The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

Information Security Program

2 min read

5 Simple Steps to a Proactive Information Security Program

If your Information Security Program feels more like you’re constantly putting out fires than preventing them, you’re not alone. Many community banks...

Read More

1 min read

A Strong Defense Wins Championships—and Protects Your Data

In football, it’s often said that defense wins championships. The same principle applies to information security: the strength of your defensive...

Read More

2 min read

Cracking Codes and Crushing Rocks: What Geology Can Teach Us About Cryptography

At first glance, geology and cryptography may seem worlds apart—one is the study of rocks, layers, and the passage of deep time; the other, the...

Read More

2 min read

Building Resilience Against Nation-State Actors

Given the current international climate, it is critical to maintain vigilant and ongoing monitoring of both cyber and physical threats to the...

Read More

3 min read

Does Simulated Phishing Training Actually Work?

This has been a very interesting question since we’ve started phishing training, which for me was around 2016. So, for about ten years, I’ve heard...

Read More

2 min read

Using RACI Charts to Strengthen Risk Management and InfoSec Programs

Without defined roles, critical tasks like policy reviews, incident response, and business continuity planning, or risk assessments can be overlooked...

Read More

2 min read

How AI will Impact Information Security

Artificial Intelligence (AI) is continuing to evolve, and more institutions are implementing it in different ways, such as chatbots, automation of...

Read More

5 min read

AI Model Risk Management in Financial Institutions

Today we’ll discuss our newest and perhaps most ubiquitous buzzword: AI (Artificial Intelligence). Identifying and mitigating risks of AI are...

Read More

2 min read

In a World of Emerging Technology, One Truth Remains

Artificial intelligence, quantum computing, cryptocurrency, banking as a service - there’s no shortage of new technology shaking up the financial...

Read More

3 min read

Kingdom Building in Information Security: The Risks of Tool Overload

A common theme among financial institutions is the attempt to keep up with the evolving threat landscape through the acquisition of the latest and...

Read More