Posted on

How inclusive hiring practices can mitigate cybersecurity risks

Cybersecurity is a critical concern for startups and growing businesses, especially as digital transformation accelerates. With more companies relying on cloud services, remote work and AI-driven tools, cyberthreats evolve at an alarming pace. One often-overlooked way to strengthen cybersecurity is by building diverse IT teams.

Teams with different experiences and problem-solving approaches bring fresh perspectives that help identify risks, improve threat detection and develop stronger defence strategies. Prioritising diversity in IT teams can build a more resilient framework, which reduces risks and ensures long-term success.

Broader perspective on cyberthreats

Diverse teams bring a wealth of perspectives that strengthen cybersecurity defences, helping enterprises anticipate and respond to a wide range of threats. Cybercriminals don’t operate with a one-size-fits-all approach. They adapt their tactics based on regions, industries and cultural behaviours, but many teams lack the diversity needed to recognise these evolving risks.

In Southeast Asia, for example, women make up only 34 per cent to 40 per cent of the tech workforce, which leaves a significant gap in representation. A more balanced team brings different ways of think, allowing brands to identify blind spots a homogenous group might miss.

Employees from different backgrounds and sectors can spot vulnerabilities others might overlook, providing a well-rounded approach to threat detection. Someone with experience in financial services may recognise banking-specific phishing scams, while a team member from the health care sector may be more aware of medical data breaches. This diversity in thought and experience leads to stronger problem-solving, more innovative security strategies, and a cybersecurity framework that evolves alongside emerging threats.

Improved problem-solving

Diversity fuels creative problem-solving and enables teams to think beyond traditional defense strategies. Cyberthreats constantly evolve, so a one-dimensional approach often falls short against sophisticated attacks. When the staff comes from different backgrounds, industries and cultures, they bring unique insights that help uncover unconventional solutions.

Cyberattacks require quick thinking and adaptability, and a team with varied experiences is more likely to approach problems from multiple angles. This diversity in thought reduces blind spots, strengthens risk assessment and improves overall resilience.

Also Read: What if cybersecurity included everyone it protects?

Increased innovation in cybersecurity tools and strategies

A cybersecurity team with diverse technical skills and perspectives is far better equipped to develop cutting-edge security solutions, especially as cyberthreats become more sophisticated. AI-powered attacks are dynamic, making traditional defence strategies less effective. However, many organisations face a major obstacle — “insufficient personnel to manage tools and alerts” is one of the biggest challenges in defending against AI-driven threats.

Without enough skilled professionals, security teams struggle to analyse threats in real time, leaving their employers vulnerable to breaches. A diverse IT team helps bridge this gap by bringing in expertise from varying fields, which ensures a well-rounded approach to cybersecurity. Exposure to various security frameworks and technologies also fosters innovation to help businesses stay ahead of emerging threats.

For example, a professional with cloud security expertise might identify risks a network security specialist could miss. Meanwhile, those with AI and machine learning backgrounds can enhance automation in threat detection and response. When cybersecurity professionals from multiple disciplines collaborate, they create a more adaptive and proactive defence strategy.

Enhanced understanding of social engineering attacks

Cybercriminals constantly refine their tactics, often using cultural and psychological manipulation to exploit human behaviour in phishing scams and fraud. Scammers tailor their messages to different regions with language, social norms and local events, tricking victims into clicking malicious links or revealing sensitive data.

In 2023, the US sent eight billion spam emails in a single day, highlighting the sheer scale of phishing threats. With cybercriminals deploying region-specific scams, brands must take a proactive approach to security hat accounts for cultural nuances and evolving attack patterns.

A diverse IT team is better equipped to recognise and mitigate these targeted threats. Employees with different linguistic skills and cultural insights can identify red flags in tone, structure or context that align with specific regional fraud tactics. Whether spotting financial scams in Southeast Asia or fake tech support calls in India, a well-rounded team ensures stronger protection across multiple markets.

Also Read: How an AI cybersecurity company harnesses the power of AI for optimal business performance

Stronger compliance with international cybersecurity regulations

Companies operating across borders face the challenge of navigating multiple data protection laws, each with its own set of regulations and penalties. Compliance is not optional — failing to meet legal requirements can lead to hefty fines and reputational damage. In Singapore, for instance, people can incur penalties of up to SG$1 million (US$747,097.87 approx.) for noncompliance with the Personal Data Protection Act. This underscores the severe consequences of data breaches and mishandling of personal information.

A diverse IT team can manage these compliance challenges. Professionals with experience in different regions bring valuable insights into global data protection laws, ensuring the enterprise adheres to multiple regulatory standards. Fostering diversity can reduce legal risks, strengthen data governance and build trust with customers across global markets.

Stronger cybersecurity leads to innovation and trust

Building a diverse IT team goes beyond meeting compliance requirements. It fosters innovation, strengthens cybersecurity strategies, and builds trust with customers and stakeholders. Embracing diversity can develop more adaptive security solutions, enhance threat detection, and create a resilient digital infrastructure that protects data and reputation.

Editor’s note: e27 aims to foster thought leadership by publishing views from the community. Share your opinion by submitting an article, video, podcast, or infographic.

Enjoyed this read? Don’t miss out on the next insight. Join our WhatsApp channel for real-time drops.

Image credit: Canva Pro

The post How inclusive hiring practices can mitigate cybersecurity risks appeared first on e27.

Posted on

Building trust in turbulent times: The new security paradigm for crypto exchanges

The US$1.5 billion hack of a major crypto exchange last month — possibly the largest digital theft ever — has once again revealed the weak spots in exchange security. And the timing couldn’t be worse. Bitcoin was hitting record highs, institutional investors are diving in, and mainstream adoption is accelerating. Yet, for all its progress, crypto remains dangerously vulnerable.

As digital assets shift from speculative investments to core components of the financial system, the industry has reached a turning point. The question now isn’t whether crypto will change finance, but whether exchanges can earn the trust needed to make that shift a reality.

Moving beyond quick fixes

Following the US$1.5 billion hack, Bitcoin dropped below US$80,000, and investor sentiment indices swung dramatically from “extreme greed” to “extreme fear” — erasing billions in market value virtually overnight.

This volatility exposes an uncomfortable truth: many exchanges continue operating with security frameworks designed for crypto’s early days, when stakes and attack sophistication were considerably lower. These approaches typically prioritise technological solutions while neglecting the equally important human element.

The Financial Action Task Force (FATF) recently highlighted how regulatory gaps create exploitable loopholes within the crypto ecosystem. These vulnerabilities demand urgent attention from both regulators and industry participants who genuinely care about the sector’s long-term viability.

