Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
Why Bitcoin Is Safe From Quantum Computers, for Now

Data Security

Why Bitcoin Is Safe From Quantum Computers, for Now

The rapid advancement of quantum computing has sparked widespread speculation and concern, with many headlines forecasting a "quantum apocalypse" that could render current digital security measures, including those safeguarding Bitcoin, obsolete. This narrative suggests a future where a sufficiently powerful quantum computer could effortlessly

What If AI’s Biggest Problem Is Just a Cable?

Data Security

What If AI’s Biggest Problem Is Just a Cable?

The relentless advance of Artificial Intelligence feels like an unstoppable force, driven by ever-more-powerful processors and sophisticated algorithms, yet deep within the humming server racks of modern data centers, a critical bottleneck is forming that threatens to stall this progress. The incredible computational power of modern GPUs is being

Code-Level Privacy Is the New Mandate for Secure AI

Data Security

Code-Level Privacy Is the New Mandate for Secure AI

The relentless acceleration of software development, fueled by sophisticated AI-assisted coding and application generation platforms, has created a critical and widening chasm between the pace of innovation and the capacity of traditional security models to manage risk. As companies race to integrate AI and ship features faster than ever, their

CrowdStrike Secures AI Attack Surface with Falcon AIDR

Data Security

CrowdStrike Secures AI Attack Surface with Falcon AIDR

The rapid proliferation of artificial intelligence throughout modern enterprises has fundamentally reshaped business operations, but it has also quietly opened a new, unprotected frontier for cyberattacks. As organizations leverage everything from generative AI tools for employee productivity to sophisticated autonomous AI agents for complex

Why Is Hybrid the Top Strategy for CISOs?

Data Security

Why Is Hybrid the Top Strategy for CISOs?

Today, we are joined by Vernon Yai, a distinguished data protection expert specializing in the intricate worlds of privacy protection and data governance. As an established thought leader, his work focuses on pioneering new risk management strategies and developing innovative detection techniques to safeguard our most sensitive information in an

Threat Actor Weaponizes EDR to Evade Detection

Data Security

Threat Actor Weaponizes EDR to Evade Detection

In an alarming evolution of cyber warfare tactics, security tools designed to be the first line of defense are now being turned into Trojan horses by sophisticated threat actors. A group identified as Storm-0249 has pioneered a method that transforms trusted Endpoint Detection and Response (EDR) systems into instruments of stealth, allowing them

1 10 11 12 13 14 15 16 64
1 12 13 14 64

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later