Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Inspiro Earns 2024 Fortress Cybersecurity Award for Data Protection Excellence
Data Protection & Privacy Inspiro Earns 2024 Fortress Cybersecurity Award for Data Protection Excellence

With over two decades of expertise in customer experience (CX) outsourcing, Inspiro has established itself as a notable player in various industries. The company’s services span several domains including telecoms, media, retail, e-commerce, banking, fintech, and energy. This multifaceted approach h

Phishing Attack at Los Angeles County DPH Exposes Sensitive Data
Data Protection & Privacy Phishing Attack at Los Angeles County DPH Exposes Sensitive Data

The Los Angeles County Department of Public Health (DPH) recently experienced a significant data breach affecting over 200,000 individuals. Initiated by a phishing attack, external threat actors obtained the login credentials of 53 DPH employees, leading to unauthorized access to a vast array of

How Can IT Teams Overcome 2024's Cybersecurity Challenges?
Infrastructure & Network Security How Can IT Teams Overcome 2024's Cybersecurity Challenges?

The landscape of cybersecurity is evolving at an unprecedented pace, and 2024 is poised to be one of the most challenging years for IT security teams worldwide. With the increasing sophistication of cyberattacks, expanding attack surfaces, and the ever-growing complexities in cloud security,

Rising Credential Thefts Spotlight Urgency of MFA Adoption
Infrastructure & Network Security Rising Credential Thefts Spotlight Urgency of MFA Adoption

In the ceaseless battle against cyber threats, a new report casts a stark light on the vulnerabilities plaguing our digital infrastructures. According to the 2024 Verizon Data Breach Investigations Report (DBIR), an alarming 38% of data breaches are traced back to stolen credentials. This figure is

How Are Emojis Revolutionizing Cyber-Attack Commands?
Infrastructure & Network Security How Are Emojis Revolutionizing Cyber-Attack Commands?

The rise of sophisticated cyber-attack mechanisms is a perpetual concern in our increasingly digital world. Among the newest threats is an innovative technique developed by hackers, allegedly based in Pakistan, that capitalizes on the innocuous nature of emojis. This article delves into how these

Rising GitHub Threats Demand Stronger Security Measures
Infrastructure & Network Security Rising GitHub Threats Demand Stronger Security Measures

In an era where the digital landscape is a battleground for data integrity, the emergence of sophisticated cyber threats has become a pressing concern. Among these, collaborative development platforms like GitHub are being targeted by malevolent entities. Groups like GitLocker, in particular,

Are Free Android VPNs Compromising Your Privacy?
Infrastructure & Network Security Are Free Android VPNs Compromising Your Privacy?

The prevalence of free Android VPNs raises substantial privacy and security concerns. Top10VPN's damning report on the top 100 most downloaded free VPN apps, with over 2.5 billion installs, reveals alarming vulnerabilities that could undermine the very purpose of using a VPN. Are these freely

Is Fortinet Set to Revolutionize Cloud Security With Lacework?
Infrastructure & Network Security Is Fortinet Set to Revolutionize Cloud Security With Lacework?

In the dynamic world of cybersecurity, strategic acquisitions are not just about market consolidation; they're about the radical enhancement of technological capability and service offerings. Fortinet, a distinguished entity in the cybersecurity space, is doing just that with its latest move—a

How Are Network Infrastructure Attacks Outpacing Endpoint Risks?
Malware & Threats How Are Network Infrastructure Attacks Outpacing Endpoint Risks?

The world of cybersecurity is undergoing a pivotal transformation. As we entrench ourselves deeper into the digital age, the very nature of threats to our interconnected systems evolves. Cybersecurity isn't just about defending endpoints anymore—the spotlight has shifted to the networks that b

Samsung and IBM Partner to Bolster Mobile Security with Knox
Endpoint & Device Security Samsung and IBM Partner to Bolster Mobile Security with Knox

In an era where digital threats are increasingly sophisticated, a robust mobile security strategy is essential for modern enterprises. Addressing this need, Samsung Electronics has teamed up with IBM to enhance the security framework for mobile devices. This partnership leverages Samsung's

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later