Also Read: Why AI security demands a different playbook in Asia

Three pillars of next-generation security

Tomorrow’s exchanges must build security frameworks on three fundamental pillars:

  • Multi-Layered Technical Infrastructure

Security must extend beyond basic key management to include comprehensive threat detection, real-time monitoring, and automated circuit breakers capable of halting suspicious transactions before they complete. Prevention, not just detection, needs to become the industry standard.

  • Human-Centric Security Protocols

Most significant breaches begin with social engineering rather than technical vulnerabilities. Exchanges must implement rigorous staff training, rules-based access controls, and zero-trust frameworks that limit potential damage from compromised accounts or insider threats.

  • Transparent Asset Management

Users deserve verifiable proof that their assets are secure. This involves conducting regular third-party audits, offering real-time proof of reserves, and providing 1:1 asset backing guarantees that can be independently verified at any time.

At progressive exchanges, this comprehensive strategy integrates technologies such as multi-party computation (MPC), cold storage custody, and enterprise-level encryption to enhance security and transparency. Equally important is maintaining platform independence by ensuring no customer funds are stored on external exchanges, significantly reducing potential attack vectors.

Regulatory engagement as competitive advantage

As regulatory frameworks evolve unevenly across different regions, forward-thinking exchanges should see compliance not as a challenge, but as a competitive advantage.

Asia is leading the way in thoughtful crypto regulation, with Singapore and Hong Kong offering balanced models that protect consumers while fostering innovation. Their approaches show that regulations can support, rather than hinder, the growth of the industry.

Also Read: Your job is not your safety net: Build your own security

Proactive compliance isn’t about mere box-ticking but building systems aligned with traditional financial protections while accommodating digital assets’ unique characteristics. This means going beyond minimum requirements to establish robust anti-money laundering (AML) / know-your-customer (KYC) processes, maintaining clear separation between client and operational funds, and creating transparent governance structures.

Rebuilding trust through education

Beyond technical and regulatory concerns, the most important factor is rebuilding user trust through education and empowerment.

Even the most robust security measures are useless if users don’t understand how to use them or aren’t aware of their importance. Exchanges must focus on creating user-friendly designs that make security straightforward, not a burden. They should also provide clear instructions and tools that help users manage their own security effectively.

As crypto adoption grows beyond experienced traders to the general public, exchanges need to strike a balance. They must offer strong security without making it complicated or frustrating for everyday users.

The path forward

The recent US$1.5 billion hack represents both a crisis and an opportunity. Those who don’t learn from it risk being left behind, while those who rise to the challenge have the chance to set new industry standards.

As the industry matures, security can no longer be seen as just a technical hurdle; it must become the bedrock of the entire crypto ecosystem. Security goes beyond protecting assets to safeguarding the vision of a more accessible and efficient financial system.

Technological solutions will keep evolving, but the real change will come from a shift in culture—putting user protection at the heart of every decision and creating systems where security is built in from the start, not tacked on later.

By adopting this approach, crypto exchanges can not only survive current challenges but also help drive the future of finance toward greater security and transparency. The industry’s long-term success won’t come from speculative booms but from earning and keeping the trust of users everywhere.

Editor’s note: e27 aims to foster thought leadership by publishing views from the community. Share your opinion by submitting an article, video, podcast, or infographic.

Join us on InstagramFacebookX, and LinkedIn to stay connected.

We’re building the most useful WA community for founders and enablers. Join here and be part of it.

Image courtesy: Canva Pro

The post Building trust in turbulent times: The new security paradigm for crypto exchanges appeared first on e27.

Posted on

Navigating hybrid cloud strategies: Enhancing cybersecurity for businesses in the APAC region

The advent of emerging technologies such as automation, artificial intelligence (AI) and machine learning (ML) has drastically disrupted what it takes to remain relevant. Globally, enterprises are seeking strategies that can provide them with a competitive edge in a rapidly evolving digital landscape.  According to a recent report, the global hybrid cloud market is expected to reach US$262 billion in 2027, with the APAC region expected to grow at the highest rate.

Hybrid cloud strategies have gained popularity as they provide the flexibility, scalability, and redundancy businesses need for improved modern operations. By integrating the benefits of both public and private clouds, businesses can utilise the scalability of public cloud services while keeping sensitive data and applications securely within their private cloud infrastructure.

Notwithstanding the numerous financial and efficiency benefits of hybrid cloud solutions, a lack of proper data management practices can quickly manifest into significant cybersecurity hurdles. With widespread cloud adoption, organisations are exposed to increased cyber risks and are also introducing complexity into their operations.

Notably, cloud-related threats are among the top three cyber concerns for 51 per cent of APAC organsations. Hence, finding the right balance between leveraging hybrid cloud benefits and maintaining a secure network for cyber resilience is crucial. So how can businesses best pursue their hybrid cloud set up, while ensuring that their network remains secure?

New multi-cloud cyber challenges raining on businesses

Managing a multi-cloud ecosystem without effective data practices can hinder an organisation’s ability to implement sound security frameworks.

Clear data visibility is critical in enabling an organisation’s capacity to integrate frameworks, such as zero trust. In particular, zero trust frameworks operate on the principle that no entity, whether inside or outside the network, should be trusted by default, necessitating continuous monitoring and verification of every request. The ability to identify whether a user is verified or not can become complicated if an organisation does not have adequate oversight of their data.

Ensuring data is protected whilst it moves between public and private clouds is another significant challenge. The movement of data across different environments can often increase the risk of exposure to malicious actors. Robust encryption and secure communication channels are essential to protect data during transit and storage.

Also Read: How cybersecurity teams can involve HR to optimise incident response

For many, taking the first step in implementing security solutions across various cloud environments can be daunting, but it is increasingly necessary. Australia, in particular, faces heightened risks, with the new statistics from the Office of the Australian Information Commissioner (OAIC) showing the number of data breaches notified to the regulator in the first half of 2024 was at its highest in three and a half years.

Recent data breaches from high-profile organisations across the region proves just how critical strong data coordination is for security purposes. Business leaders must ensure that their security measures are uniformly applied across both public and private clouds to prevent such vulnerabilities and risks.

Strategies for enhanced security in hybrid cloud environments

To navigate the cybersecurity challenges posed by hybrid cloud strategies, businesses of any size should look to implement several key measures:

  • Perform cyber risk assessments

Conducting thorough cyber risk assessments can help organisations understand how their data is stored and identify potential vulnerabilities. Regular reviews can enable businesses to stay ahead of potential threats and implement necessary security measures proactively.

  • Implement Zero Trust Frameworks

Adopting zero trust frameworks ensures that malicious activities are detected promptly. By continuously monitoring and verifying every access request, organisations can prevent unauthorised access and reduce the risk of data breaches.

  • Utilise robust encryption

Robust encryption protects data both in transit and at rest. By encrypting data, businesses can secure sensitive information and prevent unauthorised access, even if data is intercepted during transmission between public and private clouds.

