Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
Are Educational Cloud Accounts at Risk from Storm-1977?

Data Security

Are Educational Cloud Accounts at Risk from Storm-1977?

Storm-1977 has posed a significant threat to the education sector by targeting cloud tenants through password spraying attacks over the past year. The attacks utilize AzureChecker.exe, a command-line tool leveraged to compromise educational accounts. The perpetrators extract AES-encrypted data from external servers, which include lists of targeted

Can CSignum’s Tech Revolutionize Underwater Communication?

Data Security

Can CSignum’s Tech Revolutionize Underwater Communication?

Underwater communication has long been a challenge, with traditional methods failing to provide reliable data transmission in such unforgiving environments. CSignum, a leader in underwater wireless technology, recently raised £6 million in a Series A funding round to enhance its capabilities in this domain. This funding, led by Archangels, Par

Is ThreatLocker Redefining Endpoint Security Standards?

Data Security

Is ThreatLocker Redefining Endpoint Security Standards?

In the cybersecurity world, Vernon Yai stands out as a leading authority on data protection, privacy, and governance. He is renowned for his innovative techniques in risk management, focused on safeguarding sensitive information. This interview explores Vernon's insights into building a successful venture in the ever-evolving field of

How Is F5 Revolutionizing Application Security Amid Rising Threats?

Data Security

How Is F5 Revolutionizing Application Security Amid Rising Threats?

F5, a major player in application delivery and security, has unveiled significant updates to its F5 Application Delivery and Security Platform (ADSP). These advancements aim to enhance the protection of critical business applications amid a complex threat landscape. The ADSP now integrates advanced load balancing, traffic management, and

Baldwin Killer Malware Bypasses AV, EDR Using Advanced Techniques

Data Security

Baldwin Killer Malware Bypasses AV, EDR Using Advanced Techniques

As cybersecurity threats continue to evolve, the emergence of potent new malware tools has become a significant challenge for both individuals and organizations. Among these, "Baldwin Killer" has gained notoriety for its sophisticated evasion techniques, allowing it to bypass even the most robust antivirus (AV) and endpoint detection and response

Are We Ready for Quantum-Enabled Cybersecurity Threats?

Data Security

Are We Ready for Quantum-Enabled Cybersecurity Threats?

As the world approaches an era where quantum computing is becoming increasingly prevalent, concerns about its impact on cybersecurity are mounting. The promise of quantum computing lies in its ability to solve complex problems at speeds unimaginable with classical computers. However, this advancement brings with it significant threats to current

1 19 20 21 22 23 24 25 39
1 21 22 23 39

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later