The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

Access Reviews

2 min read

4 Steps to Strengthen Your Cybersecurity Program in 2024

As we get ready to usher in the new year, it's essential to assess and enhance your cybersecurity program. Let’s explore four key strategies to...

Read More

1 min read

Is Your M365 Conditional Access Unconditional?

As attackers are finding new ways to get around multifactor authentication in Microsoft 365, conditional access is becoming more important....

Read More

2 min read

“Banking” on Zero Trust: An Essential Shift in Cybersecurity

Ever heard Rick Howard's analogy of networks being like M&M candies? Imagine a hard exterior shell but with a soft, less secure core. Traditional...

Read More

1 min read

The What, Why, and How of Complementary User Entity Controls

Reviewing Complementary User Entity Controls (CUECs) is an important part of any financial institution’s third-party management program. However, we...

Read More

2 min read

Self-Assessing Authentication & Access Risk

A little over a year ago, banking regulators released the “Authentication and Access to Financial Institution Services and Systems” guidance. Since...

Read More

1 min read

Effective User Access Reviews

What exactly is a user access review? In its simplest form, this review is a process that certifies that users’ (including vendors’) access within...

Read More