Are you a superintendent, school board member, or principal who does not want to be blindsided by school security mandates, financial burdens, and potential liability? If so, you will want to learn about a new maneuver, largely driven and influenced by security consultants and vendors, to create a “school security standard” that has potentially significant […] The post ASIS School Security Standard: Heavy on security hardware, products, and technology mandates — and heavy on potential...| School Security
In mid-May 2025, the Consumer Financial Protection Bureau (CFPB) officially withdrew a proposed regulation designed to curb data brokers’ ability to sell personal data, an action that has significantly lowered barriers for malicious actors seeking sensitive information. The rollback poses threats to physical and digital security, especially for high-profile individuals. On June 14, 2025, Vance […] The post Physical, Digital Risks of Unregulated Data Brokers appeared first on BlackCl...| BlackCloak | Protect Your Digital Life™
The tastic RFID thief was created nearly ten years ago, and it only seemed fitting to bring this up again since, well, it still works today. Why does it still work? Well, replacing an entire buildings access control systems is extremely expensive so outdated technology is left since theoretically it [...]| Krptyk
The importance of future-proofing security lies in the time and money you'll save in the long-term.| Ark Systems Inc
Should your business use wired or wireless surveillance cameras? Let's break down wired vs. wireless security cameras.| Pro-Vigil Video Surveillance
Interesting research: “Guillotine: Hypervisors for Isolating Malicious AIs.” Abstract:As AI models become more embedded in critical sectors like finance, healthcare, and the military, their inscrutable behavior poses ever-greater risks to society. To mitigate this risk, we propose Guillotine, a hypervisor architecture for sandboxing powerful AI models—models that, by accident or malice, can generate existential threats to humanity. Although Guillotine borrows some well-known virtualizat...| Schneier on Security
Dive into the results of Pro-Vigil's 2025 State of Physical Security report on rising crime concerns, impacts, evolving strategies, and more.| Pro-Vigil Video Surveillance
Benefits and drawbacks of using the “Stealth Wiegand Data Interpreter” from Practical Physical Exploitation to capture RFID badges.| LRQA Nettitude Labs
NightDragon's Rhombus investment, leading a $45 million round, will help drive go-to-market growth for the cloud-manged physical security company.| NightDragon | Securing our world for tomorrow.
Consumer Reports has analyzed a bunch of popular Internet-connected video doorbells. Their security is terrible. First, these doorbells expose your home IP address and WiFi network name to the internet without encryption, potentially opening your home network to online criminals. […] Anyone who can physically access one of the doorbells can take over the device—no tools or fancy hacking skills needed.| Schneier on Security
Physical security is critical to any security plan. Click to learn how Genea can help you strengthen your physical security.| Genea