Stablecoin Payments in APAC: What Institutions Need to Know

Stablecoin transaction volumes have hit $33 trillion. Hong Kong just issued its first stablecoin licenses. In this panel from Fintech Fireside Asia, leaders from Fireblocks, Coinbase, FOMO Pay, and AWS break down what's actually happening on the ground across APAC: real use cases, shifting risk models, and where institutional adoption goes next. Panelists: Dan Sleep, Head of Business Solutions, APAC, Fireblocks Hassan Ahmed, Country Director Singapore, Coinbase Zack Yang, Co-founder, FOMO Pay Naveen Gupta, Head of Business Development, Payments, APJ Leader, AWS.

Key PCI DSS Controls You Must Build For 2026

PCI DSS controls are no longer just a compliance checkbox — they’re a mandatory security baseline that stands between your customers’ card data and sophisticated cybercriminals who are faster, smarter, and better-funded than ever before. According to the Nilson Report, global card fraud losses exceeded $33 billion in 2022 and are projected to surpass $38 billion by 2027.

Rethinking Threat Intelligence with the Threat Research Agent

Modern security teams are not lacking data. They are drowning in it. Threat intelligence feeds, indicators, campaigns, internal detections, and investigation artifacts are constantly growing in volume and complexity. Yet when analysts need answers, they are often forced to manually search, pivot, correlate, and interpret across multiple data points. This creates a familiar problem: too much data, not enough clarity.

The VMware Exodus, the DR Gap It Exposed, and Why We Built Trilio Site Recovery to Fill It

Something significant is happening across enterprise IT right now — and I do not think it has been fully reckoned with yet. More than 5,000 organizations are actively evaluating or executing a migration away from VMware. The Broadcom acquisition changed the economics of VMware dramatically and abruptly. Licensing costs surged. Bundling decisions eliminated flexibility.

When One Layer of Encryption Isn't Enough: Understanding Double VPN

There's a question buried inside most conversations about VPN security that rarely gets asked directly: what exactly is a single-hop VPN protecting you against - and what isn't it protecting you against? The answer determines whether a double VPN is a sensible upgrade or an unnecessary complication for your situation.

What Role Does Visual Testing Play in Cross-Browser Testing Tools?

You've run your test suite. All checks pass. But then you open your site in a different browser and something looks completely off. A button is misaligned, a font renders at the wrong size, or an entire section collapses on itself. This is one of the most frustrating realities of cross-browser development, and it's more common than most teams expect. Functional tests can't catch these problems because the page technically "works." That's exactly where visual testing steps in, and understanding its role can change how confidently you ship across browsers.

Top 7 Best ERP Authorisation Software Providers Active in Europe

Unauthorised access within ERP systems remains one of the most underestimated risks in enterprise security. A 2023 threat report by Onapsis and SAP revealed that new SAP vulnerabilities were being weaponised within 72 hours of patch release. That finding alone should make any compliance officer rethink how access rights are governed internally.

The New Vanguard: Strategic Leadership in the Age of Autonomous Threats

The threat landscape of 2026 is no longer defined by the singular hacker or the isolated malware strain. We have entered the era of the "Autonomous Adversary"-a period where AI-driven social engineering, automated vulnerability discovery, and polymorphic code are the standard tools of state-sponsored and criminal actors alike. For the security professional, the traditional defensive perimeter has dissolved. To navigate this complexity, the industry is moving away from purely tactical responses toward a model of "Cyber-Resilience and Strategic Governance.".