The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

Cybersecurity

2 min read

Ransomware Trends in 2025

Back in May 2024, I wrote that there were signs ransomware might finally be on the decline. I have continued to monitor various sources regarding...

Read More

1 min read

Bedel Security Announces CAT Replacement: CySPOT® CSF+ Built on NIST CSF 2.0

Introduction When the FFIEC held its webinar to announce the sunsetting of the CAT, they were adamant about the NIST-CSF being the "Rosetta Stone"...

Read More

2 min read

Cracking Codes and Crushing Rocks: What Geology Can Teach Us About Cryptography

At first glance, geology and cryptography may seem worlds apart—one is the study of rocks, layers, and the passage of deep time; the other, the...

Read More

3 min read

Cybersecurity is Everyone’s Responsibility in Your Bank

When most people think of cybersecurity, they think of firewalls, antivirus software, or maybe the IT department working behind the scenes. While...

Read More

1 min read

The Rising Threat of Deepfake Technology in Cybersecurity

In recent years, cybercriminals have expanded their toolkit beyond phishing emails and malware to include a newer, more sinister threat—deepfake...

Read More

2 min read

Building Resilience Against Nation-State Actors

Given the current international climate, it is critical to maintain vigilant and ongoing monitoring of both cyber and physical threats to the...

Read More

2 min read

Why the FFIEC CAT Isn’t Your Risk Assessment—And What To Do Instead

With the upcoming sunset of the FFIEC Cybersecurity Assessment Tool (CAT) in less than three months, community banks are beginning to get nervous...

Read More

2 min read

The Wild, Untamed, and Exciting World of Passkeys

In today's digital landscape, securing user authentication is more critical than ever. Recently, I explored the benefits of using Yubikeys and...

Read More

1 min read

Phishing, But Make It AI: Why You’re More Likely to Click — And What to Do About It

Remember the phishing emails of yesteryear? Misspelled words, weird formatting, maybe a Nigerian prince or two?

Read More

2 min read

From Compliance to Confidence

Building a Risk-Based Information Security Program for Community Banks For many community banks, passing a regulatory exam can feel like a victory...

Read More