Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
Critical Zero-Day Flaw Exposed in Elastic EDR Software

Data Security

Critical Zero-Day Flaw Exposed in Elastic EDR Software

In a startling revelation that has sent shockwaves through the cybersecurity community, a critical zero-day vulnerability has been uncovered in Elastic’s Endpoint Detection and Response (EDR) software, transforming a tool designed to protect enterprise systems into a potential gateway for devastating attacks. Discovered by a reputable

GoTo Integrates LogMeIn Resolve with SentinelOne for EDR

Data Security

GoTo Integrates LogMeIn Resolve with SentinelOne for EDR

In an era where cyber threats are becoming increasingly sophisticated and the financial impact of data breaches has soared to an average global cost of $4.9 million, the need for robust endpoint security has never been more urgent. Managed Service Providers (MSPs) and IT departments face mounting pressure to safeguard their infrastructures against

Are AI Chips From NVIDIA and AMD a Security Risk for China?

Data Security

Are AI Chips From NVIDIA and AMD a Security Risk for China?

In an era where artificial intelligence shapes the future of global power dynamics, the security of AI chips has emerged as a critical flashpoint in the intensifying rivalry between the United States and China, with far-reaching implications. These high-performance processors, produced by industry giants NVIDIA and AMD, are not merely

ShinyHunters and Scattered Spider Join Forces in Extortion

Data Security

ShinyHunters and Scattered Spider Join Forces in Extortion

Unveiling the Cybercrime Alliance Imagine a digital heist where two masterminds of cybercrime pool their skills to orchestrate attacks that are nearly impossible to predict or prevent, creating a terrifying new reality in the world of cybersecurity. This is the alarming situation unfolding as ShinyHunters and Scattered Spider, two infamous threat

Are Hidden Risks Undermining Passwordless Recovery?

Data Security

Are Hidden Risks Undermining Passwordless Recovery?

What happens when the cutting-edge security systems designed to protect digital identities become the very gateway for attackers? In a world rapidly embracing passwordless authentication, a startling vulnerability lurks in the shadows of account recovery processes, threatening billions of users who rely on biometrics, passkeys, and tokens for

SoupDealer Malware Evades Defenses with Advanced Tactics

Data Security

SoupDealer Malware Evades Defenses with Advanced Tactics

In the ever-evolving landscape of cybersecurity threats, a new and formidable adversary has emerged, striking at the heart of digital defenses with unparalleled sophistication, known as SoupDealer. This malware has demonstrated an uncanny ability to slip past nearly all public sandboxes, antivirus solutions, and even advanced endpoint detection

1 2 3 4 33
1 2 33

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later