Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
ZuRu Malware Targets macOS Users with Trojanized Termius App
Endpoint & Device Security ZuRu Malware Targets macOS Users with Trojanized Termius App

Could your trusted apps be silently compromising your system security? Trusted applications, like the widely-used Termius app for managing SSH clients and servers, are an essential component of daily digital interactions. However, the recent discovery of a trojanized version exploits this trust,

Critical Bluetooth Vulnerabilities Threaten Popular Headphones
Security Operations & Management Critical Bluetooth Vulnerabilities Threaten Popular Headphones

Bluetooth technology, essential in many audio devices like headphones and earbuds, faces significant security challenges that jeopardize user privacy and safety. A comprehensive investigation by ERNW, a leading cybersecurity firm, unveiled critical vulnerabilities in the Bluetooth system-on-a-chip

Automate Security Ticketing and Triage With Tines Workflow
Endpoint & Device Security Automate Security Ticketing and Triage With Tines Workflow

The typical day of a cybersecurity team involves a relentless barrage of alerts that demand immediate attention and action. These alerts often lead to tedious processes of manual documentation and communication, hindering the team's ability to focus on more critical threats. This mental and

Cloudflare Outage Spurs Shift to In-House Storage Solutions
Data Protection & Privacy Cloudflare Outage Spurs Shift to In-House Storage Solutions

Are cloud services as reliable as we believe them to be? Millions of businesses and consumers were recently jolted into grappling with this question as Cloudflare experienced a significant service outage. Quickly branded a "system shock," this event underscored the critical nature of infrastructure

US Visa Policy: Public Social Media for Student Vetting
Security Operations & Management US Visa Policy: Public Social Media for Student Vetting

The realm of U.S. visa policy, especially concerning international students, has undergone a significant shift with the U.S. State Department mandating public disclosure of social media profiles. This substantial change originates from the desire for enhanced national security, a concern that

Can AI and Cost-Cutting Redefine BT's Workforce Strategy?
Infrastructure & Network Security Can AI and Cost-Cutting Redefine BT's Workforce Strategy?

In the ever-evolving landscape of telecommunications, the integration of artificial intelligence (AI) presents both challenges and opportunities. Rupert Marais, an in-house security specialist with expertise in endpoint and device security, cybersecurity strategies, and network management, offers

Can Opsec Failures Doom Elite Cybercriminals?
Security Operations & Management Can Opsec Failures Doom Elite Cybercriminals?

In the dynamic and often murky world of cybersecurity, mistakes in operational security (opsec) can be career-ending, and for cybercriminals, life-altering. Rupert Marais, our resident security specialist with deep expertise in endpoint and device security, shares insights into the common pitfalls

GodFather Trojan Elevates Mobile Banking Cybersecurity Threat
Infrastructure & Network Security GodFather Trojan Elevates Mobile Banking Cybersecurity Threat

In the realm of mobile banking cybersecurity, the rapidly evolving landscape has just encountered a formidable adversary known as the GodFather Trojan. This advanced Android banking malware has quickly distinguished itself through its sophisticated use of on-device virtualization techniques,

Identity Misconfigurations: A New Cybersecurity Threat
Identity & Access Management Identity Misconfigurations: A New Cybersecurity Threat

In an era where cyber defenses are increasingly fortified with cutting-edge technology, are today's organizations overlooking a glaring vulnerability right beneath their noses? While much focus remains on thwarting malware and hacking attempts, a newfound threat—identity misconfigurations—is

Did Cyber Leaks of Officials Endanger Spain's National Security?
Malware & Threats Did Cyber Leaks of Officials Endanger Spain's National Security?

The digital landscape has become a battleground where national security faces unprecedented threats, as evidenced by recent cyber breaches involving high-profile figures in Spain. Allegations surrounding these leaks reveal a troubling intersection of technology and politics, as sensitive data from

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later