Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Pro-Iran Hackers Merge Cyber and Kinetic Warfare Tactics
Infrastructure & Network Security Pro-Iran Hackers Merge Cyber and Kinetic Warfare Tactics

What happens when a 12-day clash between nations ignites not just with missiles and gunfire, but with a parallel storm of digital destruction that reshapes the very concept of conflict? During a heated conflict between Iran and Israel earlier this summer, pro-Iran hacking groups unleashed a wave of

Trend Analysis: Zero-Day Exploits Surge in Cybersecurity
Infrastructure & Network Security Trend Analysis: Zero-Day Exploits Surge in Cybersecurity

In a digital landscape increasingly fraught with unseen dangers, a staggering statistic emerges: zero-day exploits have surged by 46% year-over-year, as reported in a recent comprehensive threat review for the first half of this year. This alarming spike highlights a critical vulnerability in

Why Are Stolen Credentials Surging by 800% in 2025?
Identity & Access Management Why Are Stolen Credentials Surging by 800% in 2025?

Diving into a Digital Crisis In the digital landscape of 2025, a staggering statistic has emerged to shake the foundations of cybersecurity: stolen credentials have surged by an alarming 800% in just six months, affecting 1.8 billion credentials across 5.8 million infected devices. This

AI Hiring Platform Security – Review
Identity & Access Management AI Hiring Platform Security – Review

Imagine a world where a single overlooked password could expose the personal data of millions of job applicants in an instant, a stark reality faced by major corporations using AI-driven hiring platforms. These tools, designed to revolutionize recruitment with speed and efficiency, have become

Why Are Internet Exchange Points Ignored in Policy Plans?
Infrastructure & Network Security Why Are Internet Exchange Points Ignored in Policy Plans?

Welcome to an insightful conversation with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. Today, we dive into the often-overlooked world of Internet Exchange Points (IXPs), the critical hubs that

Microsoft's China-Based Teams Spark U.S. Data Security Concerns
Infrastructure & Network Security Microsoft's China-Based Teams Spark U.S. Data Security Concerns

The Crossroads of Technology and Security Have you ever considered where the engineers working behind the scenes of your government's cloud services are located? As U.S. citizens increasingly rely on technology to manage national security, this question gains critical importance. Unbeknownst to

Why is Dropbox Discontinuing Its Password Manager?
Security Operations & Management Why is Dropbox Discontinuing Its Password Manager?

A New Path in Digital Security: Dropbox's Decision Creates Waves in the Market In a bold move, Dropbox announced its decision to phase out its password manager, Dropbox Passwords. This strategic shift has sparked intrigue and speculation among industry stakeholders and users who depended on it for

Ex-CEO Gets 5-Year Sentence for $100M Government Fraud
Security Operations & Management Ex-CEO Gets 5-Year Sentence for $100M Government Fraud

The ex-CEO of Florida-based telecommunications company Q Link, Issa Asad, has recently been sentenced to five years in prison, marking a significant legal development in the realm of corporate misconduct. His fraudulent attempt to siphon more than $100 million from U.S. government programs intended

Are You Ready for Scattered Spider’s Next Cyber Ambush?
Malware & Threats Are You Ready for Scattered Spider’s Next Cyber Ambush?

The escalating activities of Scattered Spider have marked a shift in the global cybersecurity landscape, causing significant concern among organizations worldwide. This notorious cybercrime group has recently expanded its focus, now targeting sectors such as retail, insurance, and airlines. These

Wix Fixes Major Security Flaw in Base44's AI Platform
Identity & Access Management Wix Fixes Major Security Flaw in Base44's AI Platform

In the constantly evolving realm of cybersecurity, uncovering vulnerabilities remains a pressing challenge. We spoke with Rupert Marais, our in-house security specialist renowned for his expertise in endpoint and device security, to delve into the critical authentication flaw discovered in the

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later