Kendra Haines

Kendra Haines

Network Security Specialist
Kendra Haines is an IT expert specializing in IT infrastructure, development, and security. She shares her perspectives on numerous topics, such as vulnerabilities, configurations of cloud technologies, and benefits of hyper-converged infrastructure. Kendra focuses on simplifying complex topics, making her content accessible to buyers and decision makers.
Are You Defending Against Threats or Just Exposures?
Security Operations & Management Are You Defending Against Threats or Just Exposures?

In the rapidly evolving landscape of cybersecurity, the old rulebook is being thrown out. For years, we’ve been taught that managing vulnerabilities is the key to security, but a widening chasm has opened between this theory and the reality of how attackers operate. To bridge this gap, we sat down

Why Promise AI When the Website Is Broken?
Infrastructure & Network Security Why Promise AI When the Website Is Broken?

Introduction The rollout of a multi-million-pound digital platform designed to serve nearly two million pension members collapsed into a stark paradox of futuristic ambition clashing with present-day failure. When a service provider launches a critical public portal that is fundamentally broken,

US Cyber Warfare Blinded Venezuela's Air Defenses
Infrastructure & Network Security US Cyber Warfare Blinded Venezuela's Air Defenses

A recent U.S. military operation in Venezuela has starkly illuminated the modern battlefield's new reality, demonstrating conclusively that the most formidable military hardware can be rendered inert without the resilient digital backbone required to operate it. This decisive engagement, which

Trend Analysis: Weaponized Cloud Automation
Infrastructure & Network Security Trend Analysis: Weaponized Cloud Automation

The very tools designed to streamline business operations and enhance productivity are now being systematically turned against organizations by threat actors with unprecedented precision. In an era where cloud automation drives business efficiency, malicious actors have turned this powerful tool

Will Orgs Ever Learn From Ivanti EPMM Attacks?
Endpoint & Device Security Will Orgs Ever Learn From Ivanti EPMM Attacks?

The very tools designed to secure the modern enterprise were systematically turned into weapons of mass compromise during the spring and summer of 2025, leaving a trail of breached networks and raising profound questions about the industry's approach to perimeter security. The widespread

Hacker Leaks 2.3 Million Wired Subscriber Records
Data Protection & Privacy Hacker Leaks 2.3 Million Wired Subscriber Records

In a stark demonstration of digital vulnerability that strikes at the heart of the tech media world, the very publication that reports on cybersecurity has become the subject of its own cautionary tale. A significant data breach at Wired magazine has resulted in the public exposure of 2.3 million

Is ServiceNow the Next Cybersecurity Giant?
Security Operations & Management Is ServiceNow the Next Cybersecurity Giant?

A Bold New Front in the Cyber Wars In the high-stakes world of enterprise technology, few moves are as declarative as a multi-billion-dollar acquisition. ServiceNow’s staggering $7.75 billion agreement to purchase Armis, a leader in asset visibility and security, is more than just a large

Software Supply Chain Security – Review
Data Protection & Privacy Software Supply Chain Security – Review

The discovery of a critical zero-day vulnerability sends shockwaves through an organization, but the real crisis often begins when the patchwork of security vendors that are supposed to provide protection falls silent or offers conflicting guidance. Software Supply Chain Security represents a

Is a Critical LangChain Flaw Exposing Your Secrets?
Malware & Threats Is a Critical LangChain Flaw Exposing Your Secrets?

Today we’re sitting down with Rupert Marais, our in-house security specialist, to dissect a critical vulnerability that’s sending ripples through the AI development community. Known as LangGrinch, this flaw in the popular LangChain framework highlights the dangerous intersection where large

How Did a Chatbot Flaw Spark a Blackmail Accusation?
Infrastructure & Network Security How Did a Chatbot Flaw Spark a Blackmail Accusation?

From Responsible Disclosure to a Damaging Accusation The swift integration of artificial intelligence into customer service has opened a Pandora's box of cybersecurity challenges, as one high-speed rail operator recently discovered in a very public and contentious fashion. The rapid adoption of

Loading
Latest Articles

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later