2 min read
The Bedel Security Blog
Information security expertise exclusively for you.
Sign Up Today
Virtual CISO (2)
![](https://www.bedelsecurity.com/hs-fs/hubfs/Blog%20Photos/Self-Assessing-Authentication-%26-Access-Risk.jpg?width=700&height=372&name=Self-Assessing-Authentication-%26-Access-Risk.jpg)
2 min read
Self-Assessing Authentication & Access Risk
A little over a year ago, banking regulators released the “Authentication and Access to Financial Institution Services and Systems” guidance. Since...
![](https://www.bedelsecurity.com/hs-fs/hubfs/Effective-User-Access-Reviews.jpg?width=700&height=372&name=Effective-User-Access-Reviews.jpg)
1 min read
Effective User Access Reviews
What exactly is a user access review? In its simplest form, this review is a process that certifies that users’ (including vendors’) access within...
![](https://www.bedelsecurity.com/hs-fs/hubfs/Blog%20Photos/HowToChangeYourVirtualCISO.jpg?width=700&height=372&name=HowToChangeYourVirtualCISO.jpg)
3 min read
How to Change Your Virtual CISO (or how to avoid it to begin with)
There’s been an interesting trend in the virtual CISO industry over the last several months.
![](https://www.bedelsecurity.com/hs-fs/hubfs/Tools-to-Check-Out-in-the-Cybersecurity-Resource-Guide.jpg?width=700&height=372&name=Tools-to-Check-Out-in-the-Cybersecurity-Resource-Guide.jpg)
2 min read
Tools to Check Out in the Cybersecurity Resource Guide
Last week, we saw the Federal Financial Institutions Council (FFIEC) announce an update to its Cybersecurity Resource Guide. It was originally...
![](https://www.bedelsecurity.com/hs-fs/hubfs/Blog%20Photos/Preparing-for-a-Security-Incident.jpg?width=700&height=372&name=Preparing-for-a-Security-Incident.jpg)
1 min read
Preparing for a Security Incident
The worst time to develop an Incident Response Plan for dealing with a security incident is during an actual incident. It’s not a matter of “if” but...
![](https://www.bedelsecurity.com/hs-fs/hubfs/Blog%20Photos/5-Lessons-I-Learned-From-Interviewing-A-Crypto-Expert.jpg?width=700&height=372&name=5-Lessons-I-Learned-From-Interviewing-A-Crypto-Expert.jpg)
2 min read
5 Lessons I Learned From Interviewing A Crypto Expert
Last week, I had the chance to interview Wes Spencer, from FifthWall Solutions, on cryptocurrency in community banking. We’ve had so much good...
![](https://www.bedelsecurity.com/hs-fs/hubfs/Blog%20Photos/DoesItAlignWithOurMission.jpg?width=700&height=372&name=DoesItAlignWithOurMission.jpg)
4 min read
Does It Align With Our Mission?
We intend to change the way community banks manage cybersecurity. We intend to build an amazing company where our people can thrive. We intend to...
![](https://www.bedelsecurity.com/hs-fs/hubfs/Blog%20Photos/Where-Does-Managing-Aggregator-Risk-Belong.jpg?width=700&height=372&name=Where-Does-Managing-Aggregator-Risk-Belong.jpg)
2 min read
Where Does Managing Aggregator Risk Belong?
A little over a year ago, bank regulators published new proposed guidance on managing third-party risk. One of the more controversial topics in this...