Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Digital Twin Technology Moved Beyond Manufacturing and into the Merging Worlds of the Internet of Things
Editorial Digital Twin Technology Moved Beyond Manufacturing and into the Merging Worlds of the Internet of Things

With the advent of the Internet of Things (IoT), sensors, edge-computing, AR/VR, and wireless technologies, the Digital Twin is becoming an extremely valuable and cost-effective tool in many industries, one that’s not only financially viable, but also useful for data collection and analysis.

Top 6 Enterprise Networking Trends for the Upcoming Year
Editorial Top 6 Enterprise Networking Trends for the Upcoming Year

You’ve probably seen the trends for networking this year. But what about next year? In 2021, organizations across the globe will take a closer look at their networking plans, while employees will continue to rely on mobile access. Moreover, the reality of a mobile-first workplace with real-time

Overcoming COVID-19’s Impact on Wi-Fi Infrastructure
Editorial Overcoming COVID-19’s Impact on Wi-Fi Infrastructure

The COVID-19 pandemic has changed considerably the way we live and work, pushing more and more people toward remote working as the safest bet for staying employed. This, in turn, has demonstrated the fact that we rely on Wi-Fi networks for both work and play. Demand for good Wi-Fi connections is

The Security Implications of Network Slicing
Editorial The Security Implications of Network Slicing

Industry players have witnessed radical moves in 5G deployments lately. A network slice—or, in the experts’ words , an independent end-to-end logical network that runs on a shared physical infrastructure—is one of the prominent capabilities that appear to ensure the effective deployment of 5G

A Quick Guide to SASE
Editorial A Quick Guide to SASE

We live in a world of risk, uncertainty, and security unrest. From time to time, you hear on the news that another big company has fallen prey to cyberattackers and lost thousands of dollars to ransomware. This is not all: vulnerability has increased with the coming of the worldwide pandemic. The

4 Cybersecurity Threats That Will Dominate 2020—And How to Protect Yourself from Them
Editorial 4 Cybersecurity Threats That Will Dominate 2020—And How to Protect Yourself from Them

The new decade is upon us, and there are many trends and advancements to look forward to, particularly in the cyber world. However, as it is the case with nearly any innovation, there won’t be only positive outcomes—there will also be negative ones to expect. In this article, we will explore the

5 File-Sharing Services for Your Business
Editorial 5 File-Sharing Services for Your Business

The way we work has changed. As of 2019, the number of companies allowing remote work has increased up to 66%, with 16% of them being fully remote—according to recent research . Because this is a growing trend, one that can yield multiple benefits for companies around the world, business file

Why Is Mobile Threat Defense a Necessity for Enterprises?
Editorial Why Is Mobile Threat Defense a Necessity for Enterprises?

Mobile Threat Defense (MTD), Mobile Threat Management (MTM), Mobile Threat Prevention (MTP)—regardless of the exact terminology, these all lead to the same concern: securing mobile devices. The highly digital world we live in has fundamentally changed the way we work. Mobile devices are now at the

5 Technologies That Will Change Networking in 2019 According to Cisco
Editorial 5 Technologies That Will Change Networking in 2019 According to Cisco

When it comes to networking, 2019 sounds promising. Several emerging technologies are expected to change how businesses and their employees connect. In a recent blog post from Cisco , Anand Oswal, the Senior VP of Cisco Enterprise Network Engineering, claims that: “Network operators will be

Proper portable storage devices make your business GDPR compliant
Editorial Proper portable storage devices make your business GDPR compliant

Apart from the constant need to improve their security policies, companies now face a new hurdle: GDPR compliant storage devices. As the new General Data Protection Regulation (GDPR) established that USB sticks with sensitive data are a business risk, new rules came into play forcing companies to

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later