ABT Blog

Read about mortgage technology solutions topics

Cybersecurity Best Practices

OWASP Top 10 for Agentic AI security framework mapped to financial institution scenarios

14 min read

OWASP Top 10 for Agentic AI: What Every Financial Institution CISO Needs to Know

On December 10, 2025, OWASP released the first security framework built specifically for AI systems that can take autonomous actions. The OWASP Top...

Read More
M365 security audit checklist for community banks

11 min read

Microsoft 365 Security Audit Checklist for Community Banks

In This Article Why Community Banks Need a Microsoft 365 Security Audit Identity and Access Management Audit (10 Checks) Data Protection Audit (8...

Read More
Featured image for Why Community Banks Need a Tier-1 Cloud Solution Provider, Not a Generic MSP

11 min read

Why Community Banks Need a Tier-1 Cloud Solution Provider, Not a Generic MSP

In this article: What "Tier-1 CSP" Actually Means The Generic MSP Problem in Banking Direct Microsoft Escalation: Why It Matters During Incidents...

Read More
Featured image for Microsoft 365 Security Checklist for Credit Unions: 15 Settings Your IT Team Should Verify Today

12 min read

Microsoft 365 Security Checklist for Credit Unions: 15 Settings Your IT Team Should Verify Today

In This Article Why Credit Unions Need a CU-Specific M365 Security Checklist Identity and Access Management (Settings 1-4) Email Security (Settings...

Read More
Featured image for Microsoft 365 Compliance for GLBA and OCC Requirements: What Community Banks Must Configure

9 min read

Microsoft 365 Compliance for GLBA and OCC Requirements: What Community Banks Must Configure

In This Article GLBA Safeguards Rule: The IT Requirements Your Examiner Will Check OCC Examination: How Examiners Evaluate Your M365 Environment...

Read More
If Your Digital Bouncer Is Asleep, You’re in Trouble: 5 Conditional Access Rules You Need

9 min read

5 Conditional Access Rules Every Financial Institution Needs

In This Article What Conditional Access Does (And Why Defaults Fail) Rule 1: Block Legacy Authentication Protocols Rule 2: Require Managed and...

Read More