The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

Video Blog: Our Mission at Bedel Security

I'm excited about starting to sprinkle in some video blogs here and there along with our normal content. My goal with a video blog is to provide easily consumable snippets (less than 3 minutes) that provide value. Our first project will be a...

Read More

1 min read

What you need to know about Petya / Not Petya Malware

You've probably heard about the the latest outbreak of the 'Petya' ransomware. Like WannaCry, this is a worm-enabled ransomware, so it can spread...

Read More

2 min read

6 Questions to Answer Before Hiring a CISO

"We aren't even quite sure what the position should be doing for us..." is a quote from a bank executive that I recently had a conversation with. He...

Read More

1 min read

Share the Common Sense Security Framework with your Business Customers

A 2012 Small Business Administration survey in the United States found that 99.7% of U.S. employer firms were small businesses. The sheer number of...

Read More

1 min read

Analysis: FFIEC's Update to Cyber Assessment Tool Makes "Baseline" Maturity Easier

A just released update to the Federal Financial Institutions Examination Council's Cybersecurity Assessment Tool will help make meeting regulators'...

Read More

3 min read

The Biggest Mistake Your New CISO Can Make

The CISO position has been around for some time now. Despite that, the role in many organizations is still maturing. Some companies still don't have...

Read More

CAT 1.1: What are the Changes?

On Wednesday, May 31st, the FFIEC sent out a press release announcing updates to its Cybersecurity Assessment Tool (CAT), which has not been updated...

Read More

Is There Too Much Cybersecurity Technology?

Businesses are suffering from an influx of too much security technology packaged into too many solutions offered by too many vendors, says former RSA...

Read More

Phishing Attacks - Do's and Don'ts to Protect Your Company

Our friends over a Rebyc Security recently wrote a post on phishing "Do's and Don'ts".

Read More