The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

1 min read

Case Study: Supplemental CISO ($1.2 Billion in Assets)

This blog post is part two of a three-part series. It is an excerpt from our whitepaper on the Virtual Chief Information Security Officer concept. We hope you find it helpful in visualizing practical applications of outsourcing the Information...

Read More

6 Steps to Secure Remote Access

Remote access has been a concern since the dial-up days of the internet's infancy. But ubiquitous connectivity only increases enterprise security...

Read More

Understanding Small-Business Cyber-Insurance Marketplace

The cyber insurance universe is still in its infancy. There will be many changes over the next couple years on the coverage, reaction procedures,...

Read More

1 min read

Video Blog - CISO Intangibles: Understand the Business

This video is the first of a series on the intangibles of a good CISO, or as some may call them, the soft skills.

Read More

2 min read

FBI IC3 Report: Top Methods of Fraud = Focus on Customer Awareness

It's a bit dated, but a member of our team recently brought up a few statistics from the FBI IC3 2016 Internet Crimes Report (that can be found here:...

Read More

Rethinking what it means to win in security

Are you winning in cybersecurity? Michael Santarcangelo at CSO Online challenges us to rethink what "winning" actually means.

Read More

1 min read

Get the Most Out of your Cybersecurity Assessment Tool

The FFIEC just released their updates for the CAT 1.1. How will you get the most out of it? You go through and answer the questions, but in the end,...

Read More

'Security isn't a special flower; it’s another piece of business, like finance'

A nice article by The Telegraph on the culture of cybersecurity, and what organizations can do to establish or improve their own.

Read More

Video Blog: Our Mission at Bedel Security

I'm excited about starting to sprinkle in some video blogs here and there along with our normal content. My goal with a video blog is to provide...

Read More

1 min read

What you need to know about Petya / Not Petya Malware

You've probably heard about the the latest outbreak of the 'Petya' ransomware. Like WannaCry, this is a worm-enabled ransomware, so it can spread...

Read More