The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

3 min read

5 Predictions for the Future of Banking as a Service

If you keep up with the banking industry, then you’ve certainly heard about the significant events in the past several months bringing a lot of attention to fintech, specifically Banking as a Service (BaaS). Headlines have been dominated by news of...

Read More

3 min read

CrowdStrike and Supply Chain Risk Management—What Can we Learn From this Experience?

Wow, how much technology has changed in the past 15 years? I remember when “vendor” reviews were uncommon, technology was hosted in-house in 95% of...

Read More

2 min read

The Superpower of Consistency in Cybersecurity

In the ever-evolving world of financial services, where cyber threats are a constant and compliance mandates tighten, the importance of a robust...

Read More

2 min read

Control Assessments Vs. Risk Assessments

When we first start working with new institutions, it is not unusual for us to see them struggling because they have focused their efforts on...

Read More

2 min read

Preparing for the Unexpected: Crafting an Effective Incident Response Program

In the rapidly evolving and dynamic business landscape, it is crucial for financial institutions to have and maintain an effective Incident Response...

Read More

2 min read

The Parallels of Little League Coaching and Managing Cybersecurity Risk in Financial Institutions

In the seemingly disparate worlds of coaching little league baseball and managing cybersecurity risk within financial institutions, striking...

Read More

2 min read

Don't Forget the Bank Service Company Act

Let’s discuss an old regulation that seems to be picking up new life in recent regulatory examinations, the Bank Service Company Act (BSCA). This Act...

Read More

2 min read

Artificial Intelligence–How will it be regulated

Institutions are looking at services using Artificial Intelligence (AI), such as loan decisioning, resume review, and process automation. Using these...

Read More

1 min read

Enhancing Productivity in Information Security: Small Wins, Big Gains

In a previous post, we explored the transition from a reactive to a proactive approach in managing an information security program. Building on that,...

Read More