The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

Regulation (2)

1 min read

Checking the Box

I recently participated in an executive meeting at a bank where we discussed the real value of “checking the box” also known as the bare minimum,...

Read More

2 min read

What You Can do About the Okta Compromise

News this week brought us word of something very disappointing, a breach in a large player in the identity services company, Okta. If I’m being 100%...

Read More

2 min read

Managing the Relationship Between Information Technology and Information Security

It’s easy to use the terms “Information Technology (IT)” and “Information Security (IS)” interchangeably. They are equally important but serve...

Read More

2 min read

Is Your Risk Assessment Authentication & Access Ready?

In August, the FFIEC released new guidance titled “Authentication and Access to Financial Institution Services and Systems”. Because the guidance...

Read More

2 min read

The Regular Risk Assessment Revolution

The cybercriminals are still on top of their game, changing targets and tactics. The work-from-home revolution continues and the drive for automation...

Read More

2 min read

Choosing a Cybersecurity Framework

It is a good practice to identify a cybersecurity framework as part of an institution’s Information Security Program. A framework helps to identify...

Read More

2 min read

FFIEC AIO Manual

FFIEC released a new handbook replacing the previous Operations Booklet with the new Architecture, Infrastructure, and Operations (AIO) Booklet on...

Read More

2 min read

The Powerful GLBA Board Report

When the Gramm-Leach-Bliley Act was implemented, each regulatory agency adopted a set of interagency guidelines and regulations required for...

Read More