Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Data Breach at GAO: 6,600 Individuals Compromised in Cybersecurity Failure
Data Protection & Privacy Data Breach at GAO: 6,600 Individuals Compromised in Cybersecurity Failure

A substantial data breach has struck the heart of the U.S. Government Accountability Office (GAO), rattling the institution entrusted with auditing and ensuring efficient use of taxpayer resources. According to Charles Young, the GAO spokesman, a cybersecurity incident has led to the exposure of

How Did a Fake Zoom App Steal $1 Million from a DeFi User's Wallet?
Malware & Threats How Did a Fake Zoom App Steal $1 Million from a DeFi User's Wallet?

In an ever-evolving digital landscape, the latest phishing attacks exploiting popular platforms such as Zoom highlight the vulnerabilities of the Decentralized Finance (DeFi) space. The story of a skilled miner falling victim to a phishing attack, resulting in a theft of over $1 million from his

Cloud Security: Key Trends and Developments
Editorial Cloud Security: Key Trends and Developments

Cloud computing has rapidly become the backbone of the modern digital infrastructure, powering all aspects of the digital world—from e-commerce to artificial intelligence (AI) and machine learning (ML). In 2023, Gartner predicts that worldwide public spending on cloud computing will grow by 20.7% c

What Is Decentralized Identity Management, and How Does It Impact Organizations and Users?
Editorial What Is Decentralized Identity Management, and How Does It Impact Organizations and Users?

Decentralized identity management (DIM) is an evolved method of identity and access management (IAM), benefiting both organizations and individuals. On the one hand, identity-related security breaches negatively impacted over 10 million people in 2022 . And this is equally common among companies,

What Is Vishing, and How Can You Protect Yourself Against It?
Editorial What Is Vishing, and How Can You Protect Yourself Against It?

Voice phishing—or vishing—is a fraudulent method in which some people contact you, claiming to represent the authorities (police, prosecutors) or employees of the IT team. Then, they request remote access to your computer under various pretexts, their real purpose being to access bank data and per

Top Eight Cybersecurity Trends to Prepare for in 2023
Editorial Top Eight Cybersecurity Trends to Prepare for in 2023

In 2023, cybersecurity is a critical area of focus for businesses and organizations as technology evolves and the threat of cyberattacks becomes more prevalent. Cybersecurity professionals are burdened with data breaches, ransomware attacks, phishing scams, and real-world threats from the

What Is OS Fingerprinting and How to Prevent This Threat
Editorial What Is OS Fingerprinting and How to Prevent This Threat

The growing number of Internet users brings with it a proportional increase in cyberattacks. And as the number of attacks increases, organizations and individuals alike should prepare and protect their vital information. Operating System (OS) Fingerprinting could pose a major threat and have

5 Strategies for Balancing Security, Acquisition, and Support Costs Without Sacrificing CX
Editorial 5 Strategies for Balancing Security, Acquisition, and Support Costs Without Sacrificing CX

Since its inception, the global pandemic has continued to have a long-lasting impact on how we buy, work, and also how our businesses operate.  As such, user behaviour has naturally evolved, leading to developments in customer experience (CX) to meet the changing needs and expectations brought

The Secure USB Stick—The Little Wizard of Strong Security Practices
Editorial The Secure USB Stick—The Little Wizard of Strong Security Practices

Nowadays, implementing strong security practices is more important than ever because offices are no longer stable physical locations, while the diversity of access points in organizations’ ecosystems are constantly growing. Managers are facing these challenges for the first time, and they are l

What you need to know about data privacy & 5 steps to ensure your organization stays compliant
Editorial What you need to know about data privacy & 5 steps to ensure your organization stays compliant

Data Privacy is an area of data protection that deals with the proper handling of information, focusing on compliance with data protection regulations. How data should be collected, stored, managed, and shared with any third parties—are the main concerns of data privacy. These concerns encompass t

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later