Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Why Did Wiz Choose an IPO Over Google's $23 Billion Acquisition?
Infrastructure & Network Security Why Did Wiz Choose an IPO Over Google's $23 Billion Acquisition?

In the dynamic realm of cybersecurity, strategic choices can shape the trajectory of a company’s future. Such is the case with Wiz, an Israeli cloud security firm, which recently made headlines by opting for an initial public offering (IPO) over a $23 billion acquisition by Alphabet, Google’s par

BBVA and Telefónica Tech Fortify Cybersecurity with Global Dual Hubs
Infrastructure & Network Security BBVA and Telefónica Tech Fortify Cybersecurity with Global Dual Hubs

The strategic partnership between BBVA, a prominent global financial services group, and Telefónica Tech, a leader in cybersecurity technology, is making waves in the industry. This collaboration aims to significantly bolster BBVA's cybersecurity posture through the integration of advanced

How Can Bolster Help Combat Phishing After the CrowdStrike Incident?
Infrastructure & Network Security How Can Bolster Help Combat Phishing After the CrowdStrike Incident?

In the wake of the recent CrowdStrike software incident, cybersecurity firm Bolster has observed a significant surge in malicious activity. Bolster, using its free CheckPhish site, reported that over 40 phishing and phony lookalike domains were established within the first 24 hours following the

Intel and Partners Enhance AI Security with Confidential Computing
Data Protection & Privacy Intel and Partners Enhance AI Security with Confidential Computing

The critical importance of data protection in AI adoption cannot be overstated. With organizations increasingly leveraging AI to manage, analyze, and derive meaningful insights from massive datasets, the importance of securing this data during processing is paramount. Intel's approach to

ZeroPath Enhances GitHub Security with Automated Vulnerability Fixes
Infrastructure & Network Security ZeroPath Enhances GitHub Security with Automated Vulnerability Fixes

In the ever-evolving landscape of technology, ensuring product security remains a significant challenge for businesses. Developers and engineers often find themselves inundated with false positives and unresolvable issues stemming from current Static Application Security Testing (SAST)

How Did Crowdstrike Quickly Address the Recent Windows Outage?
Infrastructure & Network Security How Did Crowdstrike Quickly Address the Recent Windows Outage?

The recent Windows outage caused by a sensor configuration update in Crowdstrike's Falcon platform serves as a pivotal example of how a cybersecurity company should manage a technical crisis. The incident led to significant system failures, including the notorious blue screens of death (BSOD)

How Will the EU's New Cybersecurity Certification Impact Digital Markets?
Security Operations & Management How Will the EU's New Cybersecurity Certification Impact Digital Markets?

The European Union has launched its inaugural Cybersecurity Certification Scheme, a significant milestone aiming to enhance cybersecurity standards across member states. Developed under the European Cybersecurity Scheme on Common Criteria (EUCC) and facilitated by the European Union Agency for

How Will DevSecOps Revolutionize Software Development and Security?
Security Operations & Management How Will DevSecOps Revolutionize Software Development and Security?

In today’s fast-paced digital world, the software development lifecycle (SDLC) is undergoing a transformative shift. Traditional approaches that focus on separate phases for development, security, and operations are being replaced by the revolutionary integration of these functions known as D

AI Enhances DevSecOps: Efficient Log Management and Threat Detection
Malware & Threats AI Enhances DevSecOps: Efficient Log Management and Threat Detection

The integration of artificial intelligence (AI) into DevSecOps is revolutionizing the way organizations handle log management and threat detection. This transformation is crucial as the sheer volume and complexity of log data from cloud-native environments often surpass human capacity for effective

Massive Data Breach at mSpy Exposes Millions of Spyware Users Worldwide
Malware & Threats Massive Data Breach at mSpy Exposes Millions of Spyware Users Worldwide

The recent data breach at mSpy, a controversial phone surveillance app, has exposed millions of users who subscribed to its services. This incident emphasizes not only the personal information of individuals but also raises significant ethical, legal, and security concerns surrounding spyware

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later