Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Trend Analysis: Cryptojacking in Cloud Environments
Infrastructure & Network Security Trend Analysis: Cryptojacking in Cloud Environments

A startling new report reveals that nearly half of global cloud environments have, at some point, been subjected to cryptojacking activities, resulting in substantial operational costs and potential data breaches. As cybercriminals become more adept at leveraging anonymization tactics and

Is YOLO Mode in AI Coding Tools a Security Nightmare?
Data Protection & Privacy Is YOLO Mode in AI Coding Tools a Security Nightmare?

Automation in technology often promises to free humans from mundane tasks, but what if this promise comes with an unforeseen cost? AI coding tools have revolutionized the way developers approach coding tasks by offering remarkable autonomy. However, as these tools continue to grow in

Cybercriminals Exploit AI Surge with SEO-Poisoned Malware
Endpoint & Device Security Cybercriminals Exploit AI Surge with SEO-Poisoned Malware

In the rapidly evolving digital landscape, a significant increase in the use of artificial intelligence (AI) tools has been met with a corresponding rise in cybersecurity threats. Cybercriminals have shifted their strategies to meticulously target AI enthusiasts, exploiting the popularity of

FCC Moves to Protect Undersea Cables from Foreign Threats
Infrastructure & Network Security FCC Moves to Protect Undersea Cables from Foreign Threats

In today's interconnected world, the security of undersea internet cables has become a vital national concern. Rupert Marais, an expert in telecommunications security, offers his insights into the actions being taken by the US to safeguard these critical infrastructures from foreign influences.

How Can Businesses Tackle Ransomware with Legacy Systems?
Identity & Access Management How Can Businesses Tackle Ransomware with Legacy Systems?

In recent times, the rise in ransomware attacks has mounted significant pressure on businesses worldwide, especially those heavily relying on legacy systems. Notable incidents at major retailers like Marks & Spencer and the Co-op have spotlighted the vulnerabilities these older infrastructures

Are SAP GUI Security Flaws a Threat to Your Data Privacy?
Infrastructure & Network Security Are SAP GUI Security Flaws a Threat to Your Data Privacy?

In today's world, where data security is paramount, understanding threats to critical systems is essential. Rupert Marais, an expert in endpoint and device security, sheds light on recent vulnerabilities discovered in SAP GUI, a crucial interface for many enterprises. These weaknesses, if

Are Cloud Misconfigurations Fueling Cryptojacking Threats?
Infrastructure & Network Security Are Cloud Misconfigurations Fueling Cryptojacking Threats?

In an era where cloud-based networks are becoming integral to businesses worldwide, threats exploiting such systems have risen sharply. Today, we have the privilege of speaking with Rupert Marais, an expert in endpoint and device security, to delve into the complexities of recent cybersecurity

Are Mobile Phishing Scams Undermining Your Security?
Endpoint & Device Security Are Mobile Phishing Scams Undermining Your Security?

In today's increasingly digital landscape, mobile phishing scams have become a significant cybersecurity threat that businesses cannot ignore. Alarmingly, nearly 60% of companies have reported incidents involving voice or text phishing attacks. Even though a substantial 77% encountered such attacks

Are MCP Vulnerabilities a Threat to AI Security?
Endpoint & Device Security Are MCP Vulnerabilities a Threat to AI Security?

In the ever-evolving landscape of artificial intelligence, the Model Context Protocol (MCP) has emerged as a critical infrastructure component, facilitating seamless interaction between AI models and diverse data sources. Recently, however, vulnerabilities in MCP have surfaced, challenging its

How Does Community Policing Prevent Online Scams?
Identity & Access Management How Does Community Policing Prevent Online Scams?

The rapid growth of digital communication has led to a rise in online scams targeting vulnerable individuals, leaving them susceptible to financial loss and emotional distress. One notable instance involved a man from Milford Haven, Pembrokeshire, who fell prey to a scam involving a fictional

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later