Justin Kirsch

NCUA AI resource hub implementation guide for credit unions

9 min read

NCUA AI Resource Hub: The Implementation Guide Your Credit Union Actually Needs

The NCUA updated its AI resource hub in January 2026, consolidating federal guidance on artificial intelligence for the 4,331 federally insured credit unions it oversees. The hub pulls together risk management frameworks, vendor evaluation criteria,...

Read More
Digital identity landscape showing machine identities vastly outnumbering human identities in financial services

11 min read

The AI Agent Identity Crisis: Machine IDs Will Outnumber Humans by 2027

Machine identities already outnumber human identities 82-to-1 in the average enterprise. By 2027, that ratio will climb past 100-to-1 as agentic AI,...

Read More

10 min read

Power BI Compliance Dashboards for Financial Institutions: Templates and Implementation Guide

In This Article Why Spreadsheet Compliance Monitoring Is Failing Financial Institutions What Power BI Actually Does as a Compliance Engine Five Power...

Read More
Featured image for Is Your Microsoft 365 Tenant Ready for Copilot? A Financial Services Readiness Assessment

9 min read

Is Your Microsoft 365 Tenant Ready for Copilot? A Financial Services Readiness Assessment

In This Article Why Readiness Matters More Than Speed The Data Governance Foundation You Need First Why Copilot Amplifies Permission Gaps Identity...

Read More
Enterprise dashboard showing unused Microsoft Copilot licenses at a financial institution

8 min read

Why 95% of Copilot Licenses Go Unused (And What Your Bank Can Do About It)

Out of 450 million commercial Microsoft 365 users worldwide, only 15 million have paid Copilot seats. That is a 3.3% adoption rate. And of those 15...

Read More
Credit union branch building at dusk with digital shield hologram

12 min read

Credit Union Cybersecurity: Beyond the Basics

In this article: Why "The Basics" Don't Protect Credit Unions Anymore Credit Union Cyber Threats That Actually Hit Credit Union Cybersecurity Best...

Read More
Lock It Down: A Guide to Risk-Based Security with Microsoft Intune

9 min read

Lock It Down: Risk-Based Device Compliance with Microsoft Intune

In This Article Why Device Compliance Is a Board-Level Concern What Microsoft Intune Device Compliance Actually Does Building a Risk-Based Intune...

Read More
If Your Digital Bouncer Is Asleep, You’re in Trouble: 5 Conditional Access Rules You Need

9 min read

5 Conditional Access Rules Every Financial Institution Needs

In This Article What Conditional Access Does (And Why Defaults Fail) Rule 1: Block Legacy Authentication Protocols Rule 2: Require Managed and...

Read More
The Moat Is Gone: Why Identity Is Your New Fortress in Microsoft 365

9 min read

The Moat Is Gone: Why Identity Is Your New Security Perimeter in Microsoft 365

In This Article The Identity-Access-Endpoint Triad Why Identity Attacks Are Accelerating The Regulatory Mandate Zero Trust: The Framework Behind M365...

Read More