive, targeting both individuals and organizations with unprecedented frequency and intensity. Staying informed about the latest developments and adopting effective defensive

Oracle Faces Second Data Breach, 6 Million Records Compromised
Infrastructure & Network Security Oracle Faces Second Data Breach, 6 Million Records Compromised

In a startling turn of events, Oracle Corporation experienced a significant data breach involving its older Gen 1 servers, making it the company's second cybersecurity incident within weeks. The breach came to light after a threat actor, known as "rose87168," claimed responsibility

Can AI-Driven Social Engineering Be Stopped by Adaptive Security?
Data Protection & Privacy Can AI-Driven Social Engineering Be Stopped by Adaptive Security?

In an era where artificial intelligence is revolutionizing various industries, the rise of AI-driven social engineering attacks has emerged as a significant challenge for cybersecurity. Adaptive Security, a pioneering startup, has successfully secured $43 million in Series A funding to combat this

What Are the Riskiest Connected Devices in 2024?
Endpoint & Device Security What Are the Riskiest Connected Devices in 2024?

The year 2024 presents a rapidly evolving cyber-threat landscape that organizations must navigate with vigilance. A comprehensive examination by Forescout Research - Vedere Labs reveals distinct cyber risks across various categories of connected devices. From Information Technology (IT)

How Will Google's New Gmail Encryption Change Business Communications?
Infrastructure & Network Security How Will Google's New Gmail Encryption Change Business Communications?

As businesses increasingly rely on digital communication, securing sensitive information has become a paramount concern. Google’s latest updates to Gmail’s encryption feature promise to simplify and enhance email security for businesses of all sizes. These changes could significantly alter the lan

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later