Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
Aryaka Enhances Network Security with Leadership Moves and New Lab

Data Security

Aryaka Enhances Network Security with Leadership Moves and New Lab

Aryaka, a leading provider of Unified Secure Access Service Edge (SASE) as a Service, has recently made significant strides in bolstering its network security capabilities. Through strategic leadership appointments and the establishment of a dedicated threat research lab, Aryaka is reinforcing its commitment to delivering secure, agile, and

How Can State and Local Governments Achieve Cyber Resilience?

Data Security

How Can State and Local Governments Achieve Cyber Resilience?

State and local governments face an increasing number of cyberattacks targeting their critical infrastructure, including power grids, communication systems, and transportation networks. These attacks range from ransomware and data breaches to sophisticated cyber espionage. To mitigate the severe operational disruptions and financial losses caused

How Did Wilmore and Williams Advance Space Communication Technology?

Data Security

How Did Wilmore and Williams Advance Space Communication Technology?

The remarkable achievements of astronauts Butch Wilmore and Sunita Williams during their extended mission aboard the International Space Station (ISS) have played a crucial role in advancing communication and information and communication technology (ICT) stability. Originally intended to be a 10-day mission, it extended to over nine months,

How Did AWS re:Invent 2024 Redefine Cloud Tech and Cybersecurity?

Data Security

How Did AWS re:Invent 2024 Redefine Cloud Tech and Cybersecurity?

The AWS re:Invent 2024 event in Las Vegas was a convergence of industry leaders, innovators, and tech enthusiasts, all eager to explore the latest advancements in cloud technology, generative AI, and cybersecurity. Ashley Savoie, Senior Product Manager, and Danielle McNeil Taylor, Director of Integrated Marketing at Trend Micro, shared their

NIST’s New Post-Quantum Encryption Standards for Enhanced Cybersecurity

Data Security

NIST’s New Post-Quantum Encryption Standards for Enhanced Cybersecurity

The advent of quantum computing poses a significant threat to current cryptographic systems, which rely on the complexity of mathematical problems that classical computers find challenging to solve. Recognizing this, the National Institute of Standards and Technology (NIST) has released new Federal Information Processing Standards (FIPS) for

How Can You Easily Transfer Data to Your New iPhone?

Data Security

How Can You Easily Transfer Data to Your New iPhone?

Unboxing a new iPhone can be an exciting moment, filled with anticipation for new features and improved performance. However, getting started with your new device isn't as straightforward as simply turning it on. The critical task of transferring all your data from your old phone to your new iPhone can sometimes seem daunting. Whether you're

1 46 47 48 49 50 51 52 55
1 48 49 50 55

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later