Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
OpenSSL 3.5.0: Post-Quantum Security and Improved TLS Support

Data Security

OpenSSL 3.5.0: Post-Quantum Security and Improved TLS Support

OpenSSL has released its latest cryptographic library, version 3.5.0, which presents a groundbreaking stride in digital security by incorporating post-quantum cryptography (PQC) algorithms. This significant development addresses the imminent threat posed by quantum computing. The integration of three main PQC algorithms—ML-KEM for secure key

Can Sakura RAT’s Advanced Evasion Outsmart Your Security Measures?

Data Security

Can Sakura RAT’s Advanced Evasion Outsmart Your Security Measures?

In the rapidly evolving landscape of cybersecurity, a new threat has emerged that is testing the limits of current defense mechanisms. A Remote Access Trojan (RAT) named Sakura, recently published on GitHub, is causing significant concern within the security community due to its advanced evasion capabilities and comprehensive system control

How Will Quantum Computing Revolutionize Cybersecurity by 2025?

Data Security

How Will Quantum Computing Revolutionize Cybersecurity by 2025?

Quantum computing is not a distant dream now, but it is gradually becoming a reality. IBM, Google, Microsoft, and other tech giants have made substantial progress in the field. By now, quantum computing has emerged as more than just a scientific breakthrough; it has become an industry game-changer. This technology compels businesses to reassess

New GCP Vulnerability Reveals Limits of Least Privilege

Data Security

New GCP Vulnerability Reveals Limits of Least Privilege

A newly disclosed vulnerability named ImageRunner, uncovered by Tenable Research, exposed a subtle yet powerful privilege escalation pathway in Google Cloud Platform's Cloud Run service. This vulnerability, now patched by Google, allowed attackers with minimal permissions to illegitimately access and deploy private container images, effectively

How Are Businesses Preparing for Post-Quantum Cryptography?

Data Security

How Are Businesses Preparing for Post-Quantum Cryptography?

In recent years, the rise of quantum computing has posed significant threats to traditional cryptographic standards. With the potential to break many of the encryption methods currently in use, quantum computing has forced organizations worldwide to reassess their security measures. As a response, companies are now pivoting towards post-quantum

Is NetBackup 11.0 the Future of Data Protection Against Cyber Threats?

Data Security

Is NetBackup 11.0 the Future of Data Protection Against Cyber Threats?

In the evolving landscape of cybersecurity, staying ahead of threats is crucial. Organizations are increasingly seeking innovative solutions to protect their data against sophisticated cyber attacks. Veritas' NetBackup 11.0, recently bolstered by Cohesity’s acquisition, is among the latest offerings to address these challenges, introducing

1 7 8 9 10 11 12 13 25
1 9 10 11 25

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later