Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Chinese Hackers Impersonate US Lawmaker in Cyberattack
Malware & Threats Chinese Hackers Impersonate US Lawmaker in Cyberattack

In a startling revelation that underscores the escalating dangers of cyber warfare, a sophisticated cyberespionage campaign allegedly orchestrated by China-backed hackers has come to light, targeting none other than a prominent US lawmaker. This audacious attack involved impersonating

How Can Poor Token Management Lead to Cybersecurity Breaches?
Identity & Access Management How Can Poor Token Management Lead to Cybersecurity Breaches?

What happens when the invisible keys to a digital kingdom fall into the wrong hands? Tokens, those small but mighty components of authentication, quietly power access to everything from personal apps to sprawling enterprise systems, and when mismanaged, they can unlock chaos, paving the way for

Hardware Wallet Security – Review
Identity & Access Management Hardware Wallet Security – Review

In an era where digital wealth is increasingly stored in cryptocurrencies like Bitcoin and Ethereum, the staggering scale of cyber theft—amounting to billions in losses annually—underscores a pressing challenge for investors worldwide. Imagine waking up to find your entire crypto portfolio vanished

Is the Browser the New Cybersecurity Endpoint?
Endpoint & Device Security Is the Browser the New Cybersecurity Endpoint?

In today’s rapidly evolving digital landscape, web browsers have become a central battleground for cybersecurity threats. I’m thrilled to sit down with Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, cybersecurity strategies, and network

Is Microsoft’s Cybersecurity Negligence a National Threat?
Data Protection & Privacy Is Microsoft’s Cybersecurity Negligence a National Threat?

Imagine a hospital system grinding to a halt, with patient data of over 5 million individuals exposed due to a single click on a malicious link, a stark reality faced by a major healthcare provider in a recent ransomware attack tied to vulnerabilities in widely used software. Such incidents have

CTEM: What It Means & How to Implement It
Editorial CTEM: What It Means & How to Implement It

Quarterly vulnerability scans no longer reflect the reality of enterprise risk. They measure activity, not actual reduction of exposure. That’s why continuous threat exposure management (CTEM) is gaining traction: It reframes security programs around what matters most to executives—measurable

Red Hat Back-Office Staff to Transition to IBM in 2026
Security Operations & Management Red Hat Back-Office Staff to Transition to IBM in 2026

What happens when a titan of open-source innovation begins to blend more deeply with a corporate giant? Red Hat, a company celebrated for its pioneering spirit in software solutions, stands at a crossroads as its back-office staff prepare for a significant shift to IBM in 2026, raising questions

SAP S/4HANA Vulnerability – Review
Infrastructure & Network Security SAP S/4HANA Vulnerability – Review

Imagine a scenario where a single flaw in a cornerstone enterprise system could bring global operations to a standstill, exposing sensitive data and critical processes to malicious actors. This is not a hypothetical situation but a pressing reality for organizations relying on SAP S/4HANA, a

Critical SAP S/4HANA Flaw CVE-2025-42957 Under Attack
Endpoint & Device Security Critical SAP S/4HANA Flaw CVE-2025-42957 Under Attack

Overview of a Growing Threat in Enterprise Systems Imagine a scenario where a single flaw in a cornerstone business software could bring an entire organization to its knees, exposing sensitive data and disrupting critical operations. This is the reality facing companies using SAP S/4HANA, a leading

Paragon Spyware Technology – Review
Identity & Access Management Paragon Spyware Technology – Review

Imagine a world where a single click—or no click at all—can compromise the most personal data on a device, exposing private communications to unseen eyes, and this is the chilling reality crafted by Paragon Solutions, an Israeli-founded spyware company that has emerged as a formidable player in the

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later