Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Are Cloud Misconfigurations Fueling Cryptojacking Threats?
Infrastructure & Network Security Are Cloud Misconfigurations Fueling Cryptojacking Threats?

In an era where cloud-based networks are becoming integral to businesses worldwide, threats exploiting such systems have risen sharply. Today, we have the privilege of speaking with Rupert Marais, an expert in endpoint and device security, to delve into the complexities of recent cybersecurity

Are Mobile Phishing Scams Undermining Your Security?
Endpoint & Device Security Are Mobile Phishing Scams Undermining Your Security?

In today's increasingly digital landscape, mobile phishing scams have become a significant cybersecurity threat that businesses cannot ignore. Alarmingly, nearly 60% of companies have reported incidents involving voice or text phishing attacks. Even though a substantial 77% encountered such attacks

Are MCP Vulnerabilities a Threat to AI Security?
Endpoint & Device Security Are MCP Vulnerabilities a Threat to AI Security?

In the ever-evolving landscape of artificial intelligence, the Model Context Protocol (MCP) has emerged as a critical infrastructure component, facilitating seamless interaction between AI models and diverse data sources. Recently, however, vulnerabilities in MCP have surfaced, challenging its

How Does Community Policing Prevent Online Scams?
Identity & Access Management How Does Community Policing Prevent Online Scams?

The rapid growth of digital communication has led to a rise in online scams targeting vulnerable individuals, leaving them susceptible to financial loss and emotional distress. One notable instance involved a man from Milford Haven, Pembrokeshire, who fell prey to a scam involving a fictional

ZuRu Malware Targets macOS Users with Trojanized Termius App
Endpoint & Device Security ZuRu Malware Targets macOS Users with Trojanized Termius App

Could your trusted apps be silently compromising your system security? Trusted applications, like the widely-used Termius app for managing SSH clients and servers, are an essential component of daily digital interactions. However, the recent discovery of a trojanized version exploits this trust,

Critical Bluetooth Vulnerabilities Threaten Popular Headphones
Security Operations & Management Critical Bluetooth Vulnerabilities Threaten Popular Headphones

Bluetooth technology, essential in many audio devices like headphones and earbuds, faces significant security challenges that jeopardize user privacy and safety. A comprehensive investigation by ERNW, a leading cybersecurity firm, unveiled critical vulnerabilities in the Bluetooth system-on-a-chip

Automate Security Ticketing and Triage With Tines Workflow
Endpoint & Device Security Automate Security Ticketing and Triage With Tines Workflow

The typical day of a cybersecurity team involves a relentless barrage of alerts that demand immediate attention and action. These alerts often lead to tedious processes of manual documentation and communication, hindering the team's ability to focus on more critical threats. This mental and

Cloudflare Outage Spurs Shift to In-House Storage Solutions
Data Protection & Privacy Cloudflare Outage Spurs Shift to In-House Storage Solutions

Are cloud services as reliable as we believe them to be? Millions of businesses and consumers were recently jolted into grappling with this question as Cloudflare experienced a significant service outage. Quickly branded a "system shock," this event underscored the critical nature of infrastructure

US Visa Policy: Public Social Media for Student Vetting
Security Operations & Management US Visa Policy: Public Social Media for Student Vetting

The realm of U.S. visa policy, especially concerning international students, has undergone a significant shift with the U.S. State Department mandating public disclosure of social media profiles. This substantial change originates from the desire for enhanced national security, a concern that

Can AI and Cost-Cutting Redefine BT's Workforce Strategy?
Infrastructure & Network Security Can AI and Cost-Cutting Redefine BT's Workforce Strategy?

In the ever-evolving landscape of telecommunications, the integration of artificial intelligence (AI) presents both challenges and opportunities. Rupert Marais, an in-house security specialist with expertise in endpoint and device security, cybersecurity strategies, and network management, offers

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later