Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Are Your Everyday Actions Fueling Sophisticated Cyberattacks?
Infrastructure & Network Security Are Your Everyday Actions Fueling Sophisticated Cyberattacks?

The Hacker News provides an analysis of recent cybersecurity trends and threats. The report emphasizes the sophisticated tactics cybercriminals now employ, exploiting everyday actions to initiate significant cyberattacks. These threats often stem from minor vulnerabilities such as misconfigured

Perplexity AI App Exposed to Severe Security Flaws and Data Risks
Infrastructure & Network Security Perplexity AI App Exposed to Severe Security Flaws and Data Risks

Recent findings have revealed alarming security vulnerabilities in the Perplexity AI app, an advanced AI-powered assistant for Android users. Researchers from Appknox have uncovered critical weaknesses within the app that could severely compromise user data. These issues include potential account

RSA Conference 2025: Key Cloud Security Sessions Highlight AI Advances
Malware & Threats RSA Conference 2025: Key Cloud Security Sessions Highlight AI Advances

Cloud security continues to be a crucial topic in the cybersecurity landscape, particularly with the rapid evolution of AI technologies. The RSA Conference 2025 showcased seven key sessions focused on AI’s role in cloud security, offering valuable insights from industry leaders. These sessions h

How Does the ECJ's Ruling Redefine Your GDPR Access Rights?
Data Protection & Privacy How Does the ECJ's Ruling Redefine Your GDPR Access Rights?

The recent European Court of Justice (ECJ) judgment has sparked significant discussions about the right of access under the General Data Protection Regulation (GDPR). This ruling, particularly in the context of credit scoring, clarifies and reinforces the levels of transparency and accountability

Is AI the Future of Compliance or a Regulatory Nightmare?
Data Protection & Privacy Is AI the Future of Compliance or a Regulatory Nightmare?

The adoption of artificial intelligence (AI) in compliance disciplines has become an intense topic of interest and discussion among industry professionals. The potential benefits AI offers in streamlining compliance processes and enhancing decision-making capabilities are compelling. However,

Are You Ready for the Evolving Cybersecurity Threats of 2025?
Malware & Threats Are You Ready for the Evolving Cybersecurity Threats of 2025?

Cybersecurity threats continue to evolve at an alarming rate, reflecting the growing sophistication and determination of cybercriminals. As organizations strive to stay one step ahead, understanding the current landscape and being prepared for emerging threats has never been more critical. This

How Is Google Cloud Revolutionizing Security With AI?
Infrastructure & Network Security How Is Google Cloud Revolutionizing Security With AI?

Amid growing concerns over cybersecurity, Google Cloud has taken considerable strides in enhancing its security measures through cutting-edge artificial intelligence (AI). Recently, during its 'Next 25' conference, Google unveiled a suite of security solutions designed to fortify

Phishing Mastermind Noah Urban Pleads Guilty: What Happens Next?
Malware & Threats Phishing Mastermind Noah Urban Pleads Guilty: What Happens Next?

In a case that has sent shockwaves through the cybersecurity world, Noah Urban, a key figure behind the notorious Scattered Spider cybercrime ring, has pleaded guilty. Urban, widely known by several online aliases including 'Sosa' and 'Elijah,' has been implicated in a series of

How to Successfully Deploy SASE for Modern Security Needs
Infrastructure & Network Security How to Successfully Deploy SASE for Modern Security Needs

Managing network and security architecture has grown significantly more complex compared to previous decades. Digital transformation initiatives, cloud adoption, and the exponential rise in remote work have profoundly changed the traditional security perimeter. Enterprise applications now

How Are Tax-Themed Phishing Attacks Evolving in 2025?
Infrastructure & Network Security How Are Tax-Themed Phishing Attacks Evolving in 2025?

Rupert Marais is our in-house Security specialist with expertise in endpoint and device security, cybersecurity strategies, and network management. In this interview, we dive into the intricacies of recent tax-themed email attacks, the underlying mechanisms of various malware, and the sophisticated

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later