Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
SAP S/4HANA Vulnerability – Review

Data Security

SAP S/4HANA Vulnerability – Review

Imagine a scenario where a single flaw in a cornerstone enterprise system could bring an entire organization to its knees, exposing sensitive data and critical operations to malicious actors. This is not a hypothetical situation but a pressing reality for users of SAP S/4HANA, a leading enterprise resource planning (ERP) software that powers

Which Are the Top Cloud Penetration Testing Firms for 2025?

Data Security

Which Are the Top Cloud Penetration Testing Firms for 2025?

In an era where cloud computing underpins nearly every facet of modern business, platforms such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) have become indispensable tools for organizations worldwide. However, this widespread adoption has opened the door to significant security risks, with cybercriminals

AI and Unified Platforms Drive Endpoint Security Innovation

Data Security

AI and Unified Platforms Drive Endpoint Security Innovation

In today’s rapidly shifting digital environment, the importance of robust endpoint security and network monitoring cannot be overstated, as cyber threats grow increasingly sophisticated and damaging. Recent industry updates from the week of September 5th, compiled by Solutions Review, reveal how leading companies are harnessing artificial

Penn Engineers Transmit Quantum Data on Regular Internet

Data Security

Penn Engineers Transmit Quantum Data on Regular Internet

Imagine a world where data travels across the globe with unbreakable security and speeds that defy imagination, transforming how sensitive information is shared and processed in ways previously thought impossible. Engineers at the University of Pennsylvania have brought this vision closer to reality with a groundbreaking achievement: successfully

How Does Taegis and Sophos Enhance Endpoint Security?

Data Security

How Does Taegis and Sophos Enhance Endpoint Security?

In an era where cyberthreats are becoming increasingly sophisticated, the importance of robust endpoint protection cannot be overstated, as these devices often serve as the gateway for attackers to infiltrate entire networks, making their security a top priority. The recent integration of Sophos Endpoint into Taegis Extended Detection and Response

Why Is SAP Investing $23B in EU Sovereign Cloud Expansion?

Data Security

Why Is SAP Investing $23B in EU Sovereign Cloud Expansion?

In a world where data breaches can cost companies billions and shatter trust overnight, one tech giant is making an unprecedented move to secure the digital future of Europe. SAP, a leader in enterprise software, has committed a staggering $23.3 billion to expand its sovereign cloud infrastructure across the European Union. This massive investment

1 2 3 4 5 6 39
1 2 3 4 39

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later