Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
How Are Emojis Revolutionizing Cyber-Attack Commands?
Infrastructure & Network Security How Are Emojis Revolutionizing Cyber-Attack Commands?

The rise of sophisticated cyber-attack mechanisms is a perpetual concern in our increasingly digital world. Among the newest threats is an innovative technique developed by hackers, allegedly based in Pakistan, that capitalizes on the innocuous nature of emojis. This article delves into how these

Rising GitHub Threats Demand Stronger Security Measures
Infrastructure & Network Security Rising GitHub Threats Demand Stronger Security Measures

In an era where the digital landscape is a battleground for data integrity, the emergence of sophisticated cyber threats has become a pressing concern. Among these, collaborative development platforms like GitHub are being targeted by malevolent entities. Groups like GitLocker, in particular,

Are Free Android VPNs Compromising Your Privacy?
Infrastructure & Network Security Are Free Android VPNs Compromising Your Privacy?

The prevalence of free Android VPNs raises substantial privacy and security concerns. Top10VPN's damning report on the top 100 most downloaded free VPN apps, with over 2.5 billion installs, reveals alarming vulnerabilities that could undermine the very purpose of using a VPN. Are these freely

Is Fortinet Set to Revolutionize Cloud Security With Lacework?
Infrastructure & Network Security Is Fortinet Set to Revolutionize Cloud Security With Lacework?

In the dynamic world of cybersecurity, strategic acquisitions are not just about market consolidation; they're about the radical enhancement of technological capability and service offerings. Fortinet, a distinguished entity in the cybersecurity space, is doing just that with its latest move—a

How Are Network Infrastructure Attacks Outpacing Endpoint Risks?
Malware & Threats How Are Network Infrastructure Attacks Outpacing Endpoint Risks?

The world of cybersecurity is undergoing a pivotal transformation. As we entrench ourselves deeper into the digital age, the very nature of threats to our interconnected systems evolves. Cybersecurity isn't just about defending endpoints anymore—the spotlight has shifted to the networks that b

Samsung and IBM Partner to Bolster Mobile Security with Knox
Endpoint & Device Security Samsung and IBM Partner to Bolster Mobile Security with Knox

In an era where digital threats are increasingly sophisticated, a robust mobile security strategy is essential for modern enterprises. Addressing this need, Samsung Electronics has teamed up with IBM to enhance the security framework for mobile devices. This partnership leverages Samsung's

Is Australia's New Funding Enough to Combat Identity Theft?
Data Protection & Privacy Is Australia's New Funding Enough to Combat Identity Theft?

In the face of rising cyber threats, the Australian government has taken definitive action by pledging $19.7 million over four years to address a stark trend in identity theft. With the number of support cases required by Australians hitting approximately 25,000 this past year, the incidents of

BBC, Boots and British Airways: The Biggest Data Breaches in Britain
Editorial BBC, Boots and British Airways: The Biggest Data Breaches in Britain

June got off to a rocky start for several high-profile companies across the UK. Boots, a health, beauty, and pharmacy retailer, national carrier British Airways, and national news channel BBC are among a string of businesses targeted by a group of hackers.  The threat actors, known as Clop , are

Tanium Launches Automate for Autonomous Endpoint Management
Endpoint & Device Security Tanium Launches Automate for Autonomous Endpoint Management

Tanium Inc. has introduced a game-changing solution called Tanium Automate aimed at redefining cybersecurity through the automation of endpoint management. This new platform boasts pioneering features in autonomous endpoint handling, elevating the standards for cyber threat response. Tanium

The Soaring Cost of Zero-Day Exploits in Cybersecurity Market
Malware & Threats The Soaring Cost of Zero-Day Exploits in Cybersecurity Market

In the enigmatic recesses of cybersecurity, a transformation is underway as zero-day exploits, the hacking instruments exploiting unknown software flaws, become increasingly revered in the cyber underworld's market. With tech companies ramping up security, the demand and prices for these

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later