Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Are You Ready for the Evolving Cybersecurity Threats of 2025?
Malware & Threats Are You Ready for the Evolving Cybersecurity Threats of 2025?

Cybersecurity threats continue to evolve at an alarming rate, reflecting the growing sophistication and determination of cybercriminals. As organizations strive to stay one step ahead, understanding the current landscape and being prepared for emerging threats has never been more critical. This

How Is Google Cloud Revolutionizing Security With AI?
Infrastructure & Network Security How Is Google Cloud Revolutionizing Security With AI?

Amid growing concerns over cybersecurity, Google Cloud has taken considerable strides in enhancing its security measures through cutting-edge artificial intelligence (AI). Recently, during its 'Next 25' conference, Google unveiled a suite of security solutions designed to fortify

Phishing Mastermind Noah Urban Pleads Guilty: What Happens Next?
Malware & Threats Phishing Mastermind Noah Urban Pleads Guilty: What Happens Next?

In a case that has sent shockwaves through the cybersecurity world, Noah Urban, a key figure behind the notorious Scattered Spider cybercrime ring, has pleaded guilty. Urban, widely known by several online aliases including 'Sosa' and 'Elijah,' has been implicated in a series of

How to Successfully Deploy SASE for Modern Security Needs
Infrastructure & Network Security How to Successfully Deploy SASE for Modern Security Needs

Managing network and security architecture has grown significantly more complex compared to previous decades. Digital transformation initiatives, cloud adoption, and the exponential rise in remote work have profoundly changed the traditional security perimeter. Enterprise applications now

How Are Tax-Themed Phishing Attacks Evolving in 2025?
Infrastructure & Network Security How Are Tax-Themed Phishing Attacks Evolving in 2025?

Rupert Marais is our in-house Security specialist with expertise in endpoint and device security, cybersecurity strategies, and network management. In this interview, we dive into the intricacies of recent tax-themed email attacks, the underlying mechanisms of various malware, and the sophisticated

What Are the Best Business VPNs for 2025? Expert Reviews
Infrastructure & Network Security What Are the Best Business VPNs for 2025? Expert Reviews

In an era where businesses are increasingly reliant on digital connectivity, safeguarding sensitive data against cyber threats has become paramount. Today's cybercriminals are adept at exploiting vulnerabilities to gain unauthorized access to critical business information. A Virtual Private

Is Your Cybersecurity Strategy Ready for Evolving AI Threats?
Malware & Threats Is Your Cybersecurity Strategy Ready for Evolving AI Threats?

The rapid advancement of artificial intelligence (AI) is reshaping the cybersecurity landscape significantly, presenting both opportunities and challenges for organizations worldwide. AI-powered tools are now widely utilized for both defensive measures and offensive tactics, making the evolution of

Weekly Cybersecurity Update: Threats, Breaches, and Defensive Tips
Infrastructure & Network Security Weekly Cybersecurity Update: Threats, Breaches, and Defensive Tips

In today's rapidly evolving digital landscape, cybersecurity threats are becoming increasingly sophisticated and pervasive, targeting both individuals and organizations with unprecedented frequency and intensity. Staying informed about the latest developments and adopting effective defensive

Oracle Faces Second Data Breach, 6 Million Records Compromised
Infrastructure & Network Security Oracle Faces Second Data Breach, 6 Million Records Compromised

In a startling turn of events, Oracle Corporation experienced a significant data breach involving its older Gen 1 servers, making it the company's second cybersecurity incident within weeks. The breach came to light after a threat actor, known as "rose87168," claimed responsibility

Can AI-Driven Social Engineering Be Stopped by Adaptive Security?
Data Protection & Privacy Can AI-Driven Social Engineering Be Stopped by Adaptive Security?

In an era where artificial intelligence is revolutionizing various industries, the rise of AI-driven social engineering attacks has emerged as a significant challenge for cybersecurity. Adaptive Security, a pioneering startup, has successfully secured $43 million in Series A funding to combat this

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later