The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

Risk

3 min read

Kingdom Building in Information Security: The Risks of Tool Overload

A common theme among financial institutions is the attempt to keep up with the evolving threat landscape through the acquisition of the latest and...

Read More

2 min read

The Cyber Crystal Ball: What’s in Store for Community Financial Institutions in 2025?

“2024 was rough; why should 2025 be any different?” This is the mantra heard in many community banks and credit unions as they brace for the next...

Read More

2 min read

Control Assessments Vs. Risk Assessments

When we first start working with new institutions, it is not unusual for us to see them struggling because they have focused their efforts on...

Read More

2 min read

The Parallels of Little League Coaching and Managing Cybersecurity Risk in Financial Institutions

In the seemingly disparate worlds of coaching little league baseball and managing cybersecurity risk within financial institutions, striking...

Read More

2 min read

Artificial Intelligence–How will it be regulated

Institutions are looking at services using Artificial Intelligence (AI), such as loan decisioning, resume review, and process automation. Using these...

Read More

1 min read

Enhancing Productivity in Information Security: Small Wins, Big Gains

In a previous post, we explored the transition from a reactive to a proactive approach in managing an information security program. Building on that,...

Read More

2 min read

Is Ransomware Dying?

In December 2023 the US Justice Department announced that they had disrupted operations of ALPHV/Blackcat, a ransomware group that was responsible...

Read More

2 min read

Hacker Psychology

Many of you have probably heard the adage that one of the best ways to catch a criminal is to think like one. Recently, I discovered several articles...

Read More

2 min read

Consent Orders Put Focus on Third-Party Risk Management

There have been multiple consent orders issued recently which have made it clear that regulators are starting to enforce new third-party risk...

Read More

3 min read

The Three Lines of Defense

We have referenced this concept in blog posts previously related to growing your Information Security Program and ensuring independence in your...

Read More