Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
CSA Launches SaaS Security Framework to Simplify Protection

Data Security

CSA Launches SaaS Security Framework to Simplify Protection

Addressing the Rising Threat in SaaS Environments Imagine a multinational corporation managing dozens of Software as a Service (SaaS) applications, each hosting sensitive data and critical operations, only to discover a major breach due to a simple misconfiguration in one platform. This scenario is far from hypothetical, as studies reveal that

How Will Bitcoin Defend Against Quantum Cyber Threats?

Data Security

How Will Bitcoin Defend Against Quantum Cyber Threats?

Bitcoin stands as a cornerstone of digital finance, a decentralized currency that has reshaped how value is stored and transferred across the globe, but an emerging technological force—quantum computing—casts a shadow over its seemingly impregnable security. With the potential to shatter the cryptographic algorithms that protect Bitcoin, such as

How Did Chinese Hackers Hide in Networks for 400 Days?

Data Security

How Did Chinese Hackers Hide in Networks for 400 Days?

As cyber threats continue to evolve, few are as insidious as the recent Chinese cyberespionage campaign involving the BrickStorm malware. To unpack this complex operation, we’re speaking with Vernon Yai, a renowned data protection expert specializing in privacy protection and data governance. With years of experience in risk management and

Malicious GitHub Repositories – Review

Data Security

Malicious GitHub Repositories – Review

Imagine opening your browser to download a trusted application, only to find that the top search result leads you straight into a cybercriminal’s trap, a scenario that is becoming alarmingly common for macOS users who are increasingly targeted by a sophisticated cybercrime campaign using fraudulent GitHub repositories to distribute

How Does QuProtect R3 Revolutionize Encryption Security?

Data Security

How Does QuProtect R3 Revolutionize Encryption Security?

In an era where digital threats are escalating at a staggering rate, organizations across industries are grappling with the daunting task of protecting sensitive data from both current cyberattacks and looming quantum computing risks, which could render traditional encryption obsolete. QuSecure's latest innovation, the QuProtect R3 platform, steps

AWSDoor: Stealthy Threat to AWS Cloud Security Unveiled

Data Security

AWSDoor: Stealthy Threat to AWS Cloud Security Unveiled

In an era where cloud computing underpins countless business operations, a new and insidious threat has emerged that challenges the very foundations of AWS security, raising alarms across the tech industry with its stealthy approach. Dubbed AWSDoor, this sophisticated tool enables attackers to establish long-term, covert access within AWS

1 2 3 4 39
1 2 39

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later