Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
The Security Implications of Network Slicing
Editorial The Security Implications of Network Slicing

Industry players have witnessed radical moves in 5G deployments lately. A network slice—or, in the experts’ words , an independent end-to-end logical network that runs on a shared physical infrastructure—is one of the prominent capabilities that appear to ensure the effective deployment of 5G

A Quick Guide to SASE
Editorial A Quick Guide to SASE

We live in a world of risk, uncertainty, and security unrest. From time to time, you hear on the news that another big company has fallen prey to cyberattackers and lost thousands of dollars to ransomware. This is not all: vulnerability has increased with the coming of the worldwide pandemic. The

4 Cybersecurity Threats That Will Dominate 2020—And How to Protect Yourself from Them
Editorial 4 Cybersecurity Threats That Will Dominate 2020—And How to Protect Yourself from Them

The new decade is upon us, and there are many trends and advancements to look forward to, particularly in the cyber world. However, as it is the case with nearly any innovation, there won’t be only positive outcomes—there will also be negative ones to expect. In this article, we will explore the

5 File-Sharing Services for Your Business
Editorial 5 File-Sharing Services for Your Business

The way we work has changed. As of 2019, the number of companies allowing remote work has increased up to 66%, with 16% of them being fully remote—according to recent research . Because this is a growing trend, one that can yield multiple benefits for companies around the world, business file

Why Is Mobile Threat Defense a Necessity for Enterprises?
Editorial Why Is Mobile Threat Defense a Necessity for Enterprises?

Mobile Threat Defense (MTD), Mobile Threat Management (MTM), Mobile Threat Prevention (MTP)—regardless of the exact terminology, these all lead to the same concern: securing mobile devices. The highly digital world we live in has fundamentally changed the way we work. Mobile devices are now at the

5 Technologies That Will Change Networking in 2019 According to Cisco
Editorial 5 Technologies That Will Change Networking in 2019 According to Cisco

When it comes to networking, 2019 sounds promising. Several emerging technologies are expected to change how businesses and their employees connect. In a recent blog post from Cisco , Anand Oswal, the Senior VP of Cisco Enterprise Network Engineering, claims that: “Network operators will be

Proper portable storage devices make your business GDPR compliant
Editorial Proper portable storage devices make your business GDPR compliant

Apart from the constant need to improve their security policies, companies now face a new hurdle: GDPR compliant storage devices. As the new General Data Protection Regulation (GDPR) established that USB sticks with sensitive data are a business risk, new rules came into play forcing companies to

Network monitoring tools: take a walk down this lane for some of the best options
Editorial Network monitoring tools: take a walk down this lane for some of the best options

Any network, small or complex, needs a comprehensive network monitoring tools base that enables the network administrators to track network behavior and events, in order to intervene if necessary. The network monitoring tools come in software or software-hardware form The continuous network health

Perfecting SDR technology – how does it serve IoT?
Editorial Perfecting SDR technology – how does it serve IoT?

Software-defined radio (SDR technology) takes system elements that are typically hardware components and implements them by means of a dedicated software on a PC or embedded system. Classical exemplifying elements for SDR tech are mixers, filters, modulators or detectors. Both the transmitter and

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later