Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
How Did a Ransomware Attack Disrupt Blue Yonder's Supply Chain Services?
Infrastructure & Network Security How Did a Ransomware Attack Disrupt Blue Yonder's Supply Chain Services?

The recent ransomware attack on Blue Yonder, a supply chain management SaaS provider, had a profound impact on its managed services hosted environment, affecting many of the company's 3,000 customers spread across 76 countries. The attack, which was publicly disclosed on November 21, has

ENGlobal Faces Ransomware Attack, Limits IT Access for Investigation
Malware & Threats ENGlobal Faces Ransomware Attack, Limits IT Access for Investigation

In an alarming turn of events, ENGlobal, a Texas-based engineering and automation contractor for the energy sector, encountered a ransomware attack on November 25, 2024, significantly disrupting its operations. The attacker managed to encrypt the company's data files, prompting rapid action

Can Corrupted MS Office Files Really Bypass Your Email Security?
Infrastructure & Network Security Can Corrupted MS Office Files Really Bypass Your Email Security?

Phishers have now devised an innovative and troubling method to bypass email security, utilizing corrupted Microsoft Office files that exploit the predictable behaviors of software recovery processes. This new tactic targets users with enticing messages about payments, benefits, or year-end bonuses

Veracode Enhances Secure Software Development with AI and Risk Management
Infrastructure & Network Security Veracode Enhances Secure Software Development with AI and Risk Management

Veracode is pioneering advancements in secure software development, aiming to assist developers in crafting secure-by-design software and enabling security teams to mitigate risks throughout their code-to-cloud ecosystem. This analysis will delve into the latest enhancements Veracode has

Streamlining Endpoint Management: Embracing Automation for Better Security
Malware & Threats Streamlining Endpoint Management: Embracing Automation for Better Security

In today's fast-paced digital landscape, the task of managing endpoints has become increasingly complex due to the rapid proliferation of devices and constant software updates. Traditional, manual management methods are struggling to keep up with the required speed and scale, which in turn

Blue Yonder Ransomware Attack Exposes Supply Chain Vulnerabilities
Malware & Threats Blue Yonder Ransomware Attack Exposes Supply Chain Vulnerabilities

On November 21, Blue Yonder, a US-based supply chain SaaS vendor, found itself grappling with a severe ransomware attack that brought significant service disruptions to its managed services environment. Despite the concerted efforts of both internal teams and external cybersecurity firms to restore

How Are Chinese Threat Groups Evolving Cyber Espionage Tactics?
Malware & Threats How Are Chinese Threat Groups Evolving Cyber Espionage Tactics?

The landscape of cyber espionage is continuously evolving, with state-sponsored threat groups refining their techniques to stay ahead of defensive measures. Among the most sophisticated and persistent actors are Chinese threat groups such as Volt Typhoon, APT31, and APT41/Winnti. Over the past five

Will Windows Insiders Embrace the Controversial Recall Feature?
Infrastructure & Network Security Will Windows Insiders Embrace the Controversial Recall Feature?

The Windows Insider Program has recently introduced a controversial new feature called Recall, and it has sparked significant debate among participants and industry experts alike. Those with Qualcomm Snapdragon-powered Copilot+ PCs are now invited to try out Recall, a snapshot-taking, AI-powered

Mitigating Security Risks in the Growing VR and AR Technologies
Security Operations & Management Mitigating Security Risks in the Growing VR and AR Technologies

The rise of Virtual Reality (VR) and Augmented Reality (AR) technologies has been one of the most significant technological advancements in recent years. These immersive technologies have managed to integrate deeply into various industries, ranging from personal gaming to retail design, education,

Evolving Roles: Adapting Security Skills to Advanced Technologies
Data Protection & Privacy Evolving Roles: Adapting Security Skills to Advanced Technologies

The landscape of technology within the physical security industry is rapidly evolving. Innovations in security systems are significantly impacting the skillsets required by security operators and officers. This article explores the integration and significance of advanced technologies such as

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later