The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

2 min read

NIST Cybersecurity Framework 2.0 Draft Updates

The NIST Cybersecurity Framework (CSF) was initially developed in 2014 and was intended to be a living document, dependent on feedback from stakeholders. It was initially developed for critical infrastructure, such as hospitals and banking. It has...

Read More

1 min read

Congratulations Errica Padgett, vCISO Senior Advisor!

The Bedel Security Team is excited to announce the promotion of our very own Errica Padgett, CISSP to vCISO Senior Advisor!

Read More

1 min read

Is Your M365 Conditional Access Unconditional?

As attackers are finding new ways to get around multifactor authentication in Microsoft 365, conditional access is becoming more important....

Read More

2 min read

Banks, Credit Unions, and AI; OH MY: Beyond Cybersecurity AI Danger

Picking up from where we left off, while the cybersecurity aspects of Generative AI are paramount, the journey of understanding its integration into...

Read More

1 min read

Welcome to The Bedel Security Team Cinda Reardon!

We are thrilled to announce our newest Bedel Security team member, Administrative Manager, Cinda Reardon!

Read More

1 min read

The AI Arms Race

Today, I want to dive into a topic that’s been keeping me up at night: the AI (artificial intelligence) arms race happening right under our noses....

Read More

2 min read

Demystifying Policy, Procedures, and Standards: Understanding the Differences Matters

In every aspect of life, from managing a company to navigating through traffic, guidelines play a crucial role in maintaining order and achieving...

Read More

4 min read

How to Manage a CISO to Avoid Burnout

This blog post is intended for anyone managing a chief information security officer (CISO) or looking to fill the CISO role. This might also be...

Read More

2 min read

Business Email Compromise: Attacks Immune to Multi-Factor Authentication

They’ve come back around…those business email compromises, which were all too common in the late 2010s.

Read More