ABT Blog

Read about mortgage technology solutions topics

GLBA

Kerberos RC4 to AES migration countdown showing April 14 2026 deadline with service account authentication and encryption security concept

11 min read

Kerberos RC4 to AES: The April Patch That Will Break Your Service Accounts

In This Article What CVE-2026-20833 Actually Changes The Three-Phase Timeline The 15-Minute Audit That Prevents the Outage What the Encryption Values...

Read More
Microsoft 365 Data Loss Prevention architecture for financial services showing GLBA sensitive information detection and Purview compliance monitoring for examiner readiness

14 min read

M365 DLP for Financial Services: The Configuration Guide Your Examiner Expects

In This Article Why Alert, Not Block Guardian's Two-Stack DLP Architecture The Four GLBA Sensitive Information Types The Configuration Guide Your...

Read More
Community bank building at golden hour with visible server room technology

11 min read

Managed IT Services for Community Banks: What to Look for in a Provider

In this article: Why Community Banks Need Specialized IT FFIEC, GLBA, and OCC: The Regulatory Stack What Your Managed IT Provider Must Deliver Red...

Read More
Shadow AI in Banking Compliance Risk

12 min read

Shadow AI in Banking: The Risk Your Compliance Team Can't See

Prefer to watch? Your best analyst is probably pasting loan data into ChatGPT right now. That is a reportable GLBA event. Watch the long-form...

Read More
Featured image for Microsoft 365 Compliance for GLBA and OCC Requirements: What Community Banks Must Configure

9 min read

Microsoft 365 Compliance for GLBA and OCC Requirements: What Community Banks Must Configure

Prefer to watch? An autonomous AI agent that touches your tenant is now a complex third-party relationship. Watch the 38-second Short on how OCC...

Read More
M365 security audit checklist for community banks

11 min read

Microsoft 365 Security Audit Checklist for Community Banks

In This Article Why Community Banks Need a Microsoft 365 Security Audit Identity and Access Management Audit (10 Checks) Data Protection Audit (8...

Read More