The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

Access & Authentication

Bedel Security Friday5 graphic on identity as the new perimeter in cybersecurity.

2 min read

Identity Is the New Perimeter

For years, cybersecurity strategies were built around a clear boundary: the network perimeter. Firewalls, intrusion detection systems, and network...

Read More

2 min read

Rising Insider Threats: Causes and Countermeasures

Insider threats are becoming an increasingly serious issue for financial institutions, often developing quietly but with potentially severe...

Read More

2 min read

The Wild, Untamed, and Exciting World of Passkeys

In today's digital landscape, securing user authentication is more critical than ever. Recently, I explored the benefits of using Yubikeys and...

Read More

1 min read

Is Your M365 Conditional Access Unconditional?

As attackers are finding new ways to get around multifactor authentication in Microsoft 365, conditional access is becoming more important....

Read More

2 min read

“Banking” on Zero Trust: An Essential Shift in Cybersecurity

Ever heard Rick Howard's analogy of networks being like M&M candies? Imagine a hard exterior shell but with a soft, less secure core. Traditional...

Read More

1 min read

Cloud Security Challenges

As financial institutions increasingly embrace the benefits of cloud computing, the importance of cloud security cannot be understated. While the...

Read More

2 min read

Addressing the MOVEit Vulnerability: Actions for Financial Institutions

Financial institutions rely on numerous third-party providers to support their operations and deliver essential services. However, these partnerships...

Read More

3 min read

5 Steps to Utilizing Key Controls

Recently we’ve received a number of requests for “Key Controls” from auditors or examiners for the financial institutions we work with. Fortunately,...

Read More

2 min read

5 Things I Learned at a Bank IT Conference

I recently had the opportunity to attend, and speak at, the Southeast Community Bank I.T. Rightsourcing Conference in Georgia. It was a great 1-day...

Read More

2 min read

Corporate Account Takeovers

I want to talk about something that’s been on my mind a lot lately: corporate account takeover (CATO). As someone who has worked in the cybersecurity...

Read More