Also Read: Embracing AI evolution: The crucial role of data management and cybersecurity in AI success

  • Employ multi-factor authentication (MFA)

MFA adds an extra layer of security by requiring multiple forms of verification before granting access to critical or sensitive data. This significantly reduces the risk of unauthorised access, as attackers would need to bypass multiple authentication factors.

  • Adhere to the principle of least privilege

The principle of least privilege ensures that users are granted the minimum level of access necessary to perform their tasks. By limiting access rights, businesses can minimise the potential damage caused by compromised accounts and prevent unauthorised access to sensitive data.

  • Enhance security posture with AI capabilities

The integration of AI capabilities into cloud data protection and security solutions will significantly enhance efficiency. These tools not only alleviate tedious tasks but also swiftly identify patterns, trends and anomalies that might otherwise be undetected and autonomously adjust security parameters—such as multifactor authentication and multi-person authentication—to lock down access to data and protect it against attacks.

Hybrid cloud strategies are opening new doors for businesses looking to keep their competitive edge in a rapidly evolving market. Done right, businesses can optimise their operations by combining the flexibility of public clouds with the security and control of private clouds.

Embracing these new pathways necessitate proactive data monitoring and management. Effective data management, with expanded AI-driven capabilities to strengthen cyber resilience, is essential to fully harness the benefits of a hybrid cloud environment while mitigating potential risks.

Editor’s note: e27 aims to foster thought leadership by publishing views from the community. Share your opinion by submitting an article, video, podcast, or infographic.

Join us on InstagramFacebookX, and LinkedIn to stay connected.

We’re building the most useful WA community for founders and enablers. Join here and be part of it.

Image courtesy: Canva Pro

The post Navigating hybrid cloud strategies: Enhancing cybersecurity for businesses in the APAC region appeared first on e27.

Posted on

Why AI security demands a different playbook in Asia

AI adoption across Asia is exploding. The region is now second only to North America in generative AI implementation, with spending projected to reach US$110 billion by 2028.

From tech giants in South Korea to manufacturers in Japan and finance firms in Singapore, AI is being rapidly integrated across key sectors.

Yet with this growth comes risk. Organisations aren’t just facing cyber threats anymore. They’re confronting something new and sneaky: adversarial threats specific to AI systems. These threats bypass traditional (cyber)security tools and expose fundamental weaknesses in how AI models are designed, used, and governed.

That’s where AI security comes in. And it’s not the same as cybersecurity.

Traditional cybersecurity tools can’t stop AI threats

AI security focuses on defending AI systems from manipulation. This includes input tampering, training data poisoning, and jailbreak prompts that exploit model behaviour, all without needing to breach a firewall or exploit a software bug.

Take prompt injection, for instance. An attacker can craft a seemingly harmless message that causes a chatbot to reveal sensitive data or bypass its guardrails. Unlike malware or phishing, these attacks work by exploiting the model’s helpfulness, not its vulnerabilities.

Hence, a starkly different attack approach in both scenarios:

Feature AI manipulation attacks Traditional hacking
Target AI algorithms and datasets Software bugs and network vulnerabilities
Method Alters inputs or corrupts training data Exploits code flaws or network weaknesses
Tools Required May not require direct system access Requires access to targeted systems
Examples Data poisoning, adversarial inputs Malware injection, phishing

Traditional cybersecurity simply isn’t designed to handle AI manipulation attacks. Legacy systems rely on rule-based detections, static infrastructure monitoring, and code-centric threat models.

AI threats move faster, scale wider, and morph with every prompt. The unfortunate outcome of this is that even the best-defended networks can become vulnerable when AI models are exposed.

Asia’s AI threat landscape

Nowhere is this gap more urgent than in Asia. The region’s proximity to China, home to some of the world’s most advanced and affordable AI models such as DeepSeek R1, Baidu ERNIE Series, and Alibaba QWEN Models, creates both opportunity and exposure.

Also Read: How my entrepreneurial failures led me to rethink learning and upskilling

China’s AI tools are increasingly used across borders, yet data stored or processed under Chinese law carries heightened regulatory and espionage risks.

Meanwhile, countries like Singapore, India, Japan, and South Korea are racing to implement AI in every corner of the enterprise. But fast adoption has outpaced governance. Shadow AI—the use of unauthorised AI tools by employees—has surged.

Consider these real-world examples:

  • Samsung chip data leak: In May 2023, Samsung engineers leaked sensitive chip data by pasting code into ChatGPT to troubleshoot. Unaware (or ignoring, who knows?) that inputs could be retained and used to train the model, they exposed proprietary information outside company oversight—a clear case of Shadow AI. Samsung responded by banning external AI tools and began developing internal alternatives.
  • GitHub copilot leak: A caching flaw in GitHub Copilot exposed private code snippets to unintended users. Over 16,000 organisations, including major firms in Asia, were affected. Leaked content included proprietary logic, API keys, and unreleased features. No breach happened, just AI mishandling sensitive data. It’s a sobering example of how AI systems can create security risks without traditional hacking.

These threats aren’t hypothetical. They’re already impacting some of Asia’s most advanced companies.

Shadow AI: The silent breach happening inside Asian enterprises

Shadow AI is the unauthorised use of AI tools outside the purview of IT or security teams. It’s exploding in Asia’s fast-moving economies, where employees turn to tools like ChatGPT, Gemini, or Copilot to move faster and meet tight deadlines.

Here’s the problem:

  • 38 per cent of employees of 7,000 employees surveyed admit to sharing confidential data with AI tools without IT approval.
  • From March 2023 to March 2024, there was a 485 per cent spike in sensitive data input into unauthorised AI applications.
  • In fact, 27.4 per cent of data inputted into AI tools is considered sensitive.
  • And according to IBM, breaches involving shadow AI took an average of 291 days to identify and contain, significantly longer than traditional breaches, resulting in higher costs averaging US$5.27 million per incident.

In places like Singapore, where 66 per cent of businesses say they’re not moving fast enough with AI, the temptation to bypass governance is even higher. Combine that with light-touch regulation in Japan, regulatory gaps in India, and regional competitive pressure, and you get a region-wide surge in invisible risk.

Actionable steps to mitigate AI security risks

Here’s how to assume a better AI security posture in the midst of these risks:

Real-time AI monitoring

You can’t protect what you can’t see. Deploy tools that continuously monitor how AI models are used, what inputs they receive, and what outputs they generate. This is especially critical for detecting prompt injection and data drift that legacy logging won’t catch.

Examples include model observability platforms that track prediction anomalies, latency shifts, and suspicious prompt behaviour in real-time.

Also Read: Levelling the playing field: How AI can transform SME hiring

Shadow AI governance

Catalog all AI tools in use—approved or not. Create an “AI Bill of Materials” to track model versions, data access points, and usage patterns. Block unsanctioned tools at the firewall or via endpoint controls.

