Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
Are VMware vCenter and NSX at Risk from Critical Flaws?

Data Security

Are VMware vCenter and NSX at Risk from Critical Flaws?

In a digital landscape where cybersecurity threats loom larger than ever, a recent advisory from Broadcom has sent ripples through the IT community by uncovering critical vulnerabilities in VMware vCenter Server and NSX products. These flaws, detailed in advisory VMSA-2025-0016, have been classified as "Important" due to their potential to allow

Apple Releases Urgent Security Updates for iOS and macOS Flaws

Data Security

Apple Releases Urgent Security Updates for iOS and macOS Flaws

Vernon Yai, a renowned data protection expert with a deep focus on privacy protection and data governance, joins us today to discuss a critical topic in the world of cybersecurity. With years of experience in risk management and pioneering detection and prevention techniques, Vernon is the perfect person to help us unpack Apple’s latest security

Can EDR-Freeze Outsmart Modern Cybersecurity Tools?

Data Security

Can EDR-Freeze Outsmart Modern Cybersecurity Tools?

In the relentless cat-and-mouse game of cybersecurity, a new adversary has emerged that threatens to undermine the very tools designed to protect digital environments, marking a significant challenge for security professionals. EDR-Freeze, a recently unveiled proof-of-concept attack, represents a disturbing advancement in endpoint detection and

CSA Launches SaaS Security Framework to Simplify Protection

Data Security

CSA Launches SaaS Security Framework to Simplify Protection

Addressing the Rising Threat in SaaS Environments Imagine a multinational corporation managing dozens of Software as a Service (SaaS) applications, each hosting sensitive data and critical operations, only to discover a major breach due to a simple misconfiguration in one platform. This scenario is far from hypothetical, as studies reveal that

How Will Bitcoin Defend Against Quantum Cyber Threats?

Data Security

How Will Bitcoin Defend Against Quantum Cyber Threats?

Bitcoin stands as a cornerstone of digital finance, a decentralized currency that has reshaped how value is stored and transferred across the globe, but an emerging technological force—quantum computing—casts a shadow over its seemingly impregnable security. With the potential to shatter the cryptographic algorithms that protect Bitcoin, such as

How Did Chinese Hackers Hide in Networks for 400 Days?

Data Security

How Did Chinese Hackers Hide in Networks for 400 Days?

As cyber threats continue to evolve, few are as insidious as the recent Chinese cyberespionage campaign involving the BrickStorm malware. To unpack this complex operation, we’re speaking with Vernon Yai, a renowned data protection expert specializing in privacy protection and data governance. With years of experience in risk management and

1 2 3 4 5 6 7 43
1 3 4 5 43

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later