Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
ShinyHunters Breaches Google via Salesforce Vulnerabilities

Data Security

ShinyHunters Breaches Google via Salesforce Vulnerabilities

I'm thrilled to sit down with Vernon Yai, a renowned data protection expert with deep expertise in privacy protection and data governance. With a career dedicated to risk management and pioneering detection and prevention techniques, Vernon has become a trusted voice in safeguarding sensitive information. Today, we’ll dive into the evolving world

How Does Agentic AI Slash Cyber Response Times by 70%?

Data Security

How Does Agentic AI Slash Cyber Response Times by 70%?

In an era where cyber threats evolve at a breakneck pace, the ability to respond to incidents swiftly and effectively has become a cornerstone of digital defense. Imagine a scenario where a sophisticated ransomware attack targets an organization’s critical systems, and within mere minutes, an autonomous system detects the anomaly, isolates the

HeartCrypt-Packed AVKiller Targets EDR in Ransomware Attacks

Data Security

HeartCrypt-Packed AVKiller Targets EDR in Ransomware Attacks

In the shadowy realm of cybersecurity, a chilling new weapon has emerged, striking at the very heart of organizational defenses with surgical precision, and it is known as AVKiller, cloaked in HeartCrypt obfuscation. This malicious tool is being actively wielded by cybercriminals to dismantle endpoint detection and response (EDR) systems—crucial

Microsoft Unveils $5M Zero-Day Quest Hacking Challenge

Data Security

Microsoft Unveils $5M Zero-Day Quest Hacking Challenge

In a bold move to combat the escalating sophistication of cyber threats, Microsoft has relaunched its Zero-Day Quest, an ambitious cybersecurity contest boasting an unprecedented $5 million bounty pool. This initiative invites ethical hackers from across the globe to unearth critical vulnerabilities, especially zero-day exploits—hidden flaws that

DaVita Cyber-Attack Exposes Data of 900,000 Patients

Data Security

DaVita Cyber-Attack Exposes Data of 900,000 Patients

Setting the Stage for a Healthcare Cybersecurity Crisis Imagine a scenario where a routine medical treatment becomes a gateway to personal vulnerability, as sensitive data falls into the wrong hands due to a devastating cyber-attack. This is the harsh reality for nearly a million patients of DaVita, a leading US kidney dialysis provider, following

Driving Risks: Data Privacy in Connected Cars Exposed

Data Governance

Driving Risks: Data Privacy in Connected Cars Exposed

Imagine stepping into a sleek, modern vehicle packed with cutting-edge technology—sensors, cameras, and AI seamlessly integrated to provide a connected driving experience that feels like the future, yet beneath this impressive innovation lies a troubling reality. These connected cars are amassing vast amounts of personal data, often without

1 21 22 23 24 25 26 27 55
1 23 24 25 55

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later