The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

1 min read

Phishing, But Make It AI: Why You’re More Likely to Click — And What to Do About It

Remember the phishing emails of yesteryear? Misspelled words, weird formatting, maybe a Nigerian prince or two?

Read More

2 min read

From Compliance to Confidence

Building a Risk-Based Information Security Program for Community Banks For many community banks, passing a regulatory exam can feel like a victory...

Read More

2 min read

Using RACI Charts to Strengthen Risk Management and InfoSec Programs

Without defined roles, critical tasks like policy reviews, incident response, and business continuity planning, or risk assessments can be overlooked...

Read More

3 min read

Strengthening Cybersecurity with a Single Source of Truth

In the current cybersecurity landscape, organizations generate and rely on vast amounts of data from various tools, systems, and platforms. Without a...

Read More

2 min read

How Financial Institutions Can Get Ahead of 2025 Cybersecurity Exams

If you work in a bank or credit union, you already know the expectations have changed. Regulators aren’t just asking whether you have cybersecurity...

Read More

4 min read

Beyond the CAT: Building on a Foundation That Lasts

Introduction As most bankers know by now, the FFIEC Cybersecurity Assessment Tool (CAT), first released in 2015, will officially sunset on August 31,...

Read More

2 min read

How AI will Impact Information Security

Artificial Intelligence (AI) is continuing to evolve, and more institutions are implementing it in different ways, such as chatbots, automation of...

Read More

1 min read

Congratulations, Kenyatta Smith!

We are excited to announce that Kenyatta Smith will transition from vCISO Specialist to IT Developer within Bedel Security.

Read More

3 min read

Is it Time to Go Passwordless?

For years, having long and complex passwords has been ingrained in us as a requirement, so it may seem strange to consider eliminating passwords...

Read More

2 min read

Third-Party Risk Management: Properly Rating Inherent Risk

Whether it’s outsourcing core functions or leveraging specialized technology, working with third parties can introduce significant risks. To mitigate...

Read More