The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

Risk Assessment (2)

2 min read

Self-Assessing Authentication & Access Risk

A little over a year ago, banking regulators released the “Authentication and Access to Financial Institution Services and Systems” guidance. Since...

Read More

2 min read

Charging Dr. Ransomware

Moises Luis Zagala Gonzalez, a 55-year-old Venezuelan cardiologist, has been charged with developing the Jigsaw v.2 and Thanos ransomware strains,...

Read More

2 min read

Where Does Managing Aggregator Risk Belong?

A little over a year ago, bank regulators published new proposed guidance on managing third-party risk. One of the more controversial topics in this...

Read More

2 min read

Is Your Risk Assessment Authentication & Access Ready?

In August, the FFIEC released new guidance titled “Authentication and Access to Financial Institution Services and Systems”. Because the guidance...

Read More

2 min read

Keep an Eye on API Security

Application programming interfaces, or APIs, enable applications to exchange data and functionality easily with other applications and users in or...

Read More

2 min read

The Regular Risk Assessment Revolution

The cybercriminals are still on top of their game, changing targets and tactics. The work-from-home revolution continues and the drive for automation...

Read More

2 min read

Breaking the SMS Habit

Multifactor Authentication (MFA) is one of the most important controls to block account takeover fraud. There are many different forms of MFA...

Read More

2 min read

Asset Management Lessons Learned from Morgan Stanley

Asset Management is one of the foundations of a sound Information Security Program, but it is also often neglected in the rush to replace or...

Read More

2 min read

Typ0squatting

We recently have seen an increase in “typosquatting” activity targeting financial institutions. Typosquatting is when someone registers a domain with...

Read More