The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

Risk (2)

2 min read

Consent Orders Put Focus on Third-Party Risk Management

There have been multiple consent orders issued recently which have made it clear that regulators are starting to enforce new third-party risk...

Read More

3 min read

The Three Lines of Defense

We have referenced this concept in blog posts previously related to growing your Information Security Program and ensuring independence in your...

Read More

1 min read

Strengthening the Fort

In an era dominated by digital advancements, the financial industry stands at the forefront of technological innovation. As financial institutions...

Read More

2 min read

Holiday Scams

The holiday season is right around the corner, and that means it’s time for festive decorations and lots of quality time with our friends and family....

Read More

2 min read

What is a Good Password Length?

We are often asked what length passwords should be. The answer that we give in general is that we would like user passwords to be at least 14...

Read More

2 min read

NIST Cybersecurity Framework 2.0 Draft Updates

The NIST Cybersecurity Framework (CSF) was initially developed in 2014 and was intended to be a living document, dependent on feedback from...

Read More

2 min read

Addressing the MOVEit Vulnerability: Actions for Financial Institutions

Financial institutions rely on numerous third-party providers to support their operations and deliver essential services. However, these partnerships...

Read More

1 min read

Password Reuse

Today, I want to discuss a topic that often goes unnoticed but can have far-reaching consequences: password reuse. In this fast-paced digital age,...

Read More