home.social

#physical-security — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #physical-security, aggregated by home.social.

fetched live
  1. I attended the AITP Chicago Security SIG tonight at RSM and left with one clear takeaway: a $200 device called Flipper Zero can clone your building access badge and bypass the physical security your organization worked so hard to set up. FBI Chicago Intelligence Analysts and an InfraGard board member explained how these devices work and where organizations are vulnerable. The room was full of security professionals, many of whom had that familiar look, realizing a threat they thought was unlikely is actually much closer to home.
    Here are a few key points from tonight:
    ・ You can buy Flipper Zero on Amazon, and teenagers are posting demo videos on YouTube. If your physical security plan assumes attackers need special equipment, that assumption is no longer true.
    ・ Most enterprise security programs barely address RF-based attacks on access control systems. We invest heavily in endpoint protection and network monitoring, but the badge reader by the server room often gets overlooked.
    ・ Mitigation is practical. Encrypted credentials and multi-factor physical access are real solutions. Most organizations just haven’t made them a priority because the threat seemed remote.

    If you’re a CISO or CIO and haven’t reviewed your physical access controls for RF-based attacks, now is a good time to add it to your to-do list.
    Thank you to AITP Chicago, the FBI, InfraGard, and RSM for a great discussion.

    aitpchicago.com/event-6680905
    #Cybersecurity #PhysicalSecurity #InfraGard #security #privacy #cloud #infosec #flipper0

  2. I attended the AITP Chicago Security SIG tonight at RSM and left with one clear takeaway: a $200 device called Flipper Zero can clone your building access badge and bypass the physical security your organization worked so hard to set up. FBI Chicago Intelligence Analysts and an InfraGard board member explained how these devices work and where organizations are vulnerable. The room was full of security professionals, many of whom had that familiar look, realizing a threat they thought was unlikely is actually much closer to home.
    Here are a few key points from tonight:
    ・ You can buy Flipper Zero on Amazon, and teenagers are posting demo videos on YouTube. If your physical security plan assumes attackers need special equipment, that assumption is no longer true.
    ・ Most enterprise security programs barely address RF-based attacks on access control systems. We invest heavily in endpoint protection and network monitoring, but the badge reader by the server room often gets overlooked.
    ・ Mitigation is practical. Encrypted credentials and multi-factor physical access are real solutions. Most organizations just haven’t made them a priority because the threat seemed remote.

    If you’re a CISO or CIO and haven’t reviewed your physical access controls for RF-based attacks, now is a good time to add it to your to-do list.
    Thank you to AITP Chicago, the FBI, InfraGard, and RSM for a great discussion.

    aitpchicago.com/event-6680905
    #Cybersecurity #PhysicalSecurity #InfraGard #security #privacy #cloud #infosec #flipper0

  3. I attended the AITP Chicago Security SIG tonight at RSM and left with one clear takeaway: a $200 device called Flipper Zero can clone your building access badge and bypass the physical security your organization worked so hard to set up. FBI Chicago Intelligence Analysts and an InfraGard board member explained how these devices work and where organizations are vulnerable. The room was full of security professionals, many of whom had that familiar look, realizing a threat they thought was unlikely is actually much closer to home.
    Here are a few key points from tonight:
    ・ You can buy Flipper Zero on Amazon, and teenagers are posting demo videos on YouTube. If your physical security plan assumes attackers need special equipment, that assumption is no longer true.
    ・ Most enterprise security programs barely address RF-based attacks on access control systems. We invest heavily in endpoint protection and network monitoring, but the badge reader by the server room often gets overlooked.
    ・ Mitigation is practical. Encrypted credentials and multi-factor physical access are real solutions. Most organizations just haven’t made them a priority because the threat seemed remote.

