Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Styra Patches NTLM Hash Leak Vulnerability in Open Policy Agent
Infrastructure & Network Security Styra Patches NTLM Hash Leak Vulnerability in Open Policy Agent

In recent developments, Styra has patched a crucial security flaw identified in its Open Policy Agent (OPA) that could have allowed remote attackers to compromise NTLM credentials. Discovered by cybersecurity researchers and designated CVE-2024-8260, this vulnerability necessitated immediate

Are Third-Party Partnerships Creating Cybersecurity Vulnerabilities?
Infrastructure & Network Security Are Third-Party Partnerships Creating Cybersecurity Vulnerabilities?

In an increasingly interconnected world where organizations rely significantly on third-party partnerships, the recent cyberattack targeting Israeli firms has illuminated unforeseen vulnerabilities within these alliances. The attack utilized phishing emails that masqueraded as alerts from the

How is LinkShadow DSPM Transforming Cybersecurity with AI?
Data Protection & Privacy How is LinkShadow DSPM Transforming Cybersecurity with AI?

In an ever-evolving digital landscape, Ahmad Fida Weldali discussed with Mark Forker at GITEX 2024 how LinkShadow's Data Security Posture Management (DSPM) platform is reshaping the cybersecurity domain. Weldali highlighted the platform's ability to provide robust security measures,

How Will the New UK Cybersecurity Bill Enhance Digital Resilience?
Security Operations & Management How Will the New UK Cybersecurity Bill Enhance Digital Resilience?

The upcoming Cybersecurity and Resilience Bill's introduction to the UK Parliament in 2025 marks a significant legislative effort to fortify the nation's digital defense mechanisms. Catalyzed by increasing cyber threats, notably the severe ransomware attack on NHS England in June 2024,

Cyberattackers Use Fake Google Meet Errors in Sophisticated Malware Scam
Infrastructure & Network Security Cyberattackers Use Fake Google Meet Errors in Sophisticated Malware Scam

In a recent turn of events, cyberattackers have begun utilizing fake Google Meet error messages as part of an elaborate social engineering campaign known as ClickFix. This campaign aims to disseminate info-stealing malware by banking on users' trust in widely-used platforms like Google Meet.

How Can You Keep Your Mobile Device Secure While Browsing Online?
Data Protection & Privacy How Can You Keep Your Mobile Device Secure While Browsing Online?

In today's digital age, our mobile devices have become an indispensable part of our lives, serving as crucial tools for communication, entertainment, work, and more. However, with this increased reliance comes the challenge of ensuring our mobile data remains secure. According to experts, the

How Are Akamai's New AI and ML Tools Transforming Cybersecurity?
Infrastructure & Network Security How Are Akamai's New AI and ML Tools Transforming Cybersecurity?

As cyber threats grow increasingly sophisticated, organizations are under immense pressure to fortify their defenses. Akamai Technologies Inc., a leader in content delivery networks and cloud services, has introduced groundbreaking updates to its security portfolio: the Behavioral DDoS Engine and

Google, GASA, and DNS Tackle Internet Security with Global Alliance
Editorial Google, GASA, and DNS Tackle Internet Security with Global Alliance

Cybercrime follows a worryingly upward trend, and by 2029 is estimated to drain $15.63 trillion from the global economy. With the proliferation of AI, it's even easier for hackers and threat actors to use social engineering and brute force hacking to exploit vulnerable people and code.  Bad

Urgent Alert: Encrypt Persistence Cookies to Thwart Cyber Attacks
Infrastructure & Network Security Urgent Alert: Encrypt Persistence Cookies to Thwart Cyber Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has recently raised alarms about active cyber-attacks exploiting unencrypted persistence cookies managed by the F5 BIG-IP Local Traffic Manager module. Malicious actors are leveraging these vulnerabilities to identify and exploit

Legislators Act to Protect Neural Data Amid Privacy Abuse Concerns
Data Protection & Privacy Legislators Act to Protect Neural Data Amid Privacy Abuse Concerns

The rapid advancement of technology has brought significant changes to our lives, often enhancing convenience and connectivity. However, it has also ushered in new challenges, particularly concerning privacy. As companies explore groundbreaking innovations in neural data collection, these

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later