Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
Why Are We Failing at Container Security?

Data Security

Why Are We Failing at Container Security?

Despite nearly a quarter of organizations reporting a significant cybersecurity incident within their containerized environments over the last year, a troubling gap persists between the acknowledgment of risks and the implementation of fundamental security practices. The widespread adoption of containers has revolutionized software development and

Naoris Protocol Holds Support With Quantum-Proof Tech

Data Security

Naoris Protocol Holds Support With Quantum-Proof Tech

In the rapidly evolving landscape of digital infrastructure, a silent but monumental threat looms on the horizon: the advent of quantum computing, which promises to render current cryptographic standards obsolete almost overnight. As institutions and investors grapple with this impending reality, Naoris Protocol has emerged not only as a

StackWarp Flaw Hijacks AMD Virtual Machines

Data Security

StackWarp Flaw Hijacks AMD Virtual Machines

A newly disclosed hardware vulnerability is fundamentally challenging the core security promises of modern cloud computing, demonstrating how a supposed digital fortress can be turned into a point of entry for sophisticated attackers. The flaw, named StackWarp, affects a vast range of AMD processors and allows a malicious host to hijack the very

How to Harden Your Google Workspace Security

Data Security

How to Harden Your Google Workspace Security

Security teams at rapidly expanding companies are frequently tasked with the monumental challenge of protecting the organization's digital assets without impeding the very agility that fuels its growth. These teams often inherit a technology infrastructure that was initially optimized for speed and collaboration, not for robust security and

How Attackers Can Weaponize Your AI Autoscaler

Data Security

How Attackers Can Weaponize Your AI Autoscaler

With the rise of AIOps, companies are handing the keys to their cloud infrastructure over to artificial intelligence, promising unparalleled efficiency. But what happens when that AI can be tricked? We sat down with Vernon Yai, a data protection expert who specializes in the intricate risks of AI-driven systems, to discuss the emerging threats of

Poor Data Wastes $108 Billion in Annual AI Spending

Data Security

Poor Data Wastes $108 Billion in Annual AI Spending

The global race to integrate artificial intelligence into every facet of business has created a staggering financial paradox where ambitious investments are collapsing under the weight of inadequate data foundations. As companies pour unprecedented sums into AI, a critical oversight is emerging as the primary cause of failure. For over half of all

1 4 5 6 7 8 9 10 64
1 6 7 8 64

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later