Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Will Orgs Ever Learn From Ivanti EPMM Attacks?
Endpoint & Device Security Will Orgs Ever Learn From Ivanti EPMM Attacks?

The very tools designed to secure the modern enterprise were systematically turned into weapons of mass compromise during the spring and summer of 2025, leaving a trail of breached networks and raising profound questions about the industry's approach to perimeter security. The widespread

Hacker Leaks 2.3 Million Wired Subscriber Records
Data Protection & Privacy Hacker Leaks 2.3 Million Wired Subscriber Records

In a stark demonstration of digital vulnerability that strikes at the heart of the tech media world, the very publication that reports on cybersecurity has become the subject of its own cautionary tale. A significant data breach at Wired magazine has resulted in the public exposure of 2.3 million

Is ServiceNow the Next Cybersecurity Giant?
Security Operations & Management Is ServiceNow the Next Cybersecurity Giant?

A Bold New Front in the Cyber Wars In the high-stakes world of enterprise technology, few moves are as declarative as a multi-billion-dollar acquisition. ServiceNow’s staggering $7.75 billion agreement to purchase Armis, a leader in asset visibility and security, is more than just a large

Software Supply Chain Security – Review
Data Protection & Privacy Software Supply Chain Security – Review

The discovery of a critical zero-day vulnerability sends shockwaves through an organization, but the real crisis often begins when the patchwork of security vendors that are supposed to provide protection falls silent or offers conflicting guidance. Software Supply Chain Security represents a

Is a Critical LangChain Flaw Exposing Your Secrets?
Malware & Threats Is a Critical LangChain Flaw Exposing Your Secrets?

Today we’re sitting down with Rupert Marais, our in-house security specialist, to dissect a critical vulnerability that’s sending ripples through the AI development community. Known as LangGrinch, this flaw in the popular LangChain framework highlights the dangerous intersection where large

How Did a Chatbot Flaw Spark a Blackmail Accusation?
Infrastructure & Network Security How Did a Chatbot Flaw Spark a Blackmail Accusation?

From Responsible Disclosure to a Damaging Accusation The swift integration of artificial intelligence into customer service has opened a Pandora's box of cybersecurity challenges, as one high-speed rail operator recently discovered in a very public and contentious fashion. The rapid adoption of

University of Phoenix Data Breach Affects 3.5 Million
Data Protection & Privacy University of Phoenix Data Breach Affects 3.5 Million

The trust placed in educational institutions extends far beyond the classroom, encompassing the sacred digital vaults where the personal and financial futures of millions are stored and managed. For nearly 3.5 million individuals associated with the University of Phoenix, that trust was shattered

A Simple Guide to Website Cookie Controls
Identity & Access Management A Simple Guide to Website Cookie Controls

That seemingly harmless 'Accept All' button on cookie banners represents a significant digital crossroads, where a single click determines the level of privacy a user maintains across the internet. While it offers the quickest path back to the content, understanding the controls behind that banner

What Happens When Cybersecurity Becomes Personal?
Malware & Threats What Happens When Cybersecurity Becomes Personal?

The silent creep of a digital shadow into the physical world has fundamentally transformed the abstract concept of cybersecurity into a tangible and deeply personal reality for countless individuals. Discussions once confined to corporate boardrooms about data breaches and network integrity now

ATM Jackpotting Malware – Review
Endpoint & Device Security ATM Jackpotting Malware – Review

The familiar hum of an ATM dispensing cash has been subverted by a new breed of silent, digital heist that requires no stolen card, only malicious code specifically designed to hijack the machine’s core functions. ATM jackpotting malware represents a significant evolution in financial cybercrime,

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later