The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

The 5 cyber attacks you're most likely to face

Read More

SSAE-16 / SSAE-18: What's the Difference?

This past spring (as of May 1, 2017), the AICPA updated their Service Organization Controls testing standards from the SSAE-16 to SSAE-18.

Read More

1 min read

3 Questions Successful Security Leaders Should Ask

Today's security executives are increasingly expected to possess a strong business acumen in addition to their expertise in managing risk. This means...

Read More

3 min read

What Benefit is there in a Business Impact Analysis?

So what Benefit is there in a Business Impact Analysis?

Read More

Announcing the Release of our Latest Version of the CAT

We've been getting a lot of emails asking when our newest CAT excel spreadsheet would be released.

Read More

1 min read

Case Study: Supplemental CISO ($1.2 Billion in Assets)

This blog post is part two of a three-part series. It is an excerpt from our whitepaper on the Virtual Chief Information Security Officer concept. We...

Read More

6 Steps to Secure Remote Access

Remote access has been a concern since the dial-up days of the internet's infancy. But ubiquitous connectivity only increases enterprise security...

Read More

Understanding Small-Business Cyber-Insurance Marketplace

The cyber insurance universe is still in its infancy. There will be many changes over the next couple years on the coverage, reaction procedures,...

Read More

1 min read

Video Blog - CISO Intangibles: Understand the Business

This video is the first of a series on the intangibles of a good CISO, or as some may call them, the soft skills.

Read More