Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Threat Detection for Financial Services: Detecting AI-Driven Fraud and Data Exfiltration

A Tier 1 bank’s security architecture already spends heavily on detection. On one side sits the financial surveillance stack — fraud scoring platforms processing thirty thousand transactions an hour, AML monitoring watching money movement patterns, DLP engines scanning data in transit, payment anomaly detection tuned by a decade of production signal.

How to Identify and Reduce Excessive Permissions in AI Workloads

Your CIEM report came back clean this morning. Every AI agent in the cluster is exercising its granted permissions — no idle roles, no service accounts with broad scope and a handful of API calls behind them, nothing that looks obviously over-provisioned. The dashboard is green, and by the diagnostic your tool was built on, it should be.

The Deep Dive | The New AI Workforce: Governing Agentic Access with JumpCloud 04.24.2026

Join us for a look into Agentic IAM: treating AI as visible, governed workforce access. We’ll discuss our MVP focus on provisioning MCP servers through JumpCloud to register actors, control access to data, and audit activity—a secure starting point for agentic growth.

How Claude Helped Build a Proxmox Environment (and What I Learned Along the Way)

As a solutions architect, building out customer demo environments is part of the job. I regularly spin up lab scenarios to support evaluations and proof-of-concept work — and if you've done this before, you know it can eat up days of your life. So when I recently decided to refresh my homelab and migrate to Proxmox, I saw it as the perfect opportunity to put AI-assisted infrastructure automation to the test. The goal?

Who's behind the agent? Security, trust, and compliance in agentic payments

We’ve been collaborating with others to explore how agentic commerce and enterprise agents will work. Alfonso Gómez-Jordana Mañas, co-founder of Crossmint shares his thoughts on the current state of payment security and how compliance mechanisms like KYC and AML need to evolve to support agentic commerce. OpenClaw provided users with an open-source framework to launch AI agents.

Token Bingo: Don't Let Your Code be the Winner

In early April 2026, Arctic Wolf began tracking a large-scale device code phishing campaign impacting organizations across multiple regions and sectors. Similar to the widespread “Riding the Rails” campaign first observed in late March by Huntress, the threat actors were observed abusing OAuth device code flow to trick victims into providing authentication codes and obtain initial access into victim environments.

Acronis GenAI Protection - Dashboard and Reporting

Discover how to monitor and report on generative AI application usage with Acronis GenAI Protection. This walkthrough demonstrates adding monitoring widgets, interpreting usage data, and generating comprehensive reports to help you track AI adoption and data security across your managed environments.