Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
Mobile Devices as Critical Endpoints: Closing the Security Gap

Data Security

Mobile Devices as Critical Endpoints: Closing the Security Gap

In today's interconnected world, mobile devices have become indispensable tools for both personal and professional use. However, many organizations still fail to recognize these devices as critical endpoints within their cybersecurity frameworks. This oversight creates significant vulnerabilities, as evidenced by high-profile cyberattacks like the

Aryaka Enhances Network Security with Leadership Moves and New Lab

Data Security

Aryaka Enhances Network Security with Leadership Moves and New Lab

Aryaka, a leading provider of Unified Secure Access Service Edge (SASE) as a Service, has recently made significant strides in bolstering its network security capabilities. Through strategic leadership appointments and the establishment of a dedicated threat research lab, Aryaka is reinforcing its commitment to delivering secure, agile, and

How Can State and Local Governments Achieve Cyber Resilience?

Data Security

How Can State and Local Governments Achieve Cyber Resilience?

State and local governments face an increasing number of cyberattacks targeting their critical infrastructure, including power grids, communication systems, and transportation networks. These attacks range from ransomware and data breaches to sophisticated cyber espionage. To mitigate the severe operational disruptions and financial losses caused

How Did Wilmore and Williams Advance Space Communication Technology?

Data Security

How Did Wilmore and Williams Advance Space Communication Technology?

The remarkable achievements of astronauts Butch Wilmore and Sunita Williams during their extended mission aboard the International Space Station (ISS) have played a crucial role in advancing communication and information and communication technology (ICT) stability. Originally intended to be a 10-day mission, it extended to over nine months,

How Did AWS re:Invent 2024 Redefine Cloud Tech and Cybersecurity?

Data Security

How Did AWS re:Invent 2024 Redefine Cloud Tech and Cybersecurity?

The AWS re:Invent 2024 event in Las Vegas was a convergence of industry leaders, innovators, and tech enthusiasts, all eager to explore the latest advancements in cloud technology, generative AI, and cybersecurity. Ashley Savoie, Senior Product Manager, and Danielle McNeil Taylor, Director of Integrated Marketing at Trend Micro, shared their

NIST’s New Post-Quantum Encryption Standards for Enhanced Cybersecurity

Data Security

NIST’s New Post-Quantum Encryption Standards for Enhanced Cybersecurity

The advent of quantum computing poses a significant threat to current cryptographic systems, which rely on the complexity of mathematical problems that classical computers find challenging to solve. Recognizing this, the National Institute of Standards and Technology (NIST) has released new Federal Information Processing Standards (FIPS) for

1 30 31 32 33 34 35 36 39
1 32 33 34 39

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later