Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
How Will the Checkmarx and ZAP Partnership Transform App Security?
Infrastructure & Network Security How Will the Checkmarx and ZAP Partnership Transform App Security?

In the ever-evolving realm of cybersecurity, the collaboration between Checkmarx, a pioneer in cloud-native application security, and ZAP (Zed Attack Proxy), the leading Dynamic Application Security Testing (DAST) tool, is creating ripples. This strategic alliance aims to uplift the capabilities of

Uber Eats Data Breach: 283,000 Records Compromised in Major Hack
Data Protection & Privacy Uber Eats Data Breach: 283,000 Records Compromised in Major Hack

In a concerning episode for cybersecurity, Uber Eats has found itself at the heart of a significant data breach, with 283,000 rows of customer data allegedly stolen in September 2024. The sensitive information compromised in this breach includes names, phone numbers, email addresses, and detailed

Combating Modern Email Scams: AI Threats and Advanced Defenses
Infrastructure & Network Security Combating Modern Email Scams: AI Threats and Advanced Defenses

Email has long been an essential tool in digital communication and commerce, serving numerous functions from confirming purchases to disseminating important information. It is therefore no surprise that email has also been a prime target for cyberattacks almost since its inception. Over the years,

AI ACT Explained: Understanding the World’s First Comprehensive AI Regulation
Editorial AI ACT Explained: Understanding the World’s First Comprehensive AI Regulation

Over the past decade, significant advances in Artificial Intelligence (AI) have had a significant impact on many industries. Today, AI technologies are being widely adopted, both by online platforms and across sectors, including manufacturing, healthcare, finance, and retail. Globally, governments

Was Your Social Security Number Stolen in the National Public Data Hack?
Identity & Access Management Was Your Social Security Number Stolen in the National Public Data Hack?

In today's increasingly interconnected world, the integrity of our personal information is more vulnerable than ever. The recent National Public Data breach serves as yet another stark reminder of this reality, affecting potentially billions of personal records. Understanding how to mitigate

India Bolsters National Security with Extensive Cybersecurity Measures
Malware & Threats India Bolsters National Security with Extensive Cybersecurity Measures

In a world increasingly driven by technology, cybersecurity has emerged as a cornerstone of national security, a sentiment echoed by Union Home Minister Amit Shah during the foundation day celebrations of the Indian Cyber Crime Coordination Centre (I4C). Shah stressed that the integration of

How Can You Safeguard Your Samsung Data with Regular Backups?
Data Protection & Privacy How Can You Safeguard Your Samsung Data with Regular Backups?

Making a routine backup copy of your data is crucial to ensure your information remains available even if something goes wrong. You can automate the backup process, but you also have the option to create backups manually. The primary objective of a backup is to create an image of the selected data

Critical Misconfiguration Exposes Server via CI/CD and .git Directory
Infrastructure & Network Security Critical Misconfiguration Exposes Server via CI/CD and .git Directory

In a recent cyber incident, Mukesh, the CTO of Razz Security, exploited a significant security vulnerability to gain full server access through Continuous Integration/Continuous Deployment (CI/CD) pipelines. CI/CD pipelines streamline the process of delivering code by automating continuous

Built-In Antivirus vs. Paid Software: Which Offers Better Protection?
Malware & Threats Built-In Antivirus vs. Paid Software: Which Offers Better Protection?

In the ongoing debate about the effectiveness of built-in antivirus software compared to their paid counterparts, recent findings suggest that built-in solutions offer equally robust protection. Built-in antivirus programs on Microsoft and Apple devices, namely Microsoft Defender Antivirus and

Holistic AI-Driven Strategies Enhance Application Security in 2024
Infrastructure & Network Security Holistic AI-Driven Strategies Enhance Application Security in 2024

As organizations increasingly recognize the critical role of application security, strategies to ensure the integrity of their software supply chains have become paramount. The 2024 State of Code Security survey, commissioned by OpenText and conducted by Dark Reading, underscores this shift towards

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later