The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

4 min read

How to Manage a CISO to Avoid Burnout

This blog post is intended for anyone managing a chief information security officer (CISO) or looking to fill the CISO role. This might also be helpful if you're a CISO, and you feel like this is something you want to share with your manager or...

Read More

2 min read

Business Email Compromise: Attacks Immune to Multi-Factor Authentication

They’ve come back around…those business email compromises, which were all too common in the late 2010s.

Read More

2 min read

“Banking” on Zero Trust: An Essential Shift in Cybersecurity

Ever heard Rick Howard's analogy of networks being like M&M candies? Imagine a hard exterior shell but with a soft, less secure core. Traditional...

Read More

1 min read

Cloud Security Challenges

As financial institutions increasingly embrace the benefits of cloud computing, the importance of cloud security cannot be understated. While the...

Read More

2 min read

Addressing the MOVEit Vulnerability: Actions for Financial Institutions

Financial institutions rely on numerous third-party providers to support their operations and deliver essential services. However, these partnerships...

Read More

2 min read

Reviewing the New Interagency Third-Party Risk Management Guidance

On June 6th, the Federal Reserve, FDIC, and OCC released new interagency guidance on third-party risk management. The new guidance, based on existing...

Read More

1 min read

Password Reuse

Today, I want to discuss a topic that often goes unnoticed but can have far-reaching consequences: password reuse. In this fast-paced digital age,...

Read More

3 min read

5 Steps to Utilizing Key Controls

Recently we’ve received a number of requests for “Key Controls” from auditors or examiners for the financial institutions we work with. Fortunately,...

Read More

2 min read

Insider Cybersecurity Threats: What Financial Institutions Need to Know

Community financial institutions face a wide range of cybersecurity threats, but one of the most concerning is insider threats. Insider threats refer...

Read More