Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
SAP S/4HANA Private Cloud – Review

Data Security

SAP S/4HANA Private Cloud – Review

In an era where enterprises grapple with unprecedented data volumes and the urgent need for real-time decision-making, a staggering statistic emerges: over 80% of large organizations report inefficiencies due to outdated ERP systems, setting the stage for transformative solutions like SAP S/4HANA Private Cloud. This cutting-edge platform is

Arctic Wolf and Abnormal AI Boost Email Threat Defense

Data Security

Arctic Wolf and Abnormal AI Boost Email Threat Defense

In an era where cyber threats loom larger than ever, email remains a primary gateway for attackers to infiltrate organizations, exploiting human vulnerabilities with alarming frequency. Business email compromise (BEC) and phishing attacks have become sophisticated, often bypassing traditional security measures by leveraging social engineering

Cloudflare Outage Traced to Internal Configuration Error

Data Security

Cloudflare Outage Traced to Internal Configuration Error

Vernon Yai is a renowned data protection expert whose insights into privacy protection and data governance have shaped industry standards. With a focus on risk management and innovative techniques for safeguarding sensitive information, Vernon brings a wealth of knowledge to today’s discussion on a recent high-profile internet outage. This

Can Bitcoin Withstand the Quantum Computing Threat?

Data Security

Can Bitcoin Withstand the Quantum Computing Threat?

Bitcoin, the trailblazer of cryptocurrencies, has transformed the financial landscape with its decentralized, trustless system, but a formidable challenge looms on the horizon in the form of quantum computing, which could potentially disrupt its security. This emerging technology, capable of performing calculations at speeds unimaginable with

SilentButDeadly: EDR Evasion Tool Exploits Windows Flaws

Data Security

SilentButDeadly: EDR Evasion Tool Exploits Windows Flaws

In an era where cybersecurity threats are becoming increasingly sophisticated, a newly documented endpoint detection and response (EDR) evasion technique has emerged as a significant concern for organizations worldwide, posing a serious risk to system security. This tool, known for its stealthy approach, targets critical vulnerabilities in Windows

Critical XSS Flaw in Citrix NetScaler Threatens Enterprises

Data Security

Critical XSS Flaw in Citrix NetScaler Threatens Enterprises

Imagine a scenario where a seemingly secure gateway to corporate networks becomes the very entry point for malicious actors, compromising sensitive data and user credentials with ease. A recently disclosed vulnerability in Citrix NetScaler ADC and Gateway platforms has sent shockwaves through the cybersecurity community, highlighting the fragility

1 2 3 4 5 49
1 2 3 49

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later