    If you’re a CISO or CIO and haven’t reviewed your physical access controls for RF-based attacks, now is a good time to add it to your to-do list.
    Thank you to AITP Chicago, the FBI, InfraGard, and RSM for a great discussion.

    aitpchicago.com/event-6680905
    #Cybersecurity #PhysicalSecurity #InfraGard #security #privacy #cloud #infosec #flipper0

  4. I attended the AITP Chicago Security SIG tonight at RSM and left with one clear takeaway: a $200 device called Flipper Zero can clone your building access badge and bypass the physical security your organization worked so hard to set up. FBI Chicago Intelligence Analysts and an InfraGard board member explained how these devices work and where organizations are vulnerable. The room was full of security professionals, many of whom had that familiar look, realizing a threat they thought was unlikely is actually much closer to home.
    Here are a few key points from tonight:
    ・ You can buy Flipper Zero on Amazon, and teenagers are posting demo videos on YouTube. If your physical security plan assumes attackers need special equipment, that assumption is no longer true.
    ・ Most enterprise security programs barely address RF-based attacks on access control systems. We invest heavily in endpoint protection and network monitoring, but the badge reader by the server room often gets overlooked.
    ・ Mitigation is practical. Encrypted credentials and multi-factor physical access are real solutions. Most organizations just haven’t made them a priority because the threat seemed remote.

    If you’re a CISO or CIO and haven’t reviewed your physical access controls for RF-based attacks, now is a good time to add it to your to-do list.
    Thank you to AITP Chicago, the FBI, InfraGard, and RSM for a great discussion.

    aitpchicago.com/event-6680905
    #Cybersecurity #PhysicalSecurity #InfraGard #security #privacy #cloud #infosec #flipper0

  5. I attended the AITP Chicago Security SIG tonight at RSM and left with one clear takeaway: a $200 device called Flipper Zero can clone your building access badge and bypass the physical security your organization worked so hard to set up. FBI Chicago Intelligence Analysts and an InfraGard board member explained how these devices work and where organizations are vulnerable. The room was full of security professionals, many of whom had that familiar look, realizing a threat they thought was unlikely is actually much closer to home.
    Here are a few key points from tonight:
    ・ You can buy Flipper Zero on Amazon, and teenagers are posting demo videos on YouTube. If your physical security plan assumes attackers need special equipment, that assumption is no longer true.
    ・ Most enterprise security programs barely address RF-based attacks on access control systems. We invest heavily in endpoint protection and network monitoring, but the badge reader by the server room often gets overlooked.
    ・ Mitigation is practical. Encrypted credentials and multi-factor physical access are real solutions. Most organizations just haven’t made them a priority because the threat seemed remote.

    If you’re a CISO or CIO and haven’t reviewed your physical access controls for RF-based attacks, now is a good time to add it to your to-do list.
    Thank you to AITP Chicago, the FBI, InfraGard, and RSM for a great discussion.

    aitpchicago.com/event-6680905
    #Cybersecurity #PhysicalSecurity #InfraGard #security #privacy #cloud #infosec #flipper0

  6. Hardware shortages are killing deals. Quotes expire, lead times stretch, clients walk. 🔧

    TetherX runs on whatever you can source - spare servers, refurb gear, even a Raspberry Pi. Quote Monday, install Friday.

    Same platform. Same features. Any hardware, any camera brand, any site size.

    No forklift upgrade when stock returns. Just scale.

    What's the longest lead time that's cost you a job recently?

    #VideoSurveillance #SecurityIntegrators #PhysicalSecurity #TetherX

  7. Phones stolen at TSA checkpoints — a place where you literally hand over your belongings and can't watch them closely. The threat model most people never think about: not a sophisticated hacker, just a crowded, distracted moment. Physical security and digital security are the same problem wearing different shoes. 👟🔐 #infosec #OSINT #physicalsecurity
    slashgear.com/2160128/phone-th

  8. WindEurope: Offshore Wind Security Must Be Core to Europe’s Energy Strategy – News and Statistics

    Apr 24, 2026 A new policy document from WindEurope, released today, argues that the physical safeguarding of wind…
    #Europe #EU #CriticalInfrastructure #energysecurity #Hybridthreats #NorthSea #offshorewind #physicalsecurity #windinfrastructure #WindEurope
    europesays.com/europe/22172/

  9. Protecting Europe’s wind farms: no energy security without physical security of energy infrastructure

    Wind energy has grown to become a key feature of Europe’s energy system. Wind farms underpin our energy…
    #Europe #EU #offshore #physicalsecurity
    europesays.com/europe/21175/

