Page 178 - Cyber Defense eMagazine September 2025
P. 178

Artificial Intelligence in the fintech sector is used for threat detection and prevention, the automation of
            Incident  Response  (IR),  fraud  detection,  risk  assessment  and  vulnerability  management,  as  well  as
            behavioral analysis of insider or external cyber threats.

            Low-Code and No-code Development are fast rising in the contemporary Fintech industry, resolving
            software development challenges. Low-code development platforms allow 61% of users to complete
            custom applications on schedule, within budget, and according to requirements.

            With  features  like  drag-and-drop  tools,  pre-installed  templates,  and  simplified  interfaces,  low-code
            platforms have enhanced software development.



































            Edge Cloud Computing allows for data processing at the “edge” of the network, via the device or a local
            server, reducing latency (Microsoft, 2025). In the fintech industry, Security and regulatory compliance
            laws like GDPR and PCI-DSS enforcing strict data protection must be adhered to, and non-compliance
            can result in significant fines and reputational harm.

            Edge computing aids compliance by processing data locally and minimizing the need to transmit sensitive
            information  over  networks.  This  approach  enhances  data  security,  supports  compliance  with  data
            residency rules, and lowers the risk of cyber threats.



            The Realm of the Cloud in Fintech Operations

            The transition to cloud-native environments has transformed how fintech companies operate by enabling
            scalability, agility, and cost efficiency. However, this transformation has also increased the potential for






            Cyber Defense eMagazine – September 2025 Edition                                                                                                                                                                                                          178
            Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.
   173   174   175   176   177   178   179   180   181   182   183