The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

Information Security Program

2 min read

How to Approach Third Party Reviews

One of the most important processes in cybersecurity for financial institutions today is third-party due diligence. However, it is also one of the...

Read More

1 min read

Vendor Data Sharing: Why “Need to Know” Is a Must for Financial Institutions

Vendors play a crucial role in helping financial institutions deliver modern, efficient, and client-focused services. But with every data exchange...

Read More

3 min read

Managing Bank-wide Change: Why Cybersecurity Should Lead the Conversation

Change is a constant in banking. Whether it’s rolling out a new digital banking platform, upgrading your core, or going through a merger, most banks...

Read More

2 min read

Measuring Cybersecurity That Matters: KRIs Every Financial Institution Should Track

For regulators, auditors, and your board, good cybersecurity isn’t just about having controls in place—it’s about proving they work. That’s where...

Read More

2 min read

5 Simple Steps to a Proactive Information Security Program

If your Information Security Program feels more like you’re constantly putting out fires than preventing them, you’re not alone. Many community banks...

Read More

1 min read

A Strong Defense Wins Championships—and Protects Your Data

In football, it’s often said that defense wins championships. The same principle applies to information security: the strength of your defensive...

Read More

2 min read

Cracking Codes and Crushing Rocks: What Geology Can Teach Us About Cryptography

At first glance, geology and cryptography may seem worlds apart—one is the study of rocks, layers, and the passage of deep time; the other, the...

Read More

2 min read

Building Resilience Against Nation-State Actors

Given the current international climate, it is critical to maintain vigilant and ongoing monitoring of both cyber and physical threats to the...

Read More

3 min read

Does Simulated Phishing Training Actually Work?

This has been a very interesting question since we’ve started phishing training, which for me was around 2016. So, for about ten years, I’ve heard...

Read More

2 min read

Using RACI Charts to Strengthen Risk Management and InfoSec Programs

Without defined roles, critical tasks like policy reviews, incident response, and business continuity planning, or risk assessments can be overlooked...

Read More