Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Avoid Fake Charity Fundraiser Scams | The Seventh Day of Scam-mas

On the seventh day of Scam-mas, a “heartwarming” holiday charity plea hides a cruel scam. Learn how Avast Scam Guardian helps protect your generosity from fake fundraisers and social media sob stories. Stay safe from holiday charity scams! SUBSCRIBE to our Avast channel for more tips, updates, and advice.

How to Spot Tampered or Drained Gift Cards | The Sixth Day of Scam-mas

On the sixth day of Scam-mas, Daniel discovers a gift card scam lurking on the shelf — but Avast helps him spot the warning signs before Deceivus can strike! Stay safe from tampered or drained gift cards this holiday season. SUBSCRIBE to our Avast channel for more tips, updates, and advice: YouTube.com/Avast CHAPTER TIMESTAMPS: FOLLOW US.

Delivering Intelligent IT Foundations for Safe AI Usage

JumpCloud CTO Greg Keller explains why traditional, fragmented IT tools create a critical Zero Trust gap for AI agents, bots, and non-human identities (NHIs). The biggest inhibitor to innovation isn't restrictive policy—it's the internal lack of a unified identity foundation. Learn how to address "identity sprawl" and transform IT operations to deliver auditable trust, extend Zero Trust enforcement to machine-to-machine interactions, and build the Intelligent IT foundations required for safe, accelerated AI adoption.

Tokenization and Treasury: Practical Opportunities in Liquidity, Settlement, and FX Flows

Tokenization is moving from pilot to production. At the Singapore FinTech Festival 2025, industry leaders from Temasek, Fireblocks, Deutsche Bundesbank, and ADDX sat down to dissect the real-world momentum behind tokenized money, stablecoins, and programmable finance. From 24/7 liquidity and FX optimization to the rising role of TradFi in blockchain innovation, this panel explores what’s working now—and what’s holding tokenization back from truly scaling.

AI vs Security Architects - Augmentation, Not Replacement

Are AI systems replacing security roles? Maybe not the way most people assume. AI isn't eliminating architects — it's augmenting them. Architects sit at the strategic layer: influence, prioritization, long-term posture. AI’s power isn’t replacing that judgment — it’s continuously surfacing what matters, validating configurations, and helping teams scale impact without hiring “more architects.” "If I say something should be done, I need a way to know whether it was done correctly — and continuously.".

How Consumer UX Is Reshaping Enterprise Identity

Consumer behaviour shapes expectations for workplace sign in, where anything difficult or slow is abandoned for easier options. Digital natives bring that mindset into the enterprise, so security teams must align user experience, secure authentication and complex enterprise technology to protect identity.

Keeper 101: KeeperAI Threat Detection for Privileged Sessions

In today's threat landscape, a single compromised privileged session can mean the difference between routine administration and a catastrophic breach. Organizations currently have no automated way to monitor user session recordings for security threats. Teams are forced to manually sift through enormous volumes of session data – including keystrokes, commands, and screenshots, which is slow, inefficient and error-prone.

Head of Public Policy Mike Centrella talks CISA Shutdown Updates - Nov. 13, 2025

News alert: With the government shutdown coming to an end, the continuing resolution includes the extension of CISA 2015 (Cybersecurity Information Sharing Act). However, sustained information sharing isn't optional, it's crucial for national resilience and security. A reinstitution of CISA 2015 for the coming weeks is just the beginning. "Timely, trusted threat intelligence sharing is foundational to both national security and private sector resilience.".