  10. Physical Security Lapses Expose Sensitive Servers

    Your cybersecurity is only as strong as the physical locks on your servers - and a recent case where a server-room lock proved laughably easy to bypass is a stark reminder of this often-overlooked vulnerability. Leaving sensitive servers exposed is like leaving a car with cash in the console unlocked - it's an open invitation…

    osintsights.com/physical-secur

    #PhysicalSecurity #ServerSecurity #Cybersecurity #EmergingThreats #VulnerabilityManagement

  11. Physical Security Lapses Expose Sensitive Servers

    Your cybersecurity is only as strong as the physical locks on your servers - and a recent case where a server-room lock proved laughably easy to bypass is a stark reminder of this often-overlooked vulnerability. Leaving sensitive servers exposed is like leaving a car with cash in the console unlocked - it's an open invitation…

    osintsights.com/physical-secur

    #PhysicalSecurity #ServerSecurity #Cybersecurity #EmergingThreats #VulnerabilityManagement

  12. Why a Locked Floppy Disk Could Be Safer Than a Modern Network

    Photo by CCDBarcodeScanner, licensed CC BY-SA 4.0 via Wikimedia Commons.

    Dear Cherubs, in the 1990s, office security had the elegance of a locked drawer and the threat model of a very determined coat thief. Floppy disks were the workhorses of the era, and Britannica notes they were popular from the 1970s until the late 1990s, made of flexible plastic coated with magnetic material. Before the internet became an everyday business utility, many workplaces were still mostly offline; Pew Research found that in 1995 only 14% of U.S. adults had internet access, and 42% had never heard of it.

    THE LOCKED-BOX LOGIC

    If your payroll files, drafts, and backups lived on removable media, the cleanest security move was physical control. Put the disks in a cabinet, lock the cabinet, and hope nobody on the third floor had a master key and a curious streak. It was a blunt system, but it worked because access was local, slow, and obvious. If someone needed a copy, they usually had to walk over, ask, sign something, and maybe endure a suspicious look from whoever guarded the supply room.

    That is the part people forget when they romanticize the old days. The security was not magical; the attack surface was just tiny. To steal the data, someone usually had to be in the building, or at least within arm’s reach of the media. Annoyingly low-tech, yes. Also annoyingly effective.

    MODERN SECURITY, NEW PROBLEMS

    Once files moved onto networks and cloud systems, the game changed. NIST defines intrusion detection as monitoring events in a system or network for signs of possible incidents, and says intrusion prevention systems can also try to stop them. CISA says firewalls shield computers and networks from malicious or unnecessary traffic, while NIST says cryptography is used to protect sensitive digitized information during transmission and while in storage. In other words: the modern office traded one locked box for a whole stack of digital locks, alarms, and panic buttons.

    Of course, the modern setup has its own virtues. Data can be backed up automatically, shared instantly, and protected with layered controls that the floppy-disk era never needed. NIST’s storage-encryption guidance still says organizations should physically secure devices and removable media, which is a polite way of saying: the box still matters, even when the box now lives in a server rack. Security did not become less important; it became more complicated, which is basically the same thing with extra meetings.

    So yes, a locked plastic box full of floppies could be safer than a badly configured internet-facing system. But that is not because the past was wiser. It is because the past had fewer doors, fewer windows, and fewer strangers trying every handle on the planet at once. Security has always been a trade-off between convenience and control; we just used to do the math with keys instead of passwords.

    Sources:
    Britannica — https://www.britannica.com/technology/floppy-disk
    Pew Research Center — https://www.pewresearch.org/internet/2014/02/27/part-1-how-the-internet-has-woven-itself-into-american-life/
    NIST SP 800-94 — https://csrc.nist.gov/pubs/sp/800/94/final
    CISA firewalls — https://www.cisa.gov/news-events/news/understanding-firewalls-home-and-small-office-use
    NIST SP 800-175B Rev. 1 — https://csrc.nist.gov/pubs/sp/800/175/b/r1/final
    NIST SP 800-111 — https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf
    Wikimedia Commons image page — https://commons.wikimedia.org/wiki/File:Floppy_Disk_HD.jpg

    The Thisclaimer logo blends a classic warning symbol with a brain icon to represent critical thinking, curiosity, and thoughtful disclaimers. #cybersecurity #dataSecurity #encryption #firewalls #floppyDisks #internet #internetHistory #intrusionDetection #officeHistory #openSource #physicalSecurity #techNostalgia #technology #ubuntu #wordpress
  13. Why a Locked Floppy Disk Could Be Safer Than a Modern Network

    Photo by CCDBarcodeScanner, licensed CC BY-SA 4.0 via Wikimedia Commons.

