The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

2 min read

You've completed the FFIEC's CAT, now what? 6 Tips on an effective remediation plan.

So you've taken the time to complete the Cybersecurity Assessment Tool (CAT) that the FFIEC released last year. And whether you used a spreadsheet, a web application, or the plain old .pdf, you should have come up with an action plan comprised of...

Read More

HealthSouth Round Rock laptop stolen, 1,359 victims

Another healthcare breach that could have been avoided by laptop encryption.

Read More

Are cybercriminals targeting banks with ransomware?

Ransomware is the latest tool in the cybercriminal’s arsenal, but it has, to date, largely been used to target consumers. Could it now be used to hit...

Read More

5 things you need to know about social engineering

Social engineering plays an important part in a significant number of cyberattacks, however big, small or sophisticated the crime is. In fact, as...

Read More

2 min read

Community Bank CISO: New IT Booklet Calls for More Strategic Role

The role of the community bank ISO has seen some changes over the years. The position at one time was thought to only be applicable to the big banks....

Read More

5 Ways to Avoid Health Data Breaches

With healthcare contributing 3 of the 7 largest breaches in 2015, it might be an understatement to say that many healthcare organizations have been...

Read More

Why Regulatory Scrutiny of Banks Will Intensify in 2016

Cyberattacks against U.S. banks will continue to increase in 2016, making cybersecurity oversight and enforcement of anti-money-laundering laws focal...

Read More

CISOs face challenges talking to boards about cyber risks

While chief information security officers are increasingly getting the ear of board members, they are not necessarily communicating security risks...

Read More

2 min read

New FFIEC IT Management Booklet: What your Board Needs to Know

Gone are the days where the Board of Directors at a financial institution could assign the responsibility of Information Security (now called...

Read More

1 min read

Hacker Leaks Customer Data After a United Arab Emirates Bank Fails to Pay Ransom

The hacker, who calls himself Hacker Buba, breached the network of a bank in Sharjah last month identified as Invest Bank by The Daily Dot, and began...

Read More