Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Safeguarding ASU's Supercomputer Sol from Cyber Threats
Infrastructure & Network Security Safeguarding ASU's Supercomputer Sol from Cyber Threats

At Arizona State University (ASU), a technological marvel named Sol stands as a beacon of academic innovation, holding the prestigious rank of No. 388 among the top 500 supercomputers worldwide, and its high-performance computing (HPC) system is equipped with 18,000 CPU cores and 224 GPUs.

China Exploits VMware Bug for Nearly a Year Before Discovery
Malware & Threats China Exploits VMware Bug for Nearly a Year Before Discovery

Imagine a critical flaw in widely used software, silently exploited by state-sponsored actors for nearly a year, compromising virtual environments across industries, and remaining undetected until it was almost too late to respond effectively. This alarming reality came to light with the discovery

Why Is Cybersecurity Urgent for Smart Home Integrators?
Infrastructure & Network Security Why Is Cybersecurity Urgent for Smart Home Integrators?

Fixed version: In an era where homes are becoming increasingly connected through smart devices, the risk of cyber threats looms larger than ever, particularly for high-net-worth individuals whose residences often double as workspaces, making them prime targets for hackers. Imagine a scenario where

Malicious AI Server Steals Emails via Postmark MCP Breach
Identity & Access Management Malicious AI Server Steals Emails via Postmark MCP Breach

What if the very tools trusted to streamline daily tasks turned against their users, quietly siphoning off sensitive data like emails and invoices? This chilling reality has struck hundreds of organizations as a once-reliable AI server, designed to manage email workflows, has been exposed as a

AI Ethical Challenges – Review
Data Protection & Privacy AI Ethical Challenges – Review

Introduction to AI and Ethical Concerns Imagine a world where machines not only perform tasks but also shape thoughts, influence emotions, and even challenge spiritual beliefs—a scenario that is no longer science fiction but a pressing reality with the rise of Artificial Intelligence (AI). This

Why Is the Gaming Industry a Top Target for Cyberattacks?
Malware & Threats Why Is the Gaming Industry a Top Target for Cyberattacks?

I'm thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network management. With a recent cyberattack on Boyd Gaming making headlines, where employee data was stolen from their internal IT

Mobile App API Security – Review
Endpoint & Device Security Mobile App API Security – Review

Setting the Stage for API Security Concerns Imagine a world where every third mobile app on your device silently leaks sensitive data, exposing personal and corporate information to unseen attackers, a scenario that is not a distant threat but a stark reality in today's digital landscape. As mobile

China-Linked Hackers Target U.S. Firms with Stealthy Malware
Data Protection & Privacy China-Linked Hackers Target U.S. Firms with Stealthy Malware

In the ever-evolving landscape of cybersecurity, few threats are as insidious as those orchestrated by nation-state actors with advanced capabilities. Today, we’re diving into a critical issue with Rupert Marais, our in-house security specialist renowned for his expertise in endpoint and device

Feds Bust 100,000 SIM Card Network Threatening NYC Towers
Infrastructure & Network Security Feds Bust 100,000 SIM Card Network Threatening NYC Towers

What if a hidden network could sever all cellular communication in New York City with a single command, leaving millions stranded without access to emergency services or vital connections? Federal authorities have uncovered a staggering operation just miles from the United Nations headquarters,

How Are Attackers Targeting Mac Users with GitHub Malware?
Endpoint & Device Security How Are Attackers Targeting Mac Users with GitHub Malware?

In an increasingly digital world where trust in popular platforms can be a double-edged sword, Mac users are finding themselves in the crosshairs of a sophisticated cyberthreat campaign that exploits the credibility of GitHub. Cybercriminals are using this widely recognized code repository platform

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later