Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
How Can Enterprises Master Modern AI Governance?

Data Security

How Can Enterprises Master Modern AI Governance?

The modern security leader finds themselves in an uncomfortable spotlight where boardrooms grant unprecedented funding for artificial intelligence protection while offering no standardized technical roadmap for its actual implementation. Executives are currently demanding the rapid integration of large language models to catalyze corporate

How Did UNC4899 Breach Cloud Security via AirDrop?

Data Security

How Did UNC4899 Breach Cloud Security via AirDrop?

The Convergence of Social Engineering and Modern Cloud Exploitation The cyberattack orchestrated by UNC4899, a North Korean state-sponsored threat actor, represents a sophisticated evolution in digital warfare that transcends traditional network boundaries. Also known by aliases such as Jade Sleet or TraderTraitor, this group moved beyond

The Evolution of Security Validation into Agentic Ecosystems

Data Security

The Evolution of Security Validation into Agentic Ecosystems

Vernon Yai is a preeminent figure in the landscape of cybersecurity validation, specifically focusing on how organizations navigate the treacherous waters of exposure management and data governance. With years of experience as a thought leader, he has dedicated his career to dismantling the siloed architectures that often leave enterprises

Is Slopoly the Start of a New AI-Driven Cyber Threat Era?

Data Security

Is Slopoly the Start of a New AI-Driven Cyber Threat Era?

The discovery of a primitive and clunky backdoor inside a compromised server recently shattered the long-standing belief that sophisticated cyberattacks require months of elite human coding expertise. When investigators unraveled the details of a recent ransomware attack, they did not find the fingerprints of a master developer, but rather a basic

Microsoft Plans New Windows Architecture to Prevent Crashes

Data Security

Microsoft Plans New Windows Architecture to Prevent Crashes

The digital foundation of modern commerce nearly buckled when a single line of faulty code in a privileged security update managed to paralyze millions of computers simultaneously, proving that the greatest threat to uptime might not be an external hacker, but the very tools designed to protect us. This systemic vulnerability has forced a complete

Bold Security Raises $40 Million to Launch Edge AI Platform

Data Security

Bold Security Raises $40 Million to Launch Edge AI Platform

The traditional boundaries of corporate networks have dissolved as organizations increasingly integrate generative AI and decentralized workflows into their daily operations, creating a desperate need for a new security architecture. Bold Security has officially emerged from stealth mode, announcing a cumulative $40 million in funding designed to

1 2 3 4 64
1 2 64

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later