Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Can Organizations Overcome Challenges in Data Security Investments?
Data Protection & Privacy Can Organizations Overcome Challenges in Data Security Investments?

Amid an escalating landscape of cyber threats and regulatory requirements, organizations are ramping up investments in data security to protect their invaluable assets. According to a recent Normalyze report, an overwhelming 89% of organizations intend to significantly or moderately increase their

Park'N Fly Data Breach Exposes Personal Info of 1 Million Customers
Data Protection & Privacy Park'N Fly Data Breach Exposes Personal Info of 1 Million Customers

A significant data breach has compromised personal information for nearly one million customers of Park'N Fly, a leading Canadian airport parking service. This incident underscores the ongoing cybersecurity challenges faced by companies and the need for consumers to remain vigilant. Nature and

Western Hypocrisy: Criticizing Hong Kong While Ignoring Own Cyber Laws
Infrastructure & Network Security Western Hypocrisy: Criticizing Hong Kong While Ignoring Own Cyber Laws

In recent times, the Western media, particularly outlets like Bloomberg, have vociferously criticized Hong Kong's proposed legislation to enhance cybersecurity for its critical infrastructure. However, this critique exemplifies a double standard when considering the stringent cybersecurity

Revived Wi-Fi Scam Heightens Digital Security and Privacy Concerns
Infrastructure & Network Security Revived Wi-Fi Scam Heightens Digital Security and Privacy Concerns

In an age where digital connectivity is indispensable, the resurgence of a notorious Wi-Fi scam from 2011 has again raised alarms. This scam, which involves setting up fake Wi-Fi hotspots to steal personal data, has returned with renewed vigor, posing significant risks to both private and public

Kinsta Earns Triple ISO Certifications for Data Security Excellence
Security Operations & Management Kinsta Earns Triple ISO Certifications for Data Security Excellence

Kinsta, a managed WordPress hosting company, recently announced a significant achievement that elevates its standing in the realm of data security and privacy. The company has successfully acquired three prominent ISO certifications: ISO 27001, 27017, and 27018. These certifications reflect

How Did Paris Olympics Successfully Defend Against Cyberattacks?
Infrastructure & Network Security How Did Paris Olympics Successfully Defend Against Cyberattacks?

As the world geared up for the grand spectacle of the Paris Olympics, another unseen battle was unfolding behind the scenes—a battle against cyberattacks. The games, spanning from July 26 to August 11, placed the French government and its cybersecurity agency, Anssi, on high alert. Their mission w

Enhancing LCNC Security: Adopting CTEM for Low-Code/No-Code Platforms
Malware & Threats Enhancing LCNC Security: Adopting CTEM for Low-Code/No-Code Platforms

The rapidly evolving landscape of low-code/no-code (LCNC) development and robotic process automation (RPA) has revolutionized how organizations approach software creation, enabling faster development cycles and increased efficiency. However, these advancements have also introduced new cybersecurity

How Will Malaysia's Cyber Security Act 2024 Safeguard IT Systems?
Security Operations & Management How Will Malaysia's Cyber Security Act 2024 Safeguard IT Systems?

The Malaysia Cyber Security Act 2024 (CSA), coming into force on August 26, 2024, marks a significant step in Malaysia's commitment to bolstering national cybersecurity. This landmark legislation, alongside its four subsidiary regulations, sets robust measures to protect the country's

How Do Wizr.ai's New Certifications Boost Data Security and Compliance?
Security Operations & Management How Do Wizr.ai's New Certifications Boost Data Security and Compliance?

Wizr.ai, an innovative AI-focused company, has recently achieved two significant certifications: SOC 2 Type 2 and ISO 27001. These certifications not only highlight Wizr.ai’s commitment to data security and compliance but also position the company for future growth in the AI sector. This article d

How Can We Safeguard Systems from Bonjour's Privilege Escalation Risk?
Infrastructure & Network Security How Can We Safeguard Systems from Bonjour's Privilege Escalation Risk?

In the sprawling landscape of modern technology, networking services like Apple's Bonjour are integral in facilitating device and service discovery on local area networks, aiding seamless interaction between macOS and Windows systems. However, a critical vulnerability has been identified in

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later