Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
How Are Businesses Preparing for Post-Quantum Cryptography?

Data Security

How Are Businesses Preparing for Post-Quantum Cryptography?

In recent years, the rise of quantum computing has posed significant threats to traditional cryptographic standards. With the potential to break many of the encryption methods currently in use, quantum computing has forced organizations worldwide to reassess their security measures. As a response, companies are now pivoting towards post-quantum

Is NetBackup 11.0 the Future of Data Protection Against Cyber Threats?

Data Security

Is NetBackup 11.0 the Future of Data Protection Against Cyber Threats?

In the evolving landscape of cybersecurity, staying ahead of threats is crucial. Organizations are increasingly seeking innovative solutions to protect their data against sophisticated cyber attacks. Veritas' NetBackup 11.0, recently bolstered by Cohesity’s acquisition, is among the latest offerings to address these challenges, introducing

Is Oracle Cloud Services Data Breach Real or Just a False Alarm?

Data Security

Is Oracle Cloud Services Data Breach Real or Just a False Alarm?

In a developing scenario that has captured the attention of the technology sector, a potential data breach at Oracle Cloud Services has sparked widespread debate. Recently, a hacker using the alias "rose87168" announced the acquisition of six million records, including sensitive data such as encrypted SSO passwords, Java KeyStore files, and LDAP

Top Security Firms Enhance Automation and Risk Management Solutions

Data Security

Top Security Firms Enhance Automation and Risk Management Solutions

The latest advancements in the Endpoint Security and Network Monitoring sector highlight a strong trend towards enhanced automation and risk management. With the ever-increasing complexity and sophistication of cyber threats, industry leaders such as Auvik, SlashNext, and CyCognito are stepping up their game. These companies have unveiled

Is ABYSSWORKER the EDR Killer Changing the Cybersecurity Landscape?

Data Security

Is ABYSSWORKER the EDR Killer Changing the Cybersecurity Landscape?

The relentless race between cybersecurity systems and cyber threats has reached a new pinnacle, posing unprecedented challenges to businesses and individuals alike. What does this mean for the future of digital security as terrifyingly sophisticated threats like ABYSSWORKER emerge? Recent years have seen a dramatic escalation in cybersecurity

Edge Computing Revolution: Transforming Data Processing and IT Ecosystem

Data Security

Edge Computing Revolution: Transforming Data Processing and IT Ecosystem

The rapidly evolving world of IT is witnessing a significant transformation with the advent of edge computing. As the volume of data generated by interconnected IoT devices continues to grow exponentially, traditional centralized data processing systems are increasingly inadequate. Edge computing emerges as a game-changer, offering a decentralized

1 25 26 27 28 29 30 31 43
1 27 28 29 43

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later