Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
Future Trends: Homomorphic Encryption’s Impact on AI, Blockchain, and Security

Data Security

Future Trends: Homomorphic Encryption’s Impact on AI, Blockchain, and Security

The field of Fully Homomorphic Encryption (FHE) is rapidly evolving, promising to revolutionize data security across various industries. By enabling computations on encrypted data, FHE ensures that sensitive information remains confidential even during processing. This crucial technology offers a groundbreaking solution to data privacy concerns,

Mobile Devices as Critical Endpoints: Closing the Security Gap

Data Security

Mobile Devices as Critical Endpoints: Closing the Security Gap

In today's interconnected world, mobile devices have become indispensable tools for both personal and professional use. However, many organizations still fail to recognize these devices as critical endpoints within their cybersecurity frameworks. This oversight creates significant vulnerabilities, as evidenced by high-profile cyberattacks like the

Aryaka Enhances Network Security with Leadership Moves and New Lab

Data Security

Aryaka Enhances Network Security with Leadership Moves and New Lab

Aryaka, a leading provider of Unified Secure Access Service Edge (SASE) as a Service, has recently made significant strides in bolstering its network security capabilities. Through strategic leadership appointments and the establishment of a dedicated threat research lab, Aryaka is reinforcing its commitment to delivering secure, agile, and

How Can State and Local Governments Achieve Cyber Resilience?

Data Security

How Can State and Local Governments Achieve Cyber Resilience?

State and local governments face an increasing number of cyberattacks targeting their critical infrastructure, including power grids, communication systems, and transportation networks. These attacks range from ransomware and data breaches to sophisticated cyber espionage. To mitigate the severe operational disruptions and financial losses caused

How Did Wilmore and Williams Advance Space Communication Technology?

Data Security

How Did Wilmore and Williams Advance Space Communication Technology?

The remarkable achievements of astronauts Butch Wilmore and Sunita Williams during their extended mission aboard the International Space Station (ISS) have played a crucial role in advancing communication and information and communication technology (ICT) stability. Originally intended to be a 10-day mission, it extended to over nine months,

How Did AWS re:Invent 2024 Redefine Cloud Tech and Cybersecurity?

Data Security

How Did AWS re:Invent 2024 Redefine Cloud Tech and Cybersecurity?

The AWS re:Invent 2024 event in Las Vegas was a convergence of industry leaders, innovators, and tech enthusiasts, all eager to explore the latest advancements in cloud technology, generative AI, and cybersecurity. Ashley Savoie, Senior Product Manager, and Danielle McNeil Taylor, Director of Integrated Marketing at Trend Micro, shared their

1 16 17 18 19 20 21 22 25
1 18 19 20 25

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later