Train employees on what’s allowed and why it matters. 90 per cent of shadow AI use comes from non-corporate accounts. That’s a policy failure, not just a technical one.

Token and API hygiene

Manage API tokens like you would encryption keys. Use expiration windows, rotating credentials, and revocation capabilities. Apply least-privilege principles and prevent token reuse across multiple AI environments.

APIs are the connective tissue of AI systems. If compromised, they become the fastest path to your most sensitive models and data.

AI-specific security frameworks

Don’t retrofit existing policies. Adopt AI-native frameworks that account for:

  • Adversarial prompt testing
  • Output validation pipelines
  • Role-based model access
  • Immutable audit trails for training data

Zero Trust principles apply here: Never trust an input, always verify an output.

The patchwork of AI regulations in Asia you can’t ignore

Asia’s data protection landscape is maturing fast, but remains fragmented. Some highlights:

  • Singapore’s PDPA mandates consent and breach reporting, but excludes anonymised data.
  • India’s DPDP Act (2023) imposes consent, localisation, and penalties up to US$6 million.
  • Japan’s APPI applies globally to anyone processing Japanese citizens’ data.
  • China’s PIPL is one of the strictest globally, with limits on cross-border transfers and heavy audit requirements.

More laws are coming. South Korea now regulates high-risk AI. Japan is drafting a Basic Law for Responsible AI. And China is moving toward regulating critical AI systems under national security concerns.

If you operate across Asia, this means:

  • Higher compliance costs
  • More explainability and audit requirements
  • Tighter controls on sensitive data and cross-border transfers

Also Read: Breaking barriers: Empowering women in entrepreneurship with AI and automation

Final thoughts

Cybersecurity protects your perimeter. AI security protects your future. These are not the same job.

If you’re investing in generative AI, you’re already in the risk zone. And if you’re in Asia, that risk is magnified by regulatory ambiguity, workforce behaviour, and geopolitical complexity.

Now is the time to:

  • Benchmark your AI risk surface
  • Monitor models continuously
  • Govern usage at every layer
  • Build policies specifically for AI

AI is transforming Asia’s economy. But without AI security, it may just as easily transform into its biggest liability.

Editor’s note: e27 aims to foster thought leadership by publishing views from the community. Share your opinion by submitting an article, video, podcast, or infographic.

Join us on InstagramFacebookX, and LinkedIn to stay connected. We’re building the most useful WA community for founders and enablers. Join here and be part of it.

Image courtesy: Canva Pro

The post Why AI security demands a different playbook in Asia appeared first on e27.

Posted on

I built multiple MVPs in a month: Here’s what vibe coding really changed

In the past month, I built more products than I would typically ship in a year.

Not mockups. Not pitch decks. Not “coming soon” landing pages. Actual working MVPs.

I didn’t suddenly hire a 50-person engineering team. I didn’t discover a secret growth hack.

I started vibe coding: consciously, deliberately, and with full awareness of the risks.

From “landing page MVPs” to real MVPs

Historically, when founders wanted to test an idea quickly, we launched a landing page.

Collect emails. Measure interest. Then maybe build the product.

But here’s what changed for me this year: With AI-assisted development, the time it takes to build a landing page is now roughly the same time it takes to build a usable MVP.

In the last month alone, I shipped or progressed multiple products concurrently, including:

  • Seraphina AI
  • Cultural and community platforms
  • Games and identity-based apps
  • Marketplace and advertising tools

Each of these would normally take 8-10 weeks minimum to reach a first usable version. Some would’ve taken months. And there’s no way I could’ve done them in parallel as a solo founder before.

Vibe coding isn’t “no-code” — It’s founder-led development

Let’s be clear: Vibe coding doesn’t mean “type vibes, ship magic.”

It means:

  • I still design the system architecture
  • I still create flowcharts and briefs
  • I still review code
  • I still handle security considerations
  • I still document everything

Also Read: Vibe coding: Why Singapore needs more tech built for joy, not just utility

The difference?

I’m briefing an AI the same way I brief my engineers.

If you don’t understand systems, architecture, or product logic, this is dangerous. But that’s true whether your code is written by AI or humans.

Everything is dangerous if you don’t know what you’re doing.

Speed didn’t remove judgment — it amplified it

What surprised me most wasn’t speed. It was agency.

I no longer need to wait weeks just to see if something can exist. I can now go from: Idea → MVP → first dollar → decision … in a single cycle.

This doesn’t eliminate developers. It eliminates mindless iteration, waiting, and guesswork.

The bottleneck is no longer execution. It’s judgment.

The hidden risk most people miss

AI doesn’t magically produce clean code.

Just like human-written code, everything bloats if you’re not disciplined.

“Just because it works doesn’t mean it’s clean or scalable.”

The difference now is that founders who understand:

  • Systems
  • Product flows
  • Real customer feedback

… can iterate faster with ownership.

You can export the code. You can refactor it. You can scale it properly.

The risk isn’t vibe coding. The risk is that founders who think they can skip thinking.

Also Read: The Agency: AI-augmented development in action

What shouldn’t be vibe-coded?

If a system already exists — refined by years of real customer feedback — don’t rebuild it.

I still use my own mature platforms for funnels and operations because you can’t vibe-code lived experience.

AI accelerates new ground. It doesn’t replace battle-tested systems.

The real shift isn’t technical — it’s cognitive

AI didn’t make me lazier. It made me more articulate.

The more I interact with AI, the better I’ve become at:

  • Explaining intent
  • Questioning assumptions
  • Clarifying logic
  • Thinking in systems

We’re not losing thinking skills.

We’re being forced to think more clearly.

A new year, a new baseline

Vibe coding isn’t a trend. It’s not a shortcut. It’s not a replacement for experience.

It’s a new baseline for founders who evolve with the tools.

If you adapt to change, you won’t be replaced. If you don’t — history has already answered that question.

2026 won’t reward the fastest typers. It will reward founders with clarity, judgment, and the courage to build in public — faster than ever before.

Editor’s note: e27 aims to foster thought leadership by publishing views from the community. Share your opinion by submitting an article, video, podcast, or infographic.

Enjoyed this read? Don’t miss out on the next insight. Join our WhatsApp channel for real-time drops.

Image credit: Canva

The post I built multiple MVPs in a month: Here’s what vibe coding really changed appeared first on e27.

Posted on

Atome lines up US$345M debt as Southeast Asia fintechs shun equity

Singapore-based digital finance platform Atome has closed a US$345 million syndicated debt facility, extending its funding capacity as it scales consumer credit products across Southeast Asia.

The new facility is a sizeable increase from the US$200 million raised in 2024 and comes at a time when growth-stage startups in the region are increasingly favouring debt over equity amid a constrained venture capital market.

