Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Are Russian Cyber Threats Escalating in Europe?
Infrastructure & Network Security Are Russian Cyber Threats Escalating in Europe?

Russian cyber activities are now casting a wide shadow of concern across Europe, drawing the attention of cybersecurity experts and policymakers alike. The sophistication and frequency of these cyberattacks have posed significant challenges to the digital infrastructure of various European nations.

Infostealers Compromise 30,000 Australian Banking Credentials
Identity & Access Management Infostealers Compromise 30,000 Australian Banking Credentials

In today's digital landscape, cybersecurity threats are evolving at an unprecedented pace. Rupert Marais, our in-house Security specialist, brings a wealth of expertise in endpoint and device security, cybersecurity strategies, and network management. In this interview, Rupert sheds light on the

Automated Password Management – A Review
Identity & Access Management Automated Password Management – A Review

In an era marked by increasing data breaches, the need for secure digital environments has become paramount. Recent advancements in cyber defenses have led to developments in automated password management, a key player in enhancing cybersecurity practices. This technology aims to simplify security

Can AI Replace Human Freelance Coders Soon?
Data Protection & Privacy Can AI Replace Human Freelance Coders Soon?

In today's rapidly evolving technological landscape, one of the most compelling questions is whether artificial intelligence can truly replace human freelance coders. A study conducted by researchers David Noever and Forrest McKee from PeopleTec examines this very issue, offering insights into the

Can AI-Driven Defenses Outsmart Polymorphic Phishing?
Endpoint & Device Security Can AI-Driven Defenses Outsmart Polymorphic Phishing?

The cybersecurity landscape is witnessing a dramatic transformation, driven by the escalating threat of AI-powered polymorphic phishing campaigns. A recent surge in phishing emails, with a 17% increase over the last six months, underscores the urgency for innovative defenses. The rise of

Voice Cloning Technology – A Review
Identity & Access Management Voice Cloning Technology – A Review

Imagine a world where the soothing or authoritative voice you hear on the other end of the line isn’t human but a digitally reconstructed clone of a real person. This scenario, once confined to speculative fiction, is now a critical aspect of today's reality thanks to voice cloning technology. The

Email Security: Unmasking New Phishing and Spoofing Threats
Infrastructure & Network Security Email Security: Unmasking New Phishing and Spoofing Threats

The digital age has revolutionized communication, making email an indispensable tool for both personal and professional interactions. However, with this evolution, email security has become a paramount concern, as cybercriminals continuously devise innovative tactics to exploit vulnerabilities.

How Are Asian Crime Syndicates Mastering Global Cyber Scams?
Endpoint & Device Security How Are Asian Crime Syndicates Mastering Global Cyber Scams?

The world of global cybercrime has seen a dramatic escalation, with Asian crime syndicates emerging as pivotal players in mastering intricate cyber scams that threaten industries worldwide. These syndicates, including entities based in Southeast Asia, have refined their operations to achieve a

How Does Coinbase Combat Cyber Threats Without Paying Ransom?
Identity & Access Management How Does Coinbase Combat Cyber Threats Without Paying Ransom?

In today's digital age, the rise of cryptocurrency has simultaneously paved the way for a new wave of complex cyber threats. These threats often target both financial institutions and their customers, aiming to exploit vulnerabilities for financial gain. Recently, Coinbase, a leading cryptocurrency

Phishing Evolves: New Tactics Threaten Email Security
Infrastructure & Network Security Phishing Evolves: New Tactics Threaten Email Security

Rupert Marais is an esteemed cybersecurity expert specializing in endpoint and device security, known for his strategic understanding of network management and cybersecurity. Today, we'll explore the ever-evolving landscape of email security threats, drawing insights from recent findings shared by

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later