The Bedel Security Blog
Information security expertise exclusively for you.
Sign Up Today
3 min read
Managing Cybersecurity: Get Away From “No”
I was having a conversation with a colleague this past week (a bank auditor to give you some context). As we were talking about cybersecurity and the...
2 min read
Considerations for Securing Online Meeting Software
It’s safe to say that remote work is here stay. While we are on the verge of opening back up after COVID, people have loved the flexibility that...
2 min read
What is "Best Practice"?
Over the years, I have become wary of the term “best practice” when it is applied to technology and cybersecurity. The term “best practice” is...
3 min read
Vodka Pairings and FinTech
Several weeks ago, I was out with the rest of the Bedel Security staff on a strategic and team building exercise. During our meal we discovered a...
2 min read
Qakbot Malware
Qakbot (also known as Quakbot or Qbot) is a malware strain that has been used to attack financial institutions since 2008. It’s primary target is...
2 min read
Guidance on Obsolete Encryption Protocols
Networks rely on encryption to ensure that data is kept private and cannot be changed while at rest or in transit. In most cases this encryption...
3 min read
SolarWinds: 5 Points to Communicate to Your Board
As most SolarWinds investigations have stabilized, it’s a good time to give the full report to your Board of Directors. They’ve hopefully been...
2 min read
SolarWinds: What do we know so far?
Unless you had a really secluded and long holiday vacation, you’ve probably heard about the SolarWinds breach and how it has affected many US...