The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

Bedel Security Friday5 graphic on identity as the new perimeter in cybersecurity.

2 min read

Identity Is the New Perimeter

For years, cybersecurity strategies were built around a clear boundary: the network perimeter. Firewalls, intrusion detection systems, and network segmentation formed the front line of defense. But that model no longer reflects how modern attacks...

Read More
Bedel Security Friday5 graphic on building a stronger phishing resilience culture at a community bank.

4 min read

Building a Stronger Phishing Resilience Culture

Phishing simulations are nearly universal in community banking. Regulators expect them. Auditors ask about them. Boards see the metrics. Yet despite...

Read More
Welcome banner for vCISO Specialist Aaron Darnall

1 min read

Welcome to The Bedel Security Team Aaron!

The Bedel Security Team is excited to introduce you to its newest team member, vCISO Specialist Aaron Darnall!

Read More
Bedel Security Friday5 graphic on understanding AI bias.

2 min read

Understanding AI Bias

Artificial intelligence is transforming financial services—from credit decisions to fraud detection and hiring. However, because AI systems are built...

Read More
Bedel Security Friday5 graphic on managing cybersecurity with limited resources.

3 min read

Managing Cybersecurity with Limited Resources

If you’re a community bank or credit union, “limited resources” isn’t a temporary condition; it’s your operating model.

Read More
Executives discussing IT and cybersecurity compliance in changing regulatory environment.

2 min read

Changing Regulatory Landscape

Changing Regulatory Landscape: What “Material Financial Risk” Means for IT and Cybersecurity Late in 2025, all three federal banking regulatory...

Read More
Business handshake illustrating trust and verification in managed security services.

2 min read

Trust but Verify: Managing your Managed Security Service Provider

Perhaps you outsourced your security monitoring and incident response to a reputable firm years ago, or are considering a change to outsource for the...

Read More
Residential neighborhood used to illustrate cybersecurity threats from residential proxy networks.

2 min read

The War on Residential Proxy Networks

Financial institutions have long relied on network‑based controls to keep criminals out of Internet Banking systems and other critical...

Read More

1 min read

Welcome to The Bedel Security Team Shane!

The Bedel Security Team is excited to introduce you to its newest team member, Quickbase Developer, Shane Miller!

Read More