The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

2 min read

Guidance on Obsolete Encryption Protocols

Networks rely on encryption to ensure that data is kept private and cannot be changed while at rest or in transit. In most cases this encryption utilizes certificates, and these certificates in turn rely on encryption protocols such as SSL/TLS.

Read More

3 min read

SolarWinds: 5 Points to Communicate to Your Board

As most SolarWinds investigations have stabilized, it’s a good time to give the full report to your Board of Directors. They’ve hopefully been...

Read More

2 min read

SolarWinds:  What do we know so far?

Unless you had a really secluded and long holiday vacation, you’ve probably heard about the SolarWinds breach and how it has affected many US...

Read More

2 min read

The Powerful GLBA Board Report

When the Gramm-Leach-Bliley Act was implemented, each regulatory agency adopted a set of interagency guidelines and regulations required for...

Read More

3 min read

Does your Change Management Process Need a Conversion?

We are seeing findings related to change management cropping up in several audit reports this year. Appropriately scoping change management can be...

Read More

1 min read

Thankful

It’s easy in a year like 2020 to focus on what went wrong, what should have been, and what we’ve lost. I get caught in that trap more than I like to...

Read More

1 min read

Introducing Errica Padgett, the Newest Member of The Bedel Security Team

The Bedel Security Team is excited to welcome our newest vCISO Specialist, Errica Padgett. Errica brings 12 years experience in community banking and...

Read More

2 min read

The Perfect Meeting Agenda to Improve IT & Cyber Governance

One of the first things we do when working with a new client is to establish recurring monthly meetings with a set agenda for every meeting. Having...

Read More