Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
Can Sakura RAT’s Advanced Evasion Outsmart Your Security Measures?

Data Security

Can Sakura RAT’s Advanced Evasion Outsmart Your Security Measures?

In the rapidly evolving landscape of cybersecurity, a new threat has emerged that is testing the limits of current defense mechanisms. A Remote Access Trojan (RAT) named Sakura, recently published on GitHub, is causing significant concern within the security community due to its advanced evasion capabilities and comprehensive system control

How Will Quantum Computing Revolutionize Cybersecurity in 2025?

Data Security

How Will Quantum Computing Revolutionize Cybersecurity in 2025?

Quantum computing is not a distant dream now, but it is gradually becoming a reality. IBM, Google, Microsoft, and other tech giants have made substantial progress in the field. By now, quantum computing has emerged as more than just a scientific breakthrough; it has become an industry game-changer. This technology compels businesses to reassess

New GCP Vulnerability Reveals Limits of Least Privilege

Data Security

New GCP Vulnerability Reveals Limits of Least Privilege

A newly disclosed vulnerability named ImageRunner, uncovered by Tenable Research, exposed a subtle yet powerful privilege escalation pathway in Google Cloud Platform's Cloud Run service. This vulnerability, now patched by Google, allowed attackers with minimal permissions to illegitimately access and deploy private container images, effectively

How Are Businesses Preparing for Post-Quantum Cryptography?

Data Security

How Are Businesses Preparing for Post-Quantum Cryptography?

In recent years, the rise of quantum computing has posed significant threats to traditional cryptographic standards. With the potential to break many of the encryption methods currently in use, quantum computing has forced organizations worldwide to reassess their security measures. As a response, companies are now pivoting towards post-quantum

Is NetBackup 11.0 the Future of Data Protection Against Cyber Threats?

Data Security

Is NetBackup 11.0 the Future of Data Protection Against Cyber Threats?

In the evolving landscape of cybersecurity, staying ahead of threats is crucial. Organizations are increasingly seeking innovative solutions to protect their data against sophisticated cyber attacks. Veritas' NetBackup 11.0, recently bolstered by Cohesity’s acquisition, is among the latest offerings to address these challenges, introducing

Is Oracle Cloud Services Data Breach Real or Just a False Alarm?

Data Security

Is Oracle Cloud Services Data Breach Real or Just a False Alarm?

In a developing scenario that has captured the attention of the technology sector, a potential data breach at Oracle Cloud Services has sparked widespread debate. Recently, a hacker using the alias "rose87168" announced the acquisition of six million records, including sensitive data such as encrypted SSO passwords, Java KeyStore files, and LDAP

1 21 22 23 24 25 26 27 39
1 23 24 25 39

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later