The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

Access & Authentication

1 min read

Is Your M365 Conditional Access Unconditional?

As attackers are finding new ways to get around multifactor authentication in Microsoft 365, conditional access is becoming more important....

Read More

2 min read

“Banking” on Zero Trust: An Essential Shift in Cybersecurity

Ever heard Rick Howard's analogy of networks being like M&M candies? Imagine a hard exterior shell but with a soft, less secure core. Traditional...

Read More

1 min read

Cloud Security Challenges

As financial institutions increasingly embrace the benefits of cloud computing, the importance of cloud security cannot be understated. While the...

Read More

2 min read

Addressing the MOVEit Vulnerability: Actions for Financial Institutions

Financial institutions rely on numerous third-party providers to support their operations and deliver essential services. However, these partnerships...

Read More

3 min read

5 Steps to Utilizing Key Controls

Recently we’ve received a number of requests for “Key Controls” from auditors or examiners for the financial institutions we work with. Fortunately,...

Read More

2 min read

5 Things I Learned at a Bank IT Conference

I recently had the opportunity to attend, and speak at, the Southeast Community Bank I.T. Rightsourcing Conference in Georgia. It was a great 1-day...

Read More

2 min read

Corporate Account Takeovers

I want to talk about something that’s been on my mind a lot lately: corporate account takeover (CATO). As someone who has worked in the cybersecurity...

Read More

2 min read

The FDIC InTREX Gets Audited

While the FFIEC has released three major guidance updates since July 2019, the FDIC has not updated its examination program to include the newer...

Read More

1 min read

The What, Why, and How of Complementary User Entity Controls

Reviewing Complementary User Entity Controls (CUECs) is an important part of any financial institution’s third-party management program. However, we...

Read More

3 min read

Discussions Triggered from the LastPass Breach

Over the past month, many have written about the latest LastPass breach. If you have not kept up with the breach, you can see the disclosure from...

Read More