Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Is Your System Safe from the Commvault Web Server Flaw?
Infrastructure & Network Security Is Your System Safe from the Commvault Web Server Flaw?

Commvault, a name synonymous with reliable data protection, has been thrust into the spotlight due to a recent and critical security vulnerability in its web server. This flaw, officially tagged as CVE-2025-3928, opens the door for remote, authenticated attackers to infiltrate systems with ease.

How Are Cyber Threats Shaping Our Digital Future?
Malware & Threats How Are Cyber Threats Shaping Our Digital Future?

As businesses and individuals become increasingly intertwined with technology, the digital landscape evolves rapidly, bringing an array of sophisticated cyber threats. With recent incidents highlighting vulnerabilities in prominent sectors, understanding these threats is more crucial than ever.

Is Avocado OS the Future of Embedded Linux Development?
Infrastructure & Network Security Is Avocado OS the Future of Embedded Linux Development?

The introduction of Avocado OS marks a pivotal moment in embedded Linux development, presenting a solution designed to harmonize the needs of developer-friendly environments with the rigorous demands of production systems. Traditionally, developers have been torn between systems that offer rapid

Can We Balance Innovation and Security in the AI Race?
Security Operations & Management Can We Balance Innovation and Security in the AI Race?

The global race for Artificial Intelligence (AI) supremacy is intensifying as organizations, governments, and suppliers strive to harness the benefits of AI technology, pushing boundaries in a bid to gain competitive advantages. This pursuit doesn't only play out in the business arena but also

Advanced Phishing Scheme Exploits Google Tools for Attacks
Infrastructure & Network Security Advanced Phishing Scheme Exploits Google Tools for Attacks

Rupert Marais, our in-house Security specialist, dives deep into the intricacies of the recent phishing attack that exploited both Google Sites and DKIM replay tactics. This attack is notable not only for its sophistication but also for the clever manipulation of Google's infrastructure to send

GitLab Releases Critical Security Patches for Major Vulnerabilities
Infrastructure & Network Security GitLab Releases Critical Security Patches for Major Vulnerabilities

The digital landscape has become increasingly perilous as cyber threats evolve in complexity and frequency, necessitating robust security measures from technology companies. GitLab has proactively addressed this challenge by releasing a series of critical security patches for its Community Edition

How Safe is Your Cloud? Unpacking Google's Composer Vulnerability
Infrastructure & Network Security How Safe is Your Cloud? Unpacking Google's Composer Vulnerability

In an era where cloud computing has become integral to countless organizations worldwide, the pressing question of security remains at the forefront. Google recently addressed a significant security vulnerability within its Cloud Composer 2 software, an orchestration service based on Apache Airflow

Cyber Security Market to Hit $500.70 Billion by 2030, Driven by AI and IoT
Infrastructure & Network Security Cyber Security Market to Hit $500.70 Billion by 2030, Driven by AI and IoT

The global cyber security market is set for impressive growth, projected to reach USD 500.70 billion by 2030. A comprehensive analysis unveils that the market is expected to expand at a compound annual growth rate (CAGR) of 12.9% from the current year to 2030. This significant growth is fueled by

Building a Secure Cloud Environment: Strategies and Best Practices
Infrastructure & Network Security Building a Secure Cloud Environment: Strategies and Best Practices

With the increasing reliance on cloud technologies for business operations, ensuring the security of cloud environments has become a critical priority for enterprises. The public cloud, regarded as essential by the majority of businesses, needs robust security measures integrated from the outset.

How is Microsoft Ensuring a Secure Future After Major Breaches?
Infrastructure & Network Security How is Microsoft Ensuring a Secure Future After Major Breaches?

In response to several high-profile cyberattacks, Microsoft has launched an extensive cybersecurity initiative designed to strengthen its internal security practices and protect its users. These breaches, linked to nation-state actors, prompted the tech giant to reevaluate its approach to security,

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later