Also Read: Atome defies market headwinds with 63 per cent income surge, US$4B GMV run rate

The financing was led by HSBC with DBS Bank joining as a co-mandated lead arranger. Other participants in the syndicate include Sumitomo Mitsui Banking Corporation (SMBC), Baiduri Bank, and Cathay United Bank, alongside new lenders Fubon Bank and Shanghai Pudong Development Bank.

Atome said the capital will be used to expand Atome Financial’s regional loan portfolio, including its Buy Now Pay Later (BNPL) offering, consumer lending products, and the Atome Card, primarily across Singapore, Malaysia and the Philippines.

Debt over equity in a tighter funding market

The decision to raise debt reflects a broader shift among Southeast Asian fintechs towards non-dilutive funding as equity financing becomes more selective. With its BNPL business now profitable, Atome has been able to tap bank-led facilities to extend its runway and support new product launches without issuing new shares.

Regional data shows that debt deals in Southeast Asia reached a six-year high of 54 in 2024, driven by a rise in venture debt and private credit as venture capital investment slowed. For growth-stage companies with stable cash flows, debt has emerged as a lower-cost source of capital compared to equity.

Financial performance underpins lender interest

Atome Financial, which houses the group’s BNPL business, Atome Card and Kredit Pintar, reported operating income of US$236 million in FY2024, up 63 per cent year-on-year. Over the same period, gross merchandise volume (GMV) processed across its platforms rose 50 per cent to more than US$2 billion.

Growth continued into 2025. By mid-year, the group’s annualised net revenue had exceeded US$500 million, while annualised GMV reached US$6 billion. In December 2025, Atome recorded its highest monthly GMV to date, posting over 70 per cent year-on-year growth compared with December 2024.

The company reached EBITDA profitability in the first quarter of 2024, supported by BNPL margins and expansion into cards and lending products.

BNPL expansion across Southeast Asia

Atome’s expansion is taking place alongside rapid growth in BNPL adoption across Southeast Asia, driven by rising e-commerce penetration and limited access to traditional credit. In Asia Pacific, the BNPL market is projected to reach US$211.7 billion in 2025, growing 14.5 per cent year-on-year.

Also Read: Scaling with purpose: Atome’s fintech evolution and future outlook

Within Southeast Asia, BNPL-enabled e-commerce spend is expected to grow almost ninefold to US$8.83 billion GMV by 2025. Indonesia accounts for around 58 per cent of regional BNPL spending, while Vietnam, the Philippines and Malaysia are seeing accelerated uptake from smaller bases.

Banking partnerships and regional reach

The latest facility builds on Atome’s existing debt funding base. Previous raises include a US$100 million facility from HSBC in 2023, a US$200 million syndicated facility in 2024, and a US$80 million accordion facility with BlackRock and InnoVen Capital in 2025. The company also has longer-term bank relationships, including a US$500 million, 10-year commitment from Standard Chartered.

Banks involved in these facilities provide syndicated capital, risk oversight and flexibility to scale lending across markets including Singapore, Indonesia, Malaysia and the Philippines.

Credit access for underbanked consumers

Part of Advance Intelligence Group, Atome uses AI-driven credit assessment to underwrite consumer lending in markets where credit card penetration remains below 10 per cent in several countries. Across its platforms, the group has cumulatively disbursed over US$4 billion in financing to consumers and works with thousands of merchants across the region.

The company’s consumer-facing apps have recorded more than 40 million downloads, reflecting sustained demand for alternative credit products in Southeast Asia’s underbanked markets.

Also Read: Atome secures debt funding from EvolutionX to expand credit portfolio, launch new products

Backed by investors including SoftBank Vision Fund 2, Warburg Pincus, Northstar, and EDBI, Atome is positioning its expanding debt base as a way to maintain growth while preserving equity in an increasingly disciplined funding environment.

The post Atome lines up US$345M debt as Southeast Asia fintechs shun equity appeared first on e27.

Posted on

The rise of the ‘hard unicorn’ in Southeast Asia

The era of the “easy unicorn” is officially over in Southeast Asia, replaced by a new standard of efficiency and investor scrutiny. Only two unicorns were created in 2025, a 33 per cent drop from the three minted in 2024.

According to the “SEA Tech Annual Funding Report 2025” by Tracxn, these two new entrants — Supabase and Sygnum — represent a more technical and resilient class of billion-dollar firms than their predecessors.

Also Read: Jakarta trails as Singapore tightens its grip on tech capital

The path to unicorn status has become significantly longer and more capital-intensive. On average, it now takes 3.8 years from a Series A round to reach a US$1 billion valuation, a sharp increase from the 0.7 years seen during the hyper-growth period of 2024.

Furthermore, companies are raising far more capital before reaching the milestone; the average funding before a unicorn round rose to US$281 million, nearly double the US$146 million average of the previous year.

Investor selectivity has also intensified. 2025’s unicorns had an average of 8.5 institutional investors involved before their milestone round, up from 4.7 in 2024. Leading global names such as Coatue, Y Combinator, and Accel were identified as the top investors backing these successful ventures. This suggests that a US$1 billion valuation now requires a “consensus of excellence” from multiple top-tier global firms.

Also Read: Southeast Asia’s startup boom is becoming a closed club

Supabase, an open-source application backend platform, and Sygnum, a digital asset banking specialist, exemplify the trend toward specialised, high-utility technology. Both firms raised substantial sums — US$401 million and US$160 million, respectively — before their unicorn rounds, proving that even in a tighter market, capital is available for “category-defining” players.

Today’s new unicorns are not just fast-growing startups; they are battle-scarred warriors that have had to survive a more rigorous and selective gauntlet than ever before.

The post The rise of the ‘hard unicorn’ in Southeast Asia appeared first on e27.

Posted on

Stocks hit records as crypto pulls back on macro and leverage fears

New highs on January 12 and 13, 2026, were propelled by strong corporate earnings expectations and a wave of optimism ahead of key US inflation data. Beneath the surface of this bullish equity momentum lies a more cautious undercurrent in crypto markets, where macro uncertainty, regulatory delays, and speculative leverage have combined to trigger a short-term retreat.

US equities closed at record levels on Monday. The S&P 500 edged up 0.16 per cent to 6,977.27, the Dow Jones Industrial Average climbed 0.17 per cent to 49,590.20, and the Nasdaq Composite added 0.26 per cent to finish at 23,733.90.

These gains reflected investor confidence in resilient corporate fundamentals and hopes that December’s Consumer Price Index report, due Tuesday, January 13, would show cooling inflation, potentially clearing the path for future Federal Reserve rate cuts. Early Tuesday trading told a slightly different story, with Dow futures dipping as markets paused to reassess.

