Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
Why Is SAP Investing $23B in EU Sovereign Cloud Expansion?

Data Security

Why Is SAP Investing $23B in EU Sovereign Cloud Expansion?

In a world where data breaches can cost companies billions and shatter trust overnight, one tech giant is making an unprecedented move to secure the digital future of Europe. SAP, a leader in enterprise software, has committed a staggering $23.3 billion to expand its sovereign cloud infrastructure across the European Union. This massive investment

How Does Tampa General Hospital Quantify Cyber Risk?

Data Security

How Does Tampa General Hospital Quantify Cyber Risk?

Introduction to Cybersecurity Challenges in Healthcare Imagine a hospital system grinding to a halt, unable to access critical patient records or operate life-saving equipment due to a ransomware attack, a scenario that is not a distant threat but a stark reality for many healthcare institutions today. Cybersecurity has become a cornerstone of

How Did a Cyber Incident Impact Jaguar’s Operations?

Data Security

How Did a Cyber Incident Impact Jaguar’s Operations?

Imagine a leading automotive giant, synonymous with luxury and innovation, brought to a standstill by an unseen enemy—a cyberattack that cripples operations and shakes customer confidence. This scenario unfolded for Jaguar, highlighting the vulnerability of even the most established brands in a digitally driven world. As cybersecurity threats

How Does AWS’s New Zealand Cloud Region Boost Sovereignty?

Data Security

How Does AWS’s New Zealand Cloud Region Boost Sovereignty?

Welcome to an insightful conversation with Vernon Yai, a renowned data protection expert with deep expertise in privacy protection and data governance. With a focus on risk management and innovative techniques for safeguarding sensitive information, Vernon brings a unique perspective to the evolving landscape of cloud computing. Today, we’re

Hackers Use Windows Defender to Disable EDR Security Tools

Data Security

Hackers Use Windows Defender to Disable EDR Security Tools

In a chilling development for cybersecurity professionals, a once-trusted protective mechanism within Windows systems has been turned against its purpose, allowing malicious actors to disable critical security tools on a massive scale. Cybercriminals have found a way to exploit Windows Defender Application Control (WDAC) policies, originally

Aurora Endpoint Security Achieves 100% Threat Protection

Data Security

Aurora Endpoint Security Achieves 100% Threat Protection

In an era where cyber threats evolve at an alarming pace, securing endpoints against sophisticated malware and multi-stage attacks has become a paramount concern for organizations worldwide. A groundbreaking development in this space has emerged with the recent independent evaluation of Aurora Endpoint Security, a solution that has demonstrated

1 11 12 13 14 15 16 17 49
1 13 14 15 49

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later