Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
Healthcare Sector Faces Critical Security Gaps Amid Ransomware Threats

Data Security

Healthcare Sector Faces Critical Security Gaps Amid Ransomware Threats

The healthcare sector is facing significant cybersecurity challenges, as highlighted by a recent report from Absolute Security. The research analyzed telemetry from over a million PCs in healthcare environments and uncovered alarming vulnerabilities that put patient data and network security at risk. This article delves into the critical findings

Is Quantum-Secure Communication the Future of Healthcare Data Protection?

Data Security

Is Quantum-Secure Communication the Future of Healthcare Data Protection?

In a groundbreaking experiment, telecommunications giant Telefónica and hospital operator Vithas showcased a viable solution to one of the biggest challenges in modern healthcare: protecting sensitive patient data from future threats posed by quantum computing. The demonstration, which involved the successful implementation of quantum-secure

Defending Against Earth Preta: APT Group Evades EDR and Antivirus Systems

Data Security

Defending Against Earth Preta: APT Group Evades EDR and Antivirus Systems

A sophisticated cyberespionage group known as Earth Preta, also dubbed Mustang Panda, has been identified using advanced techniques to infiltrate systems and evade detection. Their stealthy approach involves leveraging legitimate Windows utilities to execute malicious payloads, making it difficult for Endpoint Detection and Response (EDR) systems

Best Practices for Vulnerability Scanning in Dynamic Cloud Environments

Data Security

Best Practices for Vulnerability Scanning in Dynamic Cloud Environments

As organizations increasingly adopt cloud-native development, the complexity of securing dynamic environments continues to grow. Vulnerability scanning remains a cornerstone of cloud security, enabling organizations to identify and address risks effectively. However, with the increasing prevalence of exploited vulnerabilities, persistent cloud

Which Firewall Software is Best for Your Needs in 2025?

Data Security

Which Firewall Software is Best for Your Needs in 2025?

Choosing the right firewall software is crucial for protecting your network from cyber threats. With the rapid evolution of technology, the landscape of firewall solutions has also changed significantly. This article aims to guide IT admins, business owners, and general users in selecting the best firewall software for their specific needs in

Best Cloud Collaboration Tools Tested to Combat Digital Chaos

Data Security

Best Cloud Collaboration Tools Tested to Combat Digital Chaos

In today's digital age, content marketers and remote workers face the challenge of managing and organizing a plethora of documents scattered across various platforms. The frustration of dealing with endless email attachments and disorganized files can hinder productivity and collaboration. To address this issue, we tested various cloud

1 11 12 13 14 15 16 17 25
1 13 14 15 25

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later