Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
The Impact of Agentic AI on Cybersecurity
Editorial The Impact of Agentic AI on Cybersecurity

Agentic AI represents a unique category of artificial intelligence that operates independently by designing, executing, and optimizing workflows in ways that offer great improvements in efficiency for enterprise operations while also bringing a set of cybersecurity risks that require careful

Bolstering Cybersecurity in Manufacturing: Strategies for CISOs
Infrastructure & Network Security Bolstering Cybersecurity in Manufacturing: Strategies for CISOs

The manufacturing sector has increasingly embraced the integration of Information Technology (IT) with Operational Technology (OT) to drive efficiencies and streamline operations. However, this convergence comes with its own set of cybersecurity challenges, exposing manufacturers to heightened

Can Storytelling Make Cybersecurity Education More Engaging and Effective?
Infrastructure & Network Security Can Storytelling Make Cybersecurity Education More Engaging and Effective?

In today's digital age, cybersecurity is a critical concern for individuals and organizations alike. However, traditional methods of teaching cybersecurity often fail to engage and resonate with diverse audiences. This article explores the potential of storytelling as a powerful tool to make

Sunflower Medical Group's Massive Data Breach Hits 220,968 Patients
Data Protection & Privacy Sunflower Medical Group's Massive Data Breach Hits 220,968 Patients

In a disturbing saga that highlights the ongoing cybersecurity challenges faced by the healthcare sector, Kansas-based Sunflower Medical Group has revealed that it experienced a significant data breach compromising the personal information of 220,968 individuals. Detection of this breach on January

Are Current Safeguards Enough to Prevent AI Voice Cloning Misuse?
Data Protection & Privacy Are Current Safeguards Enough to Prevent AI Voice Cloning Misuse?

Today we have Rupert Marais, our in-house Security specialist with expertise in endpoint and device security, cybersecurity strategies, and network management. He'll share his insights on Consumer Reports' evaluation of AI voice cloning software and the implications for consumer protection. What

How Are Modern AI and IoT Revolutionizing Security Systems?
Infrastructure & Network Security How Are Modern AI and IoT Revolutionizing Security Systems?

The modern landscape of security systems has dramatically evolved from traditional alarms and rudimentary monitoring devices to sophisticated, automated solutions integrating advanced technologies like Artificial Intelligence (AI) and the Internet of Things (IoT). This transformation has enabled

Detecting Real-Time Linux Malware with Network Traffic Analysis Techniques
Infrastructure & Network Security Detecting Real-Time Linux Malware with Network Traffic Analysis Techniques

In an era where cyber threats are increasingly sophisticated and destructive, network traffic analysis has emerged as a critical component for identifying and mitigating real-time Linux malware infections. By examining communication patterns within network data, security experts can detect

New Approaches Needed for Effective Multi-Cloud Security Management
Infrastructure & Network Security New Approaches Needed for Effective Multi-Cloud Security Management

In an era where enterprises increasingly adopt multi-cloud strategies to boost performance and agility, the complexities of managing security across varied platforms have reached critical levels. The proliferation of cloud services is a double-edged sword: it offers boundless scalability and

How Is 5G FWA Transforming Broadband Access in Rural Areas?
Infrastructure & Network Security How Is 5G FWA Transforming Broadband Access in Rural Areas?

The advent of 5G Fixed Wireless Access (FWA) represents a critical advancement in broadband technology, especially for rural areas. Characterized by high bandwidth and low latency, 5G FWA is revolutionizing how people in remote regions access the internet. This transformation is largely driven by

Enhancing Cyber Resilience in Banking: Strategies, Risk, and Regulations
Security Operations & Management Enhancing Cyber Resilience in Banking: Strategies, Risk, and Regulations

In an era where cyber threats are continuously evolving, banks need robust strategies to enhance their cyber resilience. This involves a comprehensive approach encompassing governance, risk management, incident response, and third-party risk management. Banks face mounting pressure to adopt these

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later