Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
Why Is Hybrid the Top Strategy for CISOs?

Data Security

Why Is Hybrid the Top Strategy for CISOs?

Today, we are joined by Vernon Yai, a distinguished data protection expert specializing in the intricate worlds of privacy protection and data governance. As an established thought leader, his work focuses on pioneering new risk management strategies and developing innovative detection techniques to safeguard our most sensitive information in an

Threat Actor Weaponizes EDR to Evade Detection

Data Security

Threat Actor Weaponizes EDR to Evade Detection

In an alarming evolution of cyber warfare tactics, security tools designed to be the first line of defense are now being turned into Trojan horses by sophisticated threat actors. A group identified as Storm-0249 has pioneered a method that transforms trusted Endpoint Detection and Response (EDR) systems into instruments of stealth, allowing them

How Shadow AI Is Reshaping Enterprise Governance

Data Security

How Shadow AI Is Reshaping Enterprise Governance

The widespread, unsanctioned use of artificial intelligence tools by employees, a phenomenon known as "Shadow AI," is often misdiagnosed as a simple security failure or compliance breach. In reality, it represents a profound signal that employee workflows, productivity, and innovation are evolving at a pace that far outstrips the capacity of

How Does Shanya Blind Your Endpoint Security?

Data Security

How Does Shanya Blind Your Endpoint Security?

A formidable new threat has emerged from the shadowy corners of Russian underground forums, rapidly becoming the weapon of choice for some of the most notorious ransomware gangs operating today. Known as Shanya, or alternatively VX Crypt, this sophisticated "packer-as-a-service" platform provides cybercriminals with a turnkey solution to cloak

Will a U.S. 5G Breakthrough Reshape Our Digital World?

Data Security

Will a U.S. 5G Breakthrough Reshape Our Digital World?

The unceasing global demand for faster, more reliable, and ubiquitous digital connectivity has continually challenged the limits of existing wireless infrastructure, creating a pressing need for a transformative leap forward. A recent U.S. breakthrough in 5G+ Massive MIMO (Multiple-Input Multiple-Output) technology now stands as a pivotal

TangleCrypt: New Windows Packer Evades Ransomware Detection

Data Security

TangleCrypt: New Windows Packer Evades Ransomware Detection

Imagine a silent intruder slipping past the most advanced security systems, undetected, until it’s too late to stop the damage. This isn’t a plot from a spy thriller but the reality of a new cyber threat that has emerged as a formidable challenge for cybersecurity experts. Known as TangleCrypt, this Windows malware packer has been designed with

1 2 3 4 5 53
1 2 3 53

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later