Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Trend Analysis: Online Scams Targeting Children
Identity & Access Management Trend Analysis: Online Scams Targeting Children

In a distressing incident that unfolded recently, a 10-year-old gamer lost access to their online account after falling for a promise of free in-game currency through a suspicious link shared in a chat forum, leaving their family to grapple with not only financial loss but also the emotional

How Does Sturnus Trojan Hijack Android Devices Silently?
Endpoint & Device Security How Does Sturnus Trojan Hijack Android Devices Silently?

In an era where smartphones are integral to daily life, a new and insidious threat has emerged from the shadows of cyberspace, targeting Android users with alarming precision and stealth. Dubbed Sturnus, this banking trojan has caught the attention of cybersecurity experts due to its sophisticated

Zero Trust, Real Results: Securing the Distributed Enterprise
Editorial Zero Trust, Real Results: Securing the Distributed Enterprise

In 2025, over 78% of organizations reported at least one security breach directly tied to remote work. A significant portion of the global workforce operates from home offices, coffee shops, and airports, which means protective measures need to be more adaptable. For decades, securing your business

Was Cloudflare's Outage a DDoS Attack or Misconfiguration?
Infrastructure & Network Security Was Cloudflare's Outage a DDoS Attack or Misconfiguration?

In an era where digital connectivity underpins nearly every aspect of daily life, the sudden disruption of a major internet infrastructure provider can send shockwaves across the globe, affecting millions of users and businesses. On November 18, a significant outage at Cloudflare, a cornerstone of

Zero-Day Attack Vulnerabilities – Review
Security Operations & Management Zero-Day Attack Vulnerabilities – Review

In an era where digital infrastructure underpins nearly every facet of modern life, the specter of zero-day attacks looms larger than ever, striking at the heart of organizational security with devastating precision. These exploits, targeting software flaws unknown to vendors or users at the time

Half of Ransomware Attacks Exploit Hijacked VPN Credentials
Identity & Access Management Half of Ransomware Attacks Exploit Hijacked VPN Credentials

Exposing a Critical Cyber Threat in Today's Market In an era where digital transformation drives business operations, a staggering statistic emerges from the cybersecurity landscape: nearly half of all ransomware attacks in the third quarter of this year exploited hijacked VPN credentials, pointing

Eternidade Stealer Fuels Cybercrime Surge in Brazil
Infrastructure & Network Security Eternidade Stealer Fuels Cybercrime Surge in Brazil

In a troubling development for digital security, a new banking Trojan known as Eternidade Stealer has emerged as a significant driver of cybercrime in Brazil, targeting financial data with alarming precision and exploiting popular communication platforms for infiltration and spread. This malware

5 Key Reasons LinkedIn Is a Top Target for Phishing Attacks
Infrastructure & Network Security 5 Key Reasons LinkedIn Is a Top Target for Phishing Attacks

In a world where professional networking happens with just a single click, LinkedIn has become the cornerstone of career growth and corporate connections for millions of users across the globe, but beneath this polished platform lies a darker reality. A staggering rise in phishing attacks targeting

Navigating the App Integration Chasm in Identity Governance
Identity & Access Management Navigating the App Integration Chasm in Identity Governance

In today's hyper-connected enterprise environment, a staggering reality looms over security teams: the average organization juggles around 1,100 applications, a number that often climbs higher with undetected tools lurking in the shadows, creating a critical challenge for identity governance. This

Best Practices for Enhancing Hospital Security Systems
Infrastructure & Network Security Best Practices for Enhancing Hospital Security Systems

Hospitals stand as critical pillars of community health, offering solace and healing in times of need, yet they grapple with profound security challenges that jeopardize the well-being of patients, staff, and visitors alike, with threats ranging from violent confrontations to unauthorized

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later