Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Are You Ready for Scattered Spider’s Next Cyber Ambush?
Malware & Threats Are You Ready for Scattered Spider’s Next Cyber Ambush?

The escalating activities of Scattered Spider have marked a shift in the global cybersecurity landscape, causing significant concern among organizations worldwide. This notorious cybercrime group has recently expanded its focus, now targeting sectors such as retail, insurance, and airlines. These

Wix Fixes Major Security Flaw in Base44's AI Platform
Identity & Access Management Wix Fixes Major Security Flaw in Base44's AI Platform

In the constantly evolving realm of cybersecurity, uncovering vulnerabilities remains a pressing challenge. We spoke with Rupert Marais, our in-house security specialist renowned for his expertise in endpoint and device security, to delve into the critical authentication flaw discovered in the

Are AI PCs Worth Enterprises’ Investment and Attention?
Data Protection & Privacy Are AI PCs Worth Enterprises’ Investment and Attention?

In an ever-evolving tech landscape, the introduction of Copilot+ PCs has sparked both interest and skepticism within enterprise circles. Rupert Marais, our in-house Security Specialist, offers his insights into why these high-end devices, boasting unique AI capabilities, have yet to gain widespread

Systemd 258: Major Update Boosts Linux System Capabilities
Security Operations & Management Systemd 258: Major Update Boosts Linux System Capabilities

Systemd, since its inception, has transformed the landscape of Linux init systems and taken center stage with its overarching efficiency and utility. The long-awaited release of systemd 258 is marked by significant updates, not just in terms of features but also in shaping future Linux ecosystems.

Is Google Misusing Android Users' Cellular Data?
Endpoint & Device Security Is Google Misusing Android Users' Cellular Data?

The ever-evolving landscape of digital privacy and data protection has taken a significant turn with the conclusion of a profound legal battle involving tech giant Google. A recent ruling by a California court mandated that Google pay $314 million for improperly using Android users' cellular data

Ivanti Endpoint Security – Review
Security Operations & Management Ivanti Endpoint Security – Review

In the modern age of digital operations, cybersecurity remains a pressing concern for businesses worldwide. Within this landscape, Ivanti Endpoint Security has emerged as a significant player, providing tools crucial for protecting against evolving cyber threats. Despite its efforts to patch

Cybersecurity Strategies for 2025: Essential Tips and Trends
Security Operations & Management Cybersecurity Strategies for 2025: Essential Tips and Trends

As the digital world becomes increasingly interconnected, the advancements come with heightened risks of cyber threats, demanding robust cybersecurity strategies. Cybersecurity has become more crucial than ever, influencing not only the safety of sensitive data but also the stability of the global

Trend Analysis: Cryptojacking in Cloud Environments
Infrastructure & Network Security Trend Analysis: Cryptojacking in Cloud Environments

A startling new report reveals that nearly half of global cloud environments have, at some point, been subjected to cryptojacking activities, resulting in substantial operational costs and potential data breaches. As cybercriminals become more adept at leveraging anonymization tactics and

Is YOLO Mode in AI Coding Tools a Security Nightmare?
Data Protection & Privacy Is YOLO Mode in AI Coding Tools a Security Nightmare?

Automation in technology often promises to free humans from mundane tasks, but what if this promise comes with an unforeseen cost? AI coding tools have revolutionized the way developers approach coding tasks by offering remarkable autonomy. However, as these tools continue to grow in

Cybercriminals Exploit AI Surge with SEO-Poisoned Malware
Endpoint & Device Security Cybercriminals Exploit AI Surge with SEO-Poisoned Malware

In the rapidly evolving digital landscape, a significant increase in the use of artificial intelligence (AI) tools has been met with a corresponding rise in cybersecurity threats. Cybercriminals have shifted their strategies to meticulously target AI enthusiasts, exploiting the popularity of

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later