Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Smart Tech: Why Device Owners Must Take Security into Their Own Hands
Editorial Smart Tech: Why Device Owners Must Take Security into Their Own Hands

The growing array of devices that can be connected to the internet causes consumers to be increasingly susceptible to cybercrime. Every smart TV or networked lightbulb we set up in our home or office can become a silent soldier sent by hackers to the global battlefield of cyberwarfare. The global

Combatting the Growing Threat of Ransomware
Editorial Combatting the Growing Threat of Ransomware

Given the current cybersecurity environment and the increasing sophistication of ransomware, getting to threats before they can have a business impact is more important than ever. If you find yourself questioning whether to pay a ransom, you’ve already lost the battle. But you don’t have to lose the

AI in cyber-security – or is it its mature counterpart, AGI?
Editorial AI in cyber-security – or is it its mature counterpart, AGI?

Many cyber-security professionals are waiting for the next stage of Artificial Intelligence-based algorithms. Ready to fight with what we may call automated malicious attacks, AI is yet in its testing phase, showing up in demos and uncoordinated software. It’s like the peripheral nervous system, w

Adaptive security, the smart way to protect systems
Editorial Adaptive security, the smart way to protect systems

MarketsandMarkets, as quoted by Help Net Security , recently reported that the adaptive security market will gain considerable traction in the next five years. This success comes from the need to defend networks and IT systems against advanced threats. The expected growth in numbers would be from

Dyn DDoS attack – why we are not tired of finding out more
Editorial Dyn DDoS attack – why we are not tired of finding out more

Playing out the fears everybody has on IoT security, on Friday the 21st October 2016 the Dyn company received a wave of DDoS attacks. Dyn handles “ visibility and control into cloud and public Internet resources ”. Due to its internet infrastructure role and the importance of its active operations,

Next Generation Firewalls – a mandatory technology?
Editorial Next Generation Firewalls – a mandatory technology?

Next Generation Firewalls, abbreviated NGFW, enforce network cyber security by bringing a modern solution to current threats. The upgraded hardware/software based protection system acts in detecting and/or blocking sophisticated attacks by reuniting more types of key assets . In fact, this type of

Humans for cyber-security: are they a catastrophe or an asset?
Editorial Humans for cyber-security: are they a catastrophe or an asset?

Ignorance is bliss. As much as it may have banked the wisdom of ages, this saying does not apply in cyber-security. Having your employees blissfully unaware of the risks, vulnerabilities and dangers lurking behind their interactions with technology can prove extremely costly over time. Human

Hackers take on bug hunting and become tech heroes
Editorial Hackers take on bug hunting and become tech heroes

Although a lot of unflattering virtual ink has been consumed to characterize hackers and many alarming things have been said about their skills, it is however incontestable that these people are extremely gifted, IT-wise. Turning the hackers’ talent toward law-abiding activities can prove a very u

Will cognitive cyber-security one day protect your data?
Editorial Will cognitive cyber-security one day protect your data?

Cognitive computing simulates the human thought process in an artificial intelligence (cognitive) environment. Teaching a computer how to use the type of unstructured information usually employed by security analysts requires tools such as data mining, pattern recognition, human-computer

Hybrid cloud considerations: do you see enterprises being thrilled?
Editorial Hybrid cloud considerations: do you see enterprises being thrilled?

When two or more clouds (public, private) are bound together, although they remain distinct, a cloud service is called hybrid cloud . The connection between the two or more distinct clouds can concern the location, the dedicated resources or simply the cloud services, allowing aggregation,

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later