The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

MFA

4 min read

MFA Prompt Bombing: When Multi-Factor Authentication Becomes a Nuisance — and a Risk

Multi-factor authentication (MFA) is widely considered one of the best affordable controls for preventing account takeover. But like every security...

Read More

3 min read

Is it Time to Go Passwordless?

For years, having long and complex passwords has been ingrained in us as a requirement, so it may seem strange to consider eliminating passwords...

Read More

1 min read

Strengthening the Fort

In an era dominated by digital advancements, the financial industry stands at the forefront of technological innovation. As financial institutions...

Read More

2 min read

Five Findings from the 2023 IBM Security Cost of a Data Breach Report

I was reviewing the 2023 IBM Security Cost of a Data Breach Report this week and wanted to share some findings I found interesting. This report is...

Read More

2 min read

Business Email Compromise: Attacks Immune to Multi-Factor Authentication

They’ve come back around…those business email compromises, which were all too common in the late 2010s.

Read More

2 min read

“Banking” on Zero Trust: An Essential Shift in Cybersecurity

Ever heard Rick Howard's analogy of networks being like M&M candies? Imagine a hard exterior shell but with a soft, less secure core. Traditional...

Read More

1 min read

Password Reuse

Today, I want to discuss a topic that often goes unnoticed but can have far-reaching consequences: password reuse. In this fast-paced digital age,...

Read More

2 min read

Corporate Account Takeovers

I want to talk about something that’s been on my mind a lot lately: corporate account takeover (CATO). As someone who has worked in the cybersecurity...

Read More

1 min read

Three Options to Implement Phish Resistant Multi-Factor Authentication

Since the pandemic and the rise of work at home, we have become very familiar with Multi-Factor Authentication (MFA). Typically, this is implemented...

Read More