Also Read: Crypto rebounds as gold hits all-time high and oil surges on Iran tensions

In Asia, the mood remained exuberant. Japan’s Nikkei 225 soared over 3 per cent to an all-time high of 53,540.6, driven by Wall Street’s rally and speculation surrounding domestic political developments. The broader MSCI Asia Pacific Index also reached a record high, underscoring the region’s alignment with global risk-on sentiment.

Meanwhile, commodities responded to rising geopolitical tensions. Gold advanced as a haven amid concerns about political pressure on the Federal Reserve’s independence. At the same time, West Texas Intermediate crude oil rose 0.4 per cent to US$59.75 a barrel, reflecting ongoing unease over potential US intervention in Venezuela.

Against this backdrop, the crypto market moved in the opposite direction, falling 1.24 per cent over the past 24 hours. This decline aligns with a broader weekly decline of 3.31 per cent, despite a modest 1.2 per cent gain over the month.

Three interrelated forces explain the pullback.

First, stronger-than-expected US economic data has dampened expectations for near-term Fed rate cuts. That shift triggered US$454 million in net outflows from crypto investment products last week, with US-linked funds alone shedding US$569 million. The tight correlation between crypto and the Nasdaq 100, currently at +0.78, confirms that digital assets remain highly sensitive to macro liquidity signals.

Second, regulatory progress in Washington stalled. The Senate Agriculture Committee postponed its markup of a major crypto market structure bill to late January, citing the need for further bipartisan negotiations. While not a rejection of reform, the delay prolongs the fog of uncertainty that has long clouded institutional participation. Proposals under discussion, including potential bans on stablecoin yield mechanisms and unresolved governance questions, further complicate an already fragile policy landscape.

Third, excessive leverage amplified the downturn. Bitcoin liquidations spiked to US$50 million in 24 hours, a 73 per cent increase, while total crypto derivatives open interest climbed 18.3 per cent to US$716 billion. This combination suggests that speculative positioning had grown frothy, and even a modest price dip was enough to trigger cascading margin calls. Although funding rates remain slightly positive at +0.0028, signalling lingering bullish sentiment among perpetual traders, the surge in liquidations reveals how quickly sentiment can flip when macro conditions shift.

Also Read: Wallets, not smart contracts, were crypto’s biggest risk in 2025

The current crypto correction should not be mistaken for a structural breakdown. Instead, it reflects the natural recalibration of a maturing asset class responding to real-world catalysts. Equities may celebrate anticipated soft landings and contained inflation, but crypto markets, still tethered to liquidity expectations and policy clarity, react more violently to ambiguity. The coming days will prove pivotal. The CPI release on January 13 could either validate hopes for a dovish pivot or reinforce a higher-for-longer rate narrative. Simultaneously, any movement on the Senate crypto bill would offer much-needed directional clarity.

For now, the divergence between traditional markets and digital assets highlights a critical truth. While both respond to macroeconomic forces, cryptocurrency remains more exposed to regulatory uncertainty and leverage-driven volatility. Investors should watch whether daily liquidations stabilise below US$40 million, a sign that speculative excess is being flushed out without triggering more profound distress. In the longer arc, such corrections are not setbacks but necessary adjustments in a market striving for institutional legitimacy.

Editor’s note: e27 aims to foster thought leadership by publishing views from the community. Share your opinion by submitting an article, video, podcast, or infographic.

Enjoyed this read? Don’t miss out on the next insight. Join our WhatsApp channel for real-time drops.

Image generated via AI.

The post Stocks hit records as crypto pulls back on macro and leverage fears appeared first on e27.

Posted on

Ecosystem Roundup: Atome secures US$345M debt; SEA tightens AI rules; ‘hard unicorns’ rise; SK Telecom curbs AI spam

Atome

Atome’s latest US$345M syndicated debt facility is more than a financing milestone; it is a signal of how Southeast Asia’s fintech winners are recalibrating for a tighter capital cycle.

In a market where equity funding remains selective and valuations are under pressure, Atome’s ability to scale through non-dilutive capital reflects both operational maturity and growing lender confidence.

What stands out is not just the size of the facility, but its timing. Debt is increasingly becoming the preferred instrument for profitable, growth-stage startups with predictable cash flows, and Atome fits that profile squarely.

With its BNPL business already profitable and revenue scaling rapidly, tapping bank-led credit allows the company to extend its lending book without sacrificing ownership or strategic flexibility.

The composition of the syndicate—led by HSBC and DBS, with participation from regional and global banks—also underscores a broader shift. Traditional financial institutions are no longer merely observers of Southeast Asia’s fintech boom; they are active enablers, providing structured capital and governance frameworks to help platforms scale responsibly.

Atome’s expansion across Singapore, Malaysia, and the Philippines aligns with structural demand for alternative credit in underbanked markets, where card penetration remains low and digital consumption continues to rise. If executed well, this debt-led growth strategy could become a blueprint for regional fintechs navigating the post-easy-capital era—prioritising sustainability, discipline, and long-term value creation over rapid dilution-driven expansion.

REGIONAL

Atome lines up US$345M debt as Southeast Asia fintechs shun equity: Atome Financial, which houses the group’s BNPL business, Atome Card and Kredit Pintar, reported operating income of US$236M in FY2024, up 63% YoY. Over the same period, GMV processed across its platforms rose 50% to more than US$2B.

ICEx licence signals Indonesia’s shift from crypto speculation to infrastructure: ICEx’s licensing comes amid rapid growth in Indonesia’s crypto market. As of October 2025, the country recorded 19.08M crypto investors, representing roughly 6.7 to 6.9% of its population of around 280M.

Gojek founder Makarim urges GoTo to speak on Chromebook case: The request was presented in a letter read by Nadiem’s lawyer during a hearing at Jakarta’s Corruption Court on January 12. Makarim is accused of benefiting from US$48M linked to the digitalisation programme at Indonesia’s education ministry between 2019 and 2022.

Malaysia, Indonesia escalate AI oversight with temporary Grok block: The twin actions by Malaysia and Indonesia send a strong signal to global AI developers operating in Southeast Asia: rapid innovation without robust safeguards may invite swift regulatory intervention.

Meta-backed AI sales coaching startup Hupo nets US$10M Series A: Investors include DST Global, Goodwater Capital, and January Capital. Hupo offers AI sales coaching for banking, insurance, and financial services. It claims to serve dozens of customers in Asia Pacific and Europe, including Prudential, AXA, Manulife, HSBC.

Zeya Health wins Antler backing to ease SEA’s healthcare workforce crisis using AI: Antler and unnamed strategic angels invested. With regional staff shortages worsening, Zeya’s AI front desk automates scheduling and follow-ups for clinics across Asia Pacific.

Thai logistics startup Flash Group to exit Malaysia market: The move comes amid rising competition from e-commerce platforms with their own logistics networks and partnerships, putting pressure on independent delivery providers across Southeast Asia.

