The Bedel Security Blog
Information security expertise exclusively for you.
Sign Up Today
Information Security Program (10)

6 min read
Independent Collaboration Part 2: A Framework for Outsourcing IT in Financial Institutions
This article is the second of a 2-part series on building an effective outsourcing strategy for the various components of IT for financial...

2 min read
The Policy Labyrinth
You started with an Information Security Policy that covered the basics. Then one day an auditor walked in and asked to see your Data Destruction...

4 min read
Independent Collaboration Part 1: A Concept for Outsourcing IT in Financial Institutions
It sounds like a total oxymoron: Independent Collaboration. On the Predictive Index, those two words are on opposing ends of the spectrum when it...

2 min read
What is "Best Practice"?
Over the years, I have become wary of the term “best practice” when it is applied to technology and cybersecurity. The term “best practice” is...

3 min read
Vodka Pairings and FinTech
Several weeks ago, I was out with the rest of the Bedel Security staff on a strategic and team building exercise. During our meal we discovered a...

2 min read
The Powerful GLBA Board Report
When the Gramm-Leach-Bliley Act was implemented, each regulatory agency adopted a set of interagency guidelines and regulations required for...