The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

4 min read

MFA Prompt Bombing: When Multi-Factor Authentication Becomes a Nuisance — and a Risk

Multi-factor authentication (MFA) is widely considered one of the best affordable controls for preventing account takeover. But like every security control, MFA isn’t foolproof — and attackers are creative. One emergent tactic to watch for is MFA...

Read More

3 min read

Managing Bank-wide Change: Why Cybersecurity Should Lead the Conversation

Change is a constant in banking. Whether it’s rolling out a new digital banking platform, upgrading your core, or going through a merger, most banks...

Read More

2 min read

Measuring Cybersecurity That Matters: KRIs Every Financial Institution Should Track

For regulators, auditors, and your board, good cybersecurity isn’t just about having controls in place—it’s about proving they work. That’s where...

Read More

2 min read

5 Simple Steps to a Proactive Information Security Program

If your Information Security Program feels more like you’re constantly putting out fires than preventing them, you’re not alone. Many community banks...

Read More

2 min read

Think outside the Inbox: Combating Modern Social Engineering Threats

Social engineering attacks have long been a critical concern for institutions, with email-based phishing dominating headlines and incident reports....

Read More

2 min read

Ransomware Trends in 2025

Back in May 2024, I wrote that there were signs ransomware might finally be on the decline. I have continued to monitor various sources regarding...

Read More

1 min read

Bedel Security Announces CAT Replacement: CySPOT® CSF+ Built on NIST CSF 2.0

Introduction When the FFIEC held its webinar to announce the sunsetting of the CAT, they were adamant about the NIST-CSF being the "Rosetta Stone"...

Read More

1 min read

A Strong Defense Wins Championships—and Protects Your Data

In football, it’s often said that defense wins championships. The same principle applies to information security: the strength of your defensive...

Read More