FEATURES & INTERVIEWS

The rise of the ‘hard unicorn’ in Southeast Asia: The path to unicorn status has become significantly longer and more capital-intensive. On average, it now takes 3.8 years from a Series A round to reach a US$1B valuation, a sharp increase from the 0.7 years seen during the hyper-growth period of 2024.

AI’s biggest bottleneck isn’t intelligence but fragmentation: i10X co-founder: As AI tools proliferate, i10X argues fragmentation—not intelligence—is the real bottleneck, betting on a neutral AI meta-layer where retention, workflows, and habitual usage matter more than hype or raw model performance.

The IPO window is open, and SEA startups are walking through: The region recorded 15 IPOs in 2025, a substantial 67% increase from the nine recorded in 2024. This trend suggests that the region’s most successful companies are increasingly viewing the public markets as their preferred endgame.

Gaming in SEA: Understanding the growing opportunity for SMEs and payment providers: The growth of the gaming industry in SEA signals a larger shift in digital behaviour—one that merges entertainment, commerce, and identity.

Kaspersky: Deepfakes emerge as a top cybersecurity concern for 2026: Deepfakes are no longer limited to manipulated videos of public figures; they are becoming a mainstream technology encountered by employees, consumers and organisations alike.

INTERNATIONAL

Taiwan launches US$3.2B fund to train 500,000 AI talents by 2040: The initiatives include creating a national computing centre and advancing technologies such as silicon photonics, quantum computing, and robotics. The government will roll out AI training courses for the public sector.

UAE fintech Mal raises US$230M to launch AI Islamic digital bank: Mal aims to launch the platform in 2026, targeting both underbanked communities and the global Muslim population. The company does not yet hold a banking or financial services license but is seeking regulatory approvals in multiple markets.

Meta urges Australia to rethink under-16 social media ban: Meta removed nearly 550,000 accounts believed to belong to teens in December. The company argued for industry-wide standards to create safer, age-appropriate experiences online instead of blanket bans.

OpenAI said to acquire healthtech startup Torch for US$60M: Torch was developing an AI-powered system to consolidate patient health data from multiple sources into a single platform. The acquisition follows OpenAI’s recent launch of ChatGPT Health, which allows users to connect medical records and wellness apps to its chatbot.

SK Telecom blocks 1.1B voice spam, phishing calls using AI: In 2024, It introduced an AI model that analyses call patterns to detect and block suspected phishing numbers not yet reported to authorities. The company said it blocked 250M voice spam and phishing calls, a rise of 119% YoY, and 850M spam texts, up 22%.

Meta reportedly to cut 10% of Reality Labs staff: Reality Labs, which has around 15,000 employees, develops products including virtual reality headsets and the metaverse. The layoffs could be announced as soon as December 13, and are expected to primarily affect teams working on the metaverse and related hardware.

MENA VC funding hits record US$3.8B in 2025: The report found that funding in the region rose 74% YoY, led by strong activity in Saudi Arabia and the UAE. Fintech was the most active sector, drawing US$1.2B in 178 deals, while funding for AI startups hit US$820M.

SEMICONDUCTOR

Nvidia, US firm Eli Lilly to launch US$1B AI co-innovation lab: The lab will combine Lilly’s pharmaceutical expertise with Nvidia’s capabilities in AI and computing. The facility will use Nvidia’s BioNeMo platform and Vera Rubin architecture to develop AI models aimed at improving medicine development and production.

Chinese chipmaker GigaDevice jumps over 45% in HK debut: Retail demand for GigaDevice was high, with subscriptions exceeding the allocated shares by 542 times. GigaDevice designs memory chips, microcontroller units, analog chips, and sensor chips for use in consumer electronics, vehicles, and industrial devices.

Nvidia, S Korea ministry to set up AI R&D hub: The science ministry and the chip maker shared a consensus on the need to promptly establish Nvidia’s research and development facility in South Korea and discussed ways to jointly foster AI startups.

AI

AI and the rise of gaming entrepreneurs: AI is reshaping gaming by collapsing the boundaries between players, creators, and entrepreneurs—enabling community-driven creation, diversified monetisation, and independent game development at unprecedented scale and speed.

AI companions: How I learned friendship in the digital age: An exploration of how AI companions are reshaping friendship, alleviating loneliness, and redefining emotional connection—raising new psychological, ethical, and cultural questions about human relationships in an increasingly digital world.

The ASEAN AI rush: Why “move fast and break things” is a dangerous strategy for risk: Southeast Asia is racing to adopt generative AI, but founders risk regulatory, financial, and reputational fallout by neglecting explainability, governance, and operational resilience in high-stakes fintech applications.

THOUGHT LEADERSHIP

Stocks hit records as crypto pulls back on macro and leverage fears: Global equities surged to record highs on earnings optimism and CPI hopes, while crypto markets pulled back amid macro uncertainty, stalled regulation, and leverage-driven liquidations.

Looking beyond the bots: The unsexy digital skills that actually matter in 2026: This year, practical digital skills like data querying, dashboards, no-code automation, and security hygiene offer more leverage than AI hype.

Retail in Asia moves in real time– your data should too: Retail is entering a real-time era where live commerce, seamless omnichannel experiences, and AI-driven personalisation demand instant data streaming to meet rising consumer expectations and stay competitive.

Why hiring is so hard for startups in Southeast Asia: Startup hiring in the region faces structural friction, not talent scarcity, as founders prioritise risk reduction amid cultural, communication, and incentive mismatches in constrained, fast-moving teams.

Crypto rebounds as gold hits all-time high and oil surges on Iran tensions: Crypto markets rebounded as institutional tokenisation, Layer 1 momentum, and macro uncertainty shifted sentiment toward infrastructure-led adoption.

Why retailers must think like tech companies to thrive in a data-driven economy: Retailers that treat data, AI, and cybersecurity as core infrastructure are better positioned to scale and protect trust during peak shopping seasons.

Top 10 UN SDG problem-based sector opportunities for Southeast Asia and Pacific startups in 2026: The region’s biggest startup opportunities in 2026 lie in SDG-aligned, problem-driven innovation, spanning climate, food, energy, health, education, and inclusion-focused sectors with scalable regional impact.

The post Ecosystem Roundup: Atome secures US$345M debt; SEA tightens AI rules; ‘hard unicorns’ rise; SK Telecom curbs AI spam appeared first on e27.

Posted on

Rising trade tensions and fraud risks: Why Asia’s businesses must rethink payment security

As geopolitical tensions flare and protectionist policies re-emerge, the global trade landscape is once again entering turbulent waters. From sky-high tariffs on Chinese goods under the Trump administration to continuing disruptions in cross-border supply chains, businesses in the Asia Pacific (APAC) are bracing for renewed volatility.

