Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Configuring Secured-Core Server on Windows for Enhanced Security and Performance
Infrastructure & Network Security Configuring Secured-Core Server on Windows for Enhanced Security and Performance

Ensuring that your server is protected against various vulnerabilities is imperative for maintaining data security and overall system performance. A Secured-Core server provides a robust set of security features that protect hardware, firmware, drivers, and the operating system. These protections

Are Your Cisco Devices Vulnerable Due to Legacy Features and Weak Passwords?
Infrastructure & Network Security Are Your Cisco Devices Vulnerable Due to Legacy Features and Weak Passwords?

In today's digital landscape, maintaining robust network security is more crucial than ever. Despite this, many organizations continue to rely on outdated technologies and weak password protocols. Recent warnings from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) have shone a

Can OpenSSH CVE-2024-6387 and CVE-2024-6409 Affect Your Linux System?
Infrastructure & Network Security Can OpenSSH CVE-2024-6387 and CVE-2024-6409 Affect Your Linux System?

The discovery of two critical vulnerabilities in OpenSSH's server (sshd) has sent ripples through the tech community. These vulnerabilities, identified as CVE-2024-6387 and CVE-2024-6409, present significant risks for glibc-based Linux systems. Both vulnerabilities allow remote unauthenticated code

Attackers Exploit URL Protection Services, Undermining Email Security Efforts
Infrastructure & Network Security Attackers Exploit URL Protection Services, Undermining Email Security Efforts

Email security mechanisms have become essential for protecting users from increasingly sophisticated phishing attacks. Despite these technological advancements, cybercriminals continually adapt their strategies to exploit even the most robust defenses, finding innovative ways to bypass security

Tech Giants Drive Innovation Amid Cybersecurity and Market Trends
Infrastructure & Network Security Tech Giants Drive Innovation Amid Cybersecurity and Market Trends

The tech industry is buzzing with groundbreaking innovations and strategic maneuvers from major players like Cisco, NVIDIA, Apple, OpenAI, and more. These advancements not only highlight the relentless pace at which technology evolves but also emphasize the critical focus on cybersecurity and

Why Did Wiz Choose an IPO Over Google's $23 Billion Acquisition?
Infrastructure & Network Security Why Did Wiz Choose an IPO Over Google's $23 Billion Acquisition?

In the dynamic realm of cybersecurity, strategic choices can shape the trajectory of a company’s future. Such is the case with Wiz, an Israeli cloud security firm, which recently made headlines by opting for an initial public offering (IPO) over a $23 billion acquisition by Alphabet, Google’s

BBVA and Telefónica Tech Fortify Cybersecurity with Global Dual Hubs
Infrastructure & Network Security BBVA and Telefónica Tech Fortify Cybersecurity with Global Dual Hubs

The strategic partnership between BBVA, a prominent global financial services group, and Telefónica Tech, a leader in cybersecurity technology, is making waves in the industry. This collaboration aims to significantly bolster BBVA's cybersecurity posture through the integration of advanced

How Can Bolster Help Combat Phishing After the CrowdStrike Incident?
Infrastructure & Network Security How Can Bolster Help Combat Phishing After the CrowdStrike Incident?

In the wake of the recent CrowdStrike software incident, cybersecurity firm Bolster has observed a significant surge in malicious activity. Bolster, using its free CheckPhish site, reported that over 40 phishing and phony lookalike domains were established within the first 24 hours following the

Intel and Partners Enhance AI Security with Confidential Computing
Data Protection & Privacy Intel and Partners Enhance AI Security with Confidential Computing

The critical importance of data protection in AI adoption cannot be overstated. With organizations increasingly leveraging AI to manage, analyze, and derive meaningful insights from massive datasets, the importance of securing this data during processing is paramount. Intel's approach to

ZeroPath Enhances GitHub Security with Automated Vulnerability Fixes
Infrastructure & Network Security ZeroPath Enhances GitHub Security with Automated Vulnerability Fixes

In the ever-evolving landscape of technology, ensuring product security remains a significant challenge for businesses. Developers and engineers often find themselves inundated with false positives and unresolvable issues stemming from current Static Application Security Testing (SAST)

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later