Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Are You Falling for Ticket Scams This Bank Holiday?
Identity & Access Management Are You Falling for Ticket Scams This Bank Holiday?

As music festivals and events surge during Bank Holidays, causing ticket demand to spike, there's an unprecedented rise in ticket scams that leave eager attendees empty-handed and frustrated. These holidays are coveted times for entertainment, and fraudsters exploit the fervor around sold-out gigs

Microsoft Debuts Windows Backup Tool to Ease Transition to Win 11
Data Protection & Privacy Microsoft Debuts Windows Backup Tool to Ease Transition to Win 11

In the rapidly evolving world of technology, staying ahead of cybersecurity challenges is crucial. Rupert Marais, a seasoned expert in endpoint and device security, sheds light on Microsoft's new initiative, Windows Backup for Organizations. This tool promises to streamline backups, ease

Meta Granted EU Approval for AI Data Collection Amid Concerns
Data Protection & Privacy Meta Granted EU Approval for AI Data Collection Amid Concerns

Meta, the parent company of Facebook, has recently gained approval from the Irish Data Protection Commission (DPC) to commence the collection of data from European users' public social media posts. This data will be utilized to train Meta's artificial intelligence systems. Initially met with

Can Communication Skills Elevate Engineering Careers?
Security Operations & Management Can Communication Skills Elevate Engineering Careers?

In today's increasingly interconnected world, engineering professionals face a paradox where technical prowess alone is no longer sufficient for career growth. Engineering careers are now intricately woven into a fabric where effective communication plays a pivotal role. Engineers who excel in

Are Russian Cyber Threats Escalating in Europe?
Infrastructure & Network Security Are Russian Cyber Threats Escalating in Europe?

Russian cyber activities are now casting a wide shadow of concern across Europe, drawing the attention of cybersecurity experts and policymakers alike. The sophistication and frequency of these cyberattacks have posed significant challenges to the digital infrastructure of various European nations.

Infostealers Compromise 30,000 Australian Banking Credentials
Identity & Access Management Infostealers Compromise 30,000 Australian Banking Credentials

In today's digital landscape, cybersecurity threats are evolving at an unprecedented pace. Rupert Marais, our in-house Security specialist, brings a wealth of expertise in endpoint and device security, cybersecurity strategies, and network management. In this interview, Rupert sheds light on the

Automated Password Management – A Review
Identity & Access Management Automated Password Management – A Review

In an era marked by increasing data breaches, the need for secure digital environments has become paramount. Recent advancements in cyber defenses have led to developments in automated password management, a key player in enhancing cybersecurity practices. This technology aims to simplify security

Can AI Replace Human Freelance Coders Soon?
Data Protection & Privacy Can AI Replace Human Freelance Coders Soon?

In today's rapidly evolving technological landscape, one of the most compelling questions is whether artificial intelligence can truly replace human freelance coders. A study conducted by researchers David Noever and Forrest McKee from PeopleTec examines this very issue, offering insights into the

Can AI-Driven Defenses Outsmart Polymorphic Phishing?
Endpoint & Device Security Can AI-Driven Defenses Outsmart Polymorphic Phishing?

The cybersecurity landscape is witnessing a dramatic transformation, driven by the escalating threat of AI-powered polymorphic phishing campaigns. A recent surge in phishing emails, with a 17% increase over the last six months, underscores the urgency for innovative defenses. The rise of

Voice Cloning Technology – A Review
Identity & Access Management Voice Cloning Technology – A Review

Imagine a world where the soothing or authoritative voice you hear on the other end of the line isn’t human but a digitally reconstructed clone of a real person. This scenario, once confined to speculative fiction, is now a critical aspect of today's reality thanks to voice cloning technology. The

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later