Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Software Supply Chain Security – Review
Data Protection & Privacy Software Supply Chain Security – Review

The discovery of a critical zero-day vulnerability sends shockwaves through an organization, but the real crisis often begins when the patchwork of security vendors that are supposed to provide protection falls silent or offers conflicting guidance. Software Supply Chain Security represents a

Is a Critical LangChain Flaw Exposing Your Secrets?
Malware & Threats Is a Critical LangChain Flaw Exposing Your Secrets?

Today we’re sitting down with Rupert Marais, our in-house security specialist, to dissect a critical vulnerability that’s sending ripples through the AI development community. Known as LangGrinch, this flaw in the popular LangChain framework highlights the dangerous intersection where large

How Did a Chatbot Flaw Spark a Blackmail Accusation?
Infrastructure & Network Security How Did a Chatbot Flaw Spark a Blackmail Accusation?

From Responsible Disclosure to a Damaging Accusation The swift integration of artificial intelligence into customer service has opened a Pandora's box of cybersecurity challenges, as one high-speed rail operator recently discovered in a very public and contentious fashion. The rapid adoption of

University of Phoenix Data Breach Affects 3.5 Million
Data Protection & Privacy University of Phoenix Data Breach Affects 3.5 Million

The trust placed in educational institutions extends far beyond the classroom, encompassing the sacred digital vaults where the personal and financial futures of millions are stored and managed. For nearly 3.5 million individuals associated with the University of Phoenix, that trust was shattered

A Simple Guide to Website Cookie Controls
Identity & Access Management A Simple Guide to Website Cookie Controls

That seemingly harmless 'Accept All' button on cookie banners represents a significant digital crossroads, where a single click determines the level of privacy a user maintains across the internet. While it offers the quickest path back to the content, understanding the controls behind that banner

What Happens When Cybersecurity Becomes Personal?
Malware & Threats What Happens When Cybersecurity Becomes Personal?

The silent creep of a digital shadow into the physical world has fundamentally transformed the abstract concept of cybersecurity into a tangible and deeply personal reality for countless individuals. Discussions once confined to corporate boardrooms about data breaches and network integrity now

ATM Jackpotting Malware – Review
Endpoint & Device Security ATM Jackpotting Malware – Review

The familiar hum of an ATM dispensing cash has been subverted by a new breed of silent, digital heist that requires no stolen card, only malicious code specifically designed to hijack the machine’s core functions. ATM jackpotting malware represents a significant evolution in financial cybercrime,

Cisco Battles Zero-Day Exploit and Brute-Force Attacks
Endpoint & Device Security Cisco Battles Zero-Day Exploit and Brute-Force Attacks

Today we’re joined by Rupert Marais, our in-house security specialist whose expertise in endpoint security and network management gives him a unique perspective on the evolving threat landscape. We'll be diving into two recent, yet starkly different, campaigns that targeted Cisco network

Rockrose Breach Leaks Sensitive Data of 47,000
Data Protection & Privacy Rockrose Breach Leaks Sensitive Data of 47,000

A Digital Cracks in the Foundation of a Real Estate Giant The digital keys to thousands of private lives were silently stolen from one of New York City’s most prominent real estate firms, leaving a trail of questions about industry-wide security. Rockrose Development Corp., a major player in the

Hackers Actively Exploit Critical Fortinet Flaws
Identity & Access Management Hackers Actively Exploit Critical Fortinet Flaws

With threat actors actively exploiting two critical Fortinet flaws just days after their disclosure, the race between patching and exploitation is on. We're joined by Rupert Marais, our in-house security specialist with deep expertise in endpoint and device security, to break down the technical

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later