Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Is UnitedHealth's Data Breach the Worst in U.S. Healthcare History?
Data Protection & Privacy Is UnitedHealth's Data Breach the Worst in U.S. Healthcare History?

The February ransomware attack on Change Healthcare, a subsidiary of UnitedHealth Group (UHG), has sent shockwaves through the U.S. healthcare industry. With over 100 million individuals affected, it stands as the largest theft of medical records in American history. This article delves into the

Apple Launches $1 Million Bug Bounty for Hacking AI-Focused Servers
Infrastructure & Network Security Apple Launches $1 Million Bug Bounty for Hacking AI-Focused Servers

Apple has announced a groundbreaking initiative to encourage the security community to identify and address vulnerabilities in its new AI-focused servers, named Private Cloud Compute (PCC). With a maximum reward of $1 million, this bug bounty program aims to fortify the security measures of PCC,

How Are ASU Scientists Shaping the Future of Cybersecurity?
Infrastructure & Network Security How Are ASU Scientists Shaping the Future of Cybersecurity?

The rapid integration of technology in our daily lives has ushered in a new era of cybersecurity challenges. In response, a trio of researchers from Arizona State University’s Global Security Initiative's Center for Cybersecurity and Trusted Foundations is pioneering innovative approaches to

Are Your Docker Remote API Servers Safe from Cryptojacking Malware?
Infrastructure & Network Security Are Your Docker Remote API Servers Safe from Cryptojacking Malware?

The rise in cryptojacking attacks exploiting unprotected Docker Remote API servers has reached alarming levels. Experts warn that any Linux server with an exposed Docker Remote API is potentially at risk, highlighting the need for organizations to secure their systems effectively. As the

NYDFS Mandates Stronger MFA to Combat AI-Driven Cybersecurity Threats
Security Operations & Management NYDFS Mandates Stronger MFA to Combat AI-Driven Cybersecurity Threats

In response to the escalating security risks posed by artificial intelligence (AI), the New York Department of Financial Services (NYDFS) released new guidelines urging companies to adopt stronger multifactor authentication (MFA) practices. The guidance, issued on October 16, 2024, specifically

Did Guardian Fail Connecticut Customers in Webster Bank Data Breach?
Data Protection & Privacy Did Guardian Fail Connecticut Customers in Webster Bank Data Breach?

In a concerning development for Connecticut residents, Attorney General William Tong announced a significant settlement related to a data breach that compromised the personal information of 157,629 Webster Bank customers. This incident, spanning from November 2022 to January 2023, exposed sensitive

How Will New Cyber Security Laws Impact Organizations?
Infrastructure & Network Security How Will New Cyber Security Laws Impact Organizations?

The recent release of a cyber security legislative package by the Commonwealth government marks a pivotal shift in how organizations in Australia approach digital security. Comprised of the Cyber Security Bill 2024 and amendments to the Intelligence Services Act 2001 and the Security of Critical

Styra Patches NTLM Hash Leak Vulnerability in Open Policy Agent
Infrastructure & Network Security Styra Patches NTLM Hash Leak Vulnerability in Open Policy Agent

In recent developments, Styra has patched a crucial security flaw identified in its Open Policy Agent (OPA) that could have allowed remote attackers to compromise NTLM credentials. Discovered by cybersecurity researchers and designated CVE-2024-8260, this vulnerability necessitated immediate

Are Third-Party Partnerships Creating Cybersecurity Vulnerabilities?
Infrastructure & Network Security Are Third-Party Partnerships Creating Cybersecurity Vulnerabilities?

In an increasingly interconnected world where organizations rely significantly on third-party partnerships, the recent cyberattack targeting Israeli firms has illuminated unforeseen vulnerabilities within these alliances. The attack utilized phishing emails that masqueraded as alerts from the

How is LinkShadow DSPM Transforming Cybersecurity with AI?
Data Protection & Privacy How is LinkShadow DSPM Transforming Cybersecurity with AI?

In an ever-evolving digital landscape, Ahmad Fida Weldali discussed with Mark Forker at GITEX 2024 how LinkShadow's Data Security Posture Management (DSPM) platform is reshaping the cybersecurity domain. Weldali highlighted the platform's ability to provide robust security measures, significantly

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later