Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Hackers Actively Exploit Critical Fortinet Flaws
Identity & Access Management Hackers Actively Exploit Critical Fortinet Flaws

With threat actors actively exploiting two critical Fortinet flaws just days after their disclosure, the race between patching and exploitation is on. We're joined by Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, to break down the technical

Is Microsoft OAuth the New Phishing Backdoor?
Identity & Access Management Is Microsoft OAuth the New Phishing Backdoor?

The familiar blue and white of a Microsoft login page has become a universal symbol of digital security, yet it is now the very camouflage used by cybercriminals to bypass an organization's most robust defenses. A sophisticated new wave of phishing attacks is turning this trusted interface into a

Google Retires Its Dark Web Monitoring Tool
Data Protection & Privacy Google Retires Its Dark Web Monitoring Tool

A digital security tool designed to be a user's vigilant sentinel against the internet's darkest corners is being retired almost as quickly as it arrived, prompting questions about the evolving landscape of online protection. Google has announced it will discontinue its dark web report feature in

Google Unveils Layered Security for AI Agents in Chrome
Endpoint & Device Security Google Unveils Layered Security for AI Agents in Chrome

An artificial intelligence agent diligently booking a vacation could, with a single malicious instruction hidden on an obscure webpage, pivot to silently draining a bank account, a chilling scenario that has rapidly moved from the realm of science fiction to a pressing reality for technology

Askul Ransomware Attack Exposes 700,000 Records
Data Protection & Privacy Askul Ransomware Attack Exposes 700,000 Records

The simple act of placing an online order unlocked a cascade of digital chaos when a meticulously planned ransomware attack crippled one of Japan's largest e-commerce and logistics firms, revealing the fragile underbelly of modern commerce. What began as a security alert quickly spiraled into a

Trend Analysis: Critical Infrastructure Attacks
Data Protection & Privacy Trend Analysis: Critical Infrastructure Attacks

The invisible lines between digital warfare and physical consequence are rapidly dissolving as pro-Russia hacktivist groups increasingly target the very systems that sustain modern life. This analysis dissects the alarming trend of attacks on Operational Technology (OT), exploring the tactics, key

Apple Patches Zero-Days Exploited in Targeted Attacks
Malware & Threats Apple Patches Zero-Days Exploited in Targeted Attacks

The digital security that millions of users implicitly trust on their Apple devices was quietly and effectively compromised for an unknown number of individuals long before a public fix was ever announced. In a recent, urgent move, Apple deployed critical security updates across its ecosystem,

US Puts Trade Deals Ahead of Cybersecurity
Malware & Threats US Puts Trade Deals Ahead of Cybersecurity

In an era where digital threats can cripple national infrastructure faster than any physical weapon, recent U.S. policy decisions suggest a perplexing willingness to trade long-term digital security for immediate diplomatic and economic advantages. This dynamic raises a critical question about the

Analysts Warn Humanoid Robots Are Unsecured by Design
Endpoint & Device Security Analysts Warn Humanoid Robots Are Unsecured by Design

As the world stands on the cusp of an automated revolution, with advanced humanoid robots poised to integrate into factories, homes, and public spaces, a stark warning from cybersecurity analysts casts a long shadow over this promising future. Beneath the polished chrome and sophisticated

Mandated Cybersecurity vs. Voluntary Measures: A Comparative Analysis
Data Protection & Privacy Mandated Cybersecurity vs. Voluntary Measures: A Comparative Analysis

Introduction: The Battleground for Telecom Cybersecurity In the shadows of a sprawling cyber-espionage campaign that compromised the nation's most sensitive communications, a fierce debate rages over the best method to defend America's digital borders. At the heart of this conflict lies a

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later