The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

2 min read

What is "Best Practice"?

Over the years, I have become wary of the term “best practice” when it is applied to technology and cybersecurity. The term “best practice” is supposed to mean that what is being described aligns with the actions of the best in the industry. The...

Read More

3 min read

Vodka Pairings and FinTech

Several weeks ago, I was out with the rest of the Bedel Security staff on a strategic and team building exercise. During our meal we discovered a...

Read More

2 min read

Qakbot Malware

Qakbot (also known as Quakbot or Qbot) is a malware strain that has been used to attack financial institutions since 2008. It’s primary target is...

Read More

2 min read

Guidance on Obsolete Encryption Protocols

Networks rely on encryption to ensure that data is kept private and cannot be changed while at rest or in transit. In most cases this encryption...

Read More

3 min read

SolarWinds: 5 Points to Communicate to Your Board

As most SolarWinds investigations have stabilized, it’s a good time to give the full report to your Board of Directors. They’ve hopefully been...

Read More

2 min read

SolarWinds:  What do we know so far?

Unless you had a really secluded and long holiday vacation, you’ve probably heard about the SolarWinds breach and how it has affected many US...

Read More

2 min read

The Powerful GLBA Board Report

When the Gramm-Leach-Bliley Act was implemented, each regulatory agency adopted a set of interagency guidelines and regulations required for...

Read More

3 min read

Does your Change Management Process Need a Conversion?

We are seeing findings related to change management cropping up in several audit reports this year. Appropriately scoping change management can be...

Read More