The Monetary Authority of Singapore (MAS) on AI Risk Governance

‍ ‍The Monetary Authority of Singapore's (MAS) Consultation Paper on Guidelines on Artificial Intelligence Risk Management, released in November 2025, dramatically altered how AI is positioned within the country’s financial supervision. The document states that the proposed Guidelines "set out MAS' supervisory expectations relating to AI risk management in financial institutions (FIs)" (p.3).

Dinari bridges traditional markets and digital assets - S2E09

In this episode, we're excited to introduce Brandon Ooi, the COO of Dinari, a fintech innovator making compliant tokenized securities accessible to investors. Brandon co-founded Crunchyroll as its CTO and worked at Stripe as an engineer specializing in marketplace enterprises, bringing deep technical expertise and product leadership to the intersection of traditional finance and blockchain technology. Join us as we explore Brandon's journey from building beloved consumer platforms to pioneering the future of securities trading, and how Dinari is bridging the gap between traditional markets and digital assets.

Account Takeover Fraud in 2026: How Attacks Really Happen and How to Stop Them Before Impact

Account takeover (ATO) fraud is a critical threat to digital businesses. Despite heavy investment in MFA and login anomaly detection, many attacks succeed because they bypass traditional safeguards entirely. Modern ATO doesn’t start at the login screen. It begins upstream with pre-login exposure and real-time credential relay, allowing attackers to hijack sessions before traditional defenses even engage.

Defending against deepfake cyberattacks: Why trust is the new security perimeter

Deepfake technology is now a legitimate enterprise level threat. What started as a potentially disturbing AI capability has rapidly become a powerful tool for cybercriminals and one that exploits the most fundamental element of business communication: trust. A new report from Info‑Tech Research Group, Defend Against Deepfake Cyberattacks, breaks down how to understand and assess the risk deepfakes pose to organizations of all sizes.

Anomaly Detection with Machine Learning to Improve Security

Being a security analyst can feel like being trapped in a Where’s Waldo book. You can find yourself staring at a data stream looking for something that “isn’t like the others.” However, as your organization collects and correlates more data from the environment, finding the Waldo can feel overwhelming. In a modern IT environment, organizations have hundreds or thousands of devices, users, and data points that they need to correlate so they can identify normal network activity.

What's New With Keeper | February 2026

The Keeper Security Government Cloud (KSGC) platform has been authorized at the FedRAMP High baseline, enabling federal civilian agencies to protect high-impact unclassified data as defined under FIPS 199 and FedRAMP High baselines. The “High Impact” designation applies to systems where unauthorized access or disruption could cause severe or catastrophic harm to agency operations, assets or individuals.

Threat Intelligence: Hunt Agent

Threat hunting no longer requires hours of manual research or specialized expertise. CrowdStrike Hunt Agent uses intelligence driven hunting guides and Charlotte AI to automatically detect and analyze suspicious activity in your environment. See how analysts gain instant expert insight prioritize real adversaries and uncover threats before they become incidents.

RIP mVPN: Why ZTNA Is the Future of Secure Access for SMBs

Once upon a time, the managed VPN (mVPN) was the hero of remote work. Employees worked from the office, servers lived in cupboards, and if you could gain access to the network, you were trusted. Fast forward to today, and that hero has not aged well. Hybrid work is permanent. Cloud apps rule. Attackers are smarter, faster, and annoyingly persistent. SMB IT teams are expected to hold it all together with limited time, limited budget, and zero tolerance for downtime.

Passing SOC 2 Without the Overhead: How Zero Standing Privileges Simplifies Compliance

Getting ready for a SOC 2 audit can feel like an endless checklist. You already have tools collecting logs, provisioning users, and pulling reports from your systems, yet proving compliance still feels harder than it should be. The biggest pain in SOC 2 is not collecting data. It is managing access in a way that continuously aligns with your own policies.