The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

Biometric Authentication in HSBC Telephone Banking Duped by BBC Reporter

HSBC’s voice ID authentication software designed to prevent bank fraud has been duped by BBC Click reporter Dan Simmons and his non-identical twin, according to a report by BBC News. Simmons created an HSBC account and signed up to the bank’s voice...

Read More

NIST’s new password rules – what you need to know

One of the biggest changes proposed by the new NIST Digital Identity Guidelines is getting rid of mandatory password changes. This would mean no...

Read More

2 min read

Bank Management: 5 Ways a CISO Can Help Drive Innovation

Banks Need Innovation Banks and credit unions are finding themselves in a very competitive landscape. Technology is moving faster than ever. Fintech...

Read More

1 min read

Patch your Microsoft Systems now to Protect Yourself from WannaCry Ransomware

The WannaCry ransomware is bad news. It is known to spread like a worm over the LAN once a machine is infected. Microsoft is urging everyone to...

Read More

2 min read

Are We Relying Too Much On User Awareness In Cybersecurity?

Steven Chabinsky, former Deputy Assistant Directory of Cyber for the FBI, says that we do rely too much on user awareness and we need to do a "180"...

Read More

2 min read

Cybersecurity in Enterprise Risk Management

If you aren't familiar with Enterprise Risk Management, or ERM for short, you should take some time in the near future to do so. Audits and...

Read More

1 min read

Bedel Security Hires Laura Zeck

Bedel Security is pleased to announce the addition of a new full-time team member. Laura Zeck, our Administrative Assistant, is from Terre Haute,...

Read More

1 min read

Cybersecurity And The Board

Juliette Rizkallah recently wrote an article on forbes.com about the evolution of the involvement by the board of directors in cybersecurity. She...

Read More

2 min read

Implement Practical Policies and Processes to Improve Your Cyber Security

Lately, we've been running into cyber security programs and information security programs (ISP) that are elaborate, lengthy, complex, and written...

Read More