Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
Which Top MDR Vendors in 2025 Will Enhance Cybersecurity Best?

Data Security

Which Top MDR Vendors in 2025 Will Enhance Cybersecurity Best?

Managed Detection and Response (MDR) services are becoming increasingly crucial in the face of evolving cyber threats, which are growing more sophisticated each day. Organizations are under immense pressure to protect sensitive data and critical infrastructures from potential breaches that could result in significant financial and reputational

How Did FCS Enhance IT Security with Endpoint Management?

Data Security

How Did FCS Enhance IT Security with Endpoint Management?

Family and Children's Services (FCS), a prominent mental health nonprofit in Tulsa, Oklahoma, has been a cornerstone of community support for over a century. FCS offers a wide range of programs, including child abuse and trauma support, family counseling, and assistance for those grappling with substance abuse and addiction. As FCS expanded its

Essential Strategies to Shield Your Network from 2024 Ransomware Attacks

Data Security

Essential Strategies to Shield Your Network from 2024 Ransomware Attacks

Ransomware attacks have emerged as a crucial concern for organizations across industries due to their disruptive potential and sophisticated nature. These malicious activities encrypt sensitive data, demanding ransom payments for restoration, which can lead to significant financial and reputational damage. With ransomware tactics evolving at a

Are Your Docker Remote API Servers Vulnerable to Cyber Attacks?

Data Security

Are Your Docker Remote API Servers Vulnerable to Cyber Attacks?

In today's digital landscape, cybersecurity threats are evolving at an alarming rate. One of the latest targets for malicious actors is Docker remote API servers. These servers, if left unsecured or misconfigured, can become gateways for Linux malware and cryptocurrency miners, posing significant risks to organizations. Researchers from Trend

Fortinet Enhances AI-Powered Security for Network and Cloud Workflows

Data Security

Fortinet Enhances AI-Powered Security for Network and Cloud Workflows

In today's fast-evolving cybersecurity landscape, enterprises face the daunting challenge of maintaining robust security protocols while adapting to sophisticated threats and growing network complexities. Fortinet, a global leader in broad, integrated, and automated cybersecurity solutions, has made a significant leap forward by expanding its

How Can Enhanced Identity Security Defeat LUCR-3 Cyber Threats?

Data Security

How Can Enhanced Identity Security Defeat LUCR-3 Cyber Threats?

In today's digital landscape, the increasing sophistication of cyber threats necessitates a shift towards more robust security measures, particularly when it comes to protecting identity systems. One of the pressing challenges facing cybersecurity professionals is the emerging threat from the LUCR-3 group, also known as Scattered Spider. These

1 38 39 40 41 42 43
1 40 41 42 43

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later