Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
Zombie Assets Haunt Cybersecurity with Hidden Risks

Data Security

Zombie Assets Haunt Cybersecurity with Hidden Risks

Today, we’re thrilled to sit down with Vernon Yai, a renowned data protection expert with deep expertise in privacy protection and data governance. With a career dedicated to risk management and pioneering detection and prevention techniques, Vernon has become a trusted voice in the cybersecurity industry. In this conversation, we dive into the

What Does the $38B OpenAI-AWS Deal Mean for AI’s Future?

Data Security

What Does the $38B OpenAI-AWS Deal Mean for AI’s Future?

The technology sector is abuzz with the announcement of a monumental $38 billion multiyear partnership between OpenAI, a trailblazer in artificial intelligence research, and Amazon Web Services (AWS), the undisputed leader in cloud computing. Revealed on November 3, this deal is set to revolutionize OpenAI’s operational capacity by leveraging

AI Startup Security Tools – Review

Data Security

AI Startup Security Tools – Review

Setting the Stage for AI Security Challenges The startup ecosystem is witnessing an unprecedented surge in artificial intelligence (AI) adoption, with spending on AI tools skyrocketing as companies race to gain a competitive edge. A striking statistic reveals that among the top 50 AI applications startups invest in, not a single dedicated security

Is Bitcoin Ready for the Quantum Computing Threat?

Data Security

Is Bitcoin Ready for the Quantum Computing Threat?

As the world of digital finance continues to evolve at a breakneck pace, Bitcoin, the trailblazer of cryptocurrencies, faces an unprecedented challenge that could redefine its very existence, especially with quantum computing on the horizon. Quantum computing, a technology with the potential to perform calculations at speeds unimaginable with

How Is GOLD SALEM Redefining Ransomware Threats Globally?

Data Security

How Is GOLD SALEM Redefining Ransomware Threats Globally?

In a digital landscape increasingly fraught with peril, a new ransomware campaign orchestrated by a cybercriminal group known as GOLD SALEM, also tracked by Microsoft as Storm-2603, has emerged as a formidable challenge to global cybersecurity. Since its inception earlier this year, this operation has targeted 60 organizations across multiple

How Does EDR-Freeze Bypass Windows Endpoint Security?

Data Security

How Does EDR-Freeze Bypass Windows Endpoint Security?

In an era where cyber threats evolve at an alarming pace, a groundbreaking technique has emerged that challenges the very foundation of endpoint security on Windows systems, known as EDR-Freeze. This novel attack method has caught the attention of cybersecurity experts for its ability to disable Endpoint Detection and Response (EDR) tools without

1 2 3 4 5 47
1 2 3 47

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later