Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
Mastering Your First 90 Days as a CISO: A Success Roadmap

Data Security

Mastering Your First 90 Days as a CISO: A Success Roadmap

The cybersecurity landscape is perpetually shifting, presenting a daunting challenge for leaders stepping into the role of Chief Information Security Officer (CISO). Questions about leadership in such a dynamic arena can be tough, and many CISOs last only about eighteen months before moving on, reminding us of the turbulent nature of this role.

Minimus Launches Revolutionary Tool to Cut Software Vulnerabilities

Data Security

Minimus Launches Revolutionary Tool to Cut Software Vulnerabilities

In an age where technological advancement is crucial, software security becomes increasingly important as development relies heavily on cloud services and intricate supply chains. It's against this dynamic backdrop that Minimus Inc., an application security startup, has made a significant entrance at the prestigious RSAC Conference. With a

Are Cloud Providers Equipped to Battle Persistent Cyber Threats?

Data Security

Are Cloud Providers Equipped to Battle Persistent Cyber Threats?

Vernon Yai, a seasoned expert in data protection, is known for his in-depth knowledge of privacy protection and data governance, as well as his innovative approaches to risk management. In light of the recent cyberattack on Commvault's Azure cloud environment, we turn to Vernon for insights into what happened, the immediate response, and future

Is Ransomware Collaboration the New Cybersecurity Threat?

Data Security

Is Ransomware Collaboration the New Cybersecurity Threat?

In the ever-evolving landscape of cybersecurity threats, a significant development is changing the dynamics of how cybercriminals operate and collaborate. The emergence of Ransomware as a Service (RaaS), combined with advanced tools such as Endpoint Detection and Response (EDR) killers, has heralded a new era of cyber threats. A prime example is

Can AI-Powered Security Solutions Revolutionize Threat Defense?

Data Security

Can AI-Powered Security Solutions Revolutionize Threat Defense?

Amidst an ever-evolving landscape riddled with cybersecurity threats, cutting-edge solutions are imperative. A significant collaboration has emerged between Cymulate and SentinelOne, organizations recognized for their prowess in cybersecurity innovation. Announced at the RSAC Conference 2025, this partnership paves the way for an enhanced approach

How Are Ransomware Attacks Evolving with Botnets?

Data Security

How Are Ransomware Attacks Evolving with Botnets?

In today's rapidly evolving cybersecurity landscape, the ability to adapt quickly to new threats is crucial. Vernon Yai, a seasoned expert in data protection and governance, sheds light on the latest innovations in ransomware delivery methods and the implications for cybersecurity professionals worldwide. Can you explain the significance of the

1 4 5 6 7 8 9 10 25
1 6 7 8 25

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later