Stephanie Goetz

Bedel Security Friday5 graphic on whether hackers use different strategies based on bank institution size.

3 min read

Do Hackers Employ Distinct Strategies Based on Institution Size?

Over the years in my career, I’ve heard assumptions made by leaders that because they are a smaller institution:

Read More
Business handshake illustrating trust and verification in managed security services.

2 min read

Trust but Verify: Managing your Managed Security Service Provider

Perhaps you outsourced your security monitoring and incident response to a reputable firm years ago, or are considering a change to outsource for the...

Read More

2 min read

The Top Five Ways AI Powers Hacks

Several breach report studies have reported the use of Artificial Intelligence (AI) in breach statistics. As of the 2024 report, 16% of breaches...

Read More

2 min read

Think outside the Inbox: Combating Modern Social Engineering Threats

Social engineering attacks have long been a critical concern for institutions, with email-based phishing dominating headlines and incident reports....

Read More

2 min read

Is Switching to Passwordless Authentication Possible with Tools we Already Have?

We are all facing password fatigue, and many institutions we work with are asking for longer passwords and more of them to pair with authenticator...

Read More

3 min read

Does Simulated Phishing Training Actually Work?

This has been a very interesting question since we’ve started phishing training, which for me was around 2016. So, for about ten years, I’ve heard...

Read More

2 min read

How AI will Impact Information Security

Artificial Intelligence (AI) is continuing to evolve, and more institutions are implementing it in different ways, such as chatbots, automation of...

Read More

2 min read

Quantum Computing: Another Huge Leap in Technology

I read about the potential in the pairing Artificial Intelligence (AI) and Quantum computing online this week and the thought of those paired had me...

Read More

2 min read

Five Essential Cybersecurity Tasks to Complete Before Year-End

As we approach the end of the year, it's crucial for institutions to ensure their cybersecurity measures are robust and up to date. We typically put...

Read More

1 min read

Dive into Secure Cloud Configuration with SCuBA

CISA, the US Cybersecurity & Infrastructure Security Agency, began an initiative to help organizations manage cloud risks with the Secure Cloud...

Read More