The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

Zero Trust

Bedel Security Friday5 graphic on identity as the new perimeter in cybersecurity.

2 min read

Identity Is the New Perimeter

For years, cybersecurity strategies were built around a clear boundary: the network perimeter. Firewalls, intrusion detection systems, and network...

Read More
Team of professionals working at computers in a modern office, representing internal cybersecurity risk and governance for community banks

3 min read

Internal vs. External Cyber Threats

Internal vs. External Cyber Threats: Why Internal Risk Defines Cybersecurity Outcomes for Community Banks

Read More

2 min read

Protecting Against AI-Driven Cyber Threats

From phishing scams to ransomware, cybercriminals are increasingly using AI to launch more sophisticated, faster, and harder-to-detect attacks. To...

Read More

2 min read

“Banking” on Zero Trust: An Essential Shift in Cybersecurity

Ever heard Rick Howard's analogy of networks being like M&M candies? Imagine a hard exterior shell but with a soft, less secure core. Traditional...

Read More