Joshua Kaina

Joshua Kaina

Secure Transfer Expert
Joshua Kaina provides data security professionals with rich insights into secure transfers and related emerging technologies. He follows the industry’s latest advancements to help data managers understand which solutions are best suited to their industry and needs.  
SonicWall Hack Exposes Cloud Firewall Backups, Urges Action

Data Security

SonicWall Hack Exposes Cloud Firewall Backups, Urges Action

Diving into the world of cybersecurity, we’re thrilled to sit down with Vernon Yai, a renowned data protection expert with a sharp focus on privacy protection and data governance. With years of experience in risk management and a passion for pioneering detection and prevention strategies, Vernon is a trusted voice in safeguarding sensitive

Why Is Endpoint Security Crucial in a Digital World?

Data Security

Why Is Endpoint Security Crucial in a Digital World?

In an era where digital connectivity permeates every aspect of business and personal life, the alarming rise in cyber threats has become a pressing concern for organizations across the globe, with the potential to disrupt operations and compromise sensitive data. Imagine a multinational corporation waking up to find its entire network compromised,

How Is CrowdStrike Leading AI-Native Cybersecurity?

Data Security

How Is CrowdStrike Leading AI-Native Cybersecurity?

In an era where digital transformation has become the backbone of global economies, the sophistication of cyber threats has escalated to unprecedented levels, driven by advancements in artificial intelligence and the relentless creativity of malicious actors. Every day, businesses of all sizes face an onslaught of attacks, from ransomware to

What’s New in SAP Connect: AI and Cloud Innovations?

Data Security

What’s New in SAP Connect: AI and Cloud Innovations?

In a world where businesses grapple with relentless digital transformation, a staggering 75% of enterprises report falling behind due to outdated systems, according to recent industry surveys, painting a stark picture of the challenges ahead. Picture a global corporation struggling to predict supply chain disruptions or a mid-sized firm drowning

California’s AI Law Shakes Up Tech with New Transparency Rules

Data Security

California’s AI Law Shakes Up Tech with New Transparency Rules

What happens when one of the world’s biggest tech hubs decides to draw a line in the sand on artificial intelligence? California, home to countless innovators and industry giants, has done just that with a groundbreaking law that’s sending shockwaves through boardrooms and IT departments alike. Senate Bill 53 (SB 53), dubbed the Transparency in

How Can Education Combat Cybersecurity Threats Post-Kido?

Data Security

How Can Education Combat Cybersecurity Threats Post-Kido?

Introduction Imagine a scenario where the personal data and images of young children at a nursery are stolen and published online, accompanied by threatening calls to parents demanding ransom, a chilling reality that unfolded in a high-profile data breach at a UK-based nursery. This incident exposed the alarming vulnerability of educational

1 6 7 8 9 10 11 12 49
1 8 9 10 49

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later

Subscribe to Newsletter

Stay informed about the latest news, developments, and solutions in data security and management.

Invalid Email Address
Invalid Email Address

We'll Be Sending You Our Best Soon

You’re all set to receive our content directly in your inbox.

Something went wrong, please try again later