But amidst the headlines on trade policy, another crisis is quietly gaining ground – one that is less visible but no less dangerous. For the first time, digital fraud has overtaken traditional fraud in APAC, and now accounts for the majority of the region’s total fraud losses. This is not just a shift in tactics, it is a transformation in how, where and why fraud occurs – and businesses must respond with equal agility. 

This trend is particularly alarming for Asia’s businesses that form the backbone of the region’s economy. Operating with limited financial and human resources, many small and medium-sized enterprises (SMEs) lack dedicated IT departments and robust cybersecurity infrastructures. The Asia Foundation highlights that 78 per cent of micro, small and medium enterprises (MSMEs) in the region have experienced at least one cyber incident in the past year, ranging from phishing scams to ransomware attacks. 

Further compounding the challenge, mid-market companies (MNCs) – while larger in scale – face a unique set of pressures. They typically seek the flexibility and scalability of multi-provider orchestration, advanced fraud management, and localised payment methods to compete effectively across borders. However, like SMEs, they often operate with fewer internal resources than large enterprises, leaving them vulnerable to security gaps and operational inefficiencies.

Further, the mobile-first nature of many Asian markets exacerbates the issue. With 85 per cent of transactions in the region conducted on mobile devices, and 54 per cent of human-initiated fraud attacks targeting these channels, businesses are exposed to threats on platforms they heavily depend upon. Against this backdrop, businesses across Asia are operating in an environment that is uniquely vulnerable to digital fraud. Factors such as limited cybersecurity, accelerated digital adoption and mobile channel dependence, alongside others, combine to create ideal conditions for fraudsters to thrive.

Trade turbulence creates the perfect storm for fraud

At the same time, broader economic turbulence is adding further strain. As trade tensions escalate, companies are struggling to maintain the same level of operational consistency. To keep up, businesses look to recalibrate supply chains at speed – onboarding new vendors and logistics partners, rerouting payments across unfamiliar financial networks and adjusting to volatile FX fluctuations. Each of these changes introduces new points of vulnerability into payment ecosystems, often faster than businesses can secure them.

When coupled with the rise of AI-driven tools, this landscape has created a golden opportunity for fraudsters. Gone are the days of crude, easily detectable scams – today’s fraud is sophisticated, well-timed and often indistinguishable from legitimate activity until it is too late. In many cases, they occur mid-transaction, exploiting the exact moment when urgency overrides scrutiny.

Also Read: Asia’s payments revolution: Why alternative methods matter more than ever

What’s more, the risk is magnified in cross-border commerce, where complex payment flows, multi-jurisdictional compliance and varied fraud profiles make security even harder to standardise. For businesses navigating these waters, fraud is no longer a hypothetical threat – it’s an operational reality. Every cross-border transaction introduces a new layer of risk, whether it is managing unfamiliar payment providers, adapting to fragmented compliance regulations or handling multiple currencies and FX volatilities. 

If that weren’t enough, there’s also the fact that most SMEs today rely on rule-based fraud prevention systems – tools that were designed for yesterday’s threats. These systems can be static, inflexible and prone to false positives that block legitimate transactions while missing real threats. They are also reactive, flagging anomalies only after a breach has occurred or a customer has been lost.

In an environment where both economic policy and fraud tactics can shift overnight, this approach is no longer tenable. Businesses need defenses that are as adaptive as the threats they face.

Meet payment orchestration: Security that scales with uncertainty

In the face of ever-sophisticated digital fraud schemes, AI-powered payment orchestration is redefining what modern payment security and agility looks like. Rather than acting as mere conduits for processing transactions, orchestration platforms have become intelligent control centres, monitoring payment flows, detecting anomalies in real time and dynamically routing decisions based on emerging threats.

By embedding fraud detection directly into the payment journey, orchestration allows businesses to move beyond rigid, static defences. These solutions can proactively intercept suspicious activity mid-transaction and significantly reduce exposure while maintaining a seamless experience for legitimate customers.

Crucially, orchestration not only stops fraud in the moment, it also empowers businesses to remain agile. In a world where geopolitical shifts, regulatory changes or new trade tariffs can instantly disrupt financial networks, orchestration platforms allow companies to pivot quickly without overhauling systems or sacrificing security. In a region as diverse and fast-evolving as APAC, where payment preferences and fraud risks vary dramatically between markets, this flexibility is not just valuable – it is vital.

Coupled with the rise of Generative AI (GenAI), payment orchestration is also taken to a new frontier. Unlike traditional tools, GenAI can be prompted to articulate the reasoning behind flagged transactions, uncover previously undetected patterns and recommend strategic adjustments to fraud prevention logic. This adds a powerful layer of intelligence and transparency to the fraud detection process, making it easier for businesses to understand, trust and act on security signals.

At its core, payment orchestration does not replace existing fraud tools – it enhances them. Rather than building proprietary fraud solutions, orchestration platforms focus on interoperability, bringing together the strongest capabilities in the ecosystem to deliver optimal outcomes in real time. By acting as a central layer that integrates seamlessly with a wide range of best-in-class fraud detection engines, orchestration platforms empower merchants to deploy the fraud providers they trust most within their payment flow.

This modular, plug-and-play approach ensures transactions are screened for risk using the most appropriate tools before being routed for approval, while allowing businesses to stay agile, scale securely and continuously upgrade fraud defenses without being locked into a single provider or system.

Also Read: Optimising cross-border payments for seamless APAC expansion

Beyond identifying threats, GenAI also plays a critical role in recognising legitimate transactions, helping ensure they are processed seamlessly. This dual function – blocking fraud while preserving customer experience – gives businesses greater visibility into their risk landscape and allows for the continuous refinement of security frameworks in real time.

The road ahead: From reactive to proactive security

As we move further into a digital-first economy, the line between commerce and risk is blurring. Fraud is evolving and so must our defences. It is no longer enough to detect fraud after the fact – businesses, regardless of size, must anticipate it. 

With the rise of GenAI, we are entering an era where fraud prevention can be both predictive and prescriptive, identifying weak points in the payment flow before they are exploited and recommending real-time adjustments to logic and routing.

Yuno is exploring the use of GenAI to strengthen operational intelligence and improve user transparency. For example, tools such as Monitors apply GenAI to detect anomalies in real time and reroute transactions through alternative paths, aiming to optimise approval rates and bolster fraud prevention.

In today’s climate, the objective goes beyond reducing fraud. It is about developing a payments infrastructure that is intelligent, responsive, and resilient to disruptions, whether triggered by tariff changes or emerging cyber threats.

Editor’s note: e27 aims to foster thought leadership by publishing views from the community. Share your opinion by submitting an article, video, podcast, or infographic.

Enjoyed this read? Don’t miss out on the next insight. Join our WhatsApp channel for real-time drops.

Image courtesy: Canva Pro

The post Rising trade tensions and fraud risks: Why Asia’s businesses must rethink payment security appeared first on e27.