    Dear Cherubs, in the 1990s, office security had the elegance of a locked drawer and the threat model of a very determined coat thief. Floppy disks were the workhorses of the era, and Britannica notes they were popular from the 1970s until the late 1990s, made of flexible plastic coated with magnetic material. Before the internet became an everyday business utility, many workplaces were still mostly offline; Pew Research found that in 1995 only 14% of U.S. adults had internet access, and 42% had never heard of it.

    THE LOCKED-BOX LOGIC

    If your payroll files, drafts, and backups lived on removable media, the cleanest security move was physical control. Put the disks in a cabinet, lock the cabinet, and hope nobody on the third floor had a master key and a curious streak. It was a blunt system, but it worked because access was local, slow, and obvious. If someone needed a copy, they usually had to walk over, ask, sign something, and maybe endure a suspicious look from whoever guarded the supply room.

    That is the part people forget when they romanticize the old days. The security was not magical; the attack surface was just tiny. To steal the data, someone usually had to be in the building, or at least within arm’s reach of the media. Annoyingly low-tech, yes. Also annoyingly effective.

    MODERN SECURITY, NEW PROBLEMS

    Once files moved onto networks and cloud systems, the game changed. NIST defines intrusion detection as monitoring events in a system or network for signs of possible incidents, and says intrusion prevention systems can also try to stop them. CISA says firewalls shield computers and networks from malicious or unnecessary traffic, while NIST says cryptography is used to protect sensitive digitized information during transmission and while in storage. In other words: the modern office traded one locked box for a whole stack of digital locks, alarms, and panic buttons.

    Of course, the modern setup has its own virtues. Data can be backed up automatically, shared instantly, and protected with layered controls that the floppy-disk era never needed. NIST’s storage-encryption guidance still says organizations should physically secure devices and removable media, which is a polite way of saying: the box still matters, even when the box now lives in a server rack. Security did not become less important; it became more complicated, which is basically the same thing with extra meetings.

    So yes, a locked plastic box full of floppies could be safer than a badly configured internet-facing system. But that is not because the past was wiser. It is because the past had fewer doors, fewer windows, and fewer strangers trying every handle on the planet at once. Security has always been a trade-off between convenience and control; we just used to do the math with keys instead of passwords.

    Sources:
    Britannica — https://www.britannica.com/technology/floppy-disk
    Pew Research Center — https://www.pewresearch.org/internet/2014/02/27/part-1-how-the-internet-has-woven-itself-into-american-life/
    NIST SP 800-94 — https://csrc.nist.gov/pubs/sp/800/94/final
    CISA firewalls — https://www.cisa.gov/news-events/news/understanding-firewalls-home-and-small-office-use
    NIST SP 800-175B Rev. 1 — https://csrc.nist.gov/pubs/sp/800/175/b/r1/final
    NIST SP 800-111 — https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf
    Wikimedia Commons image page — https://commons.wikimedia.org/wiki/File:Floppy_Disk_HD.jpg

    The Thisclaimer logo blends a classic warning symbol with a brain icon to represent critical thinking, curiosity, and thoughtful disclaimers. #cybersecurity #dataSecurity #encryption #firewalls #floppyDisks #internet #internetHistory #intrusionDetection #officeHistory #openSource #physicalSecurity #techNostalgia #technology #ubuntu #wordpress
  14. Why a Locked Floppy Disk Could Be Safer Than a Modern Network

    Photo by CCDBarcodeScanner, licensed CC BY-SA 4.0 via Wikimedia Commons.

    Dear Cherubs, in the 1990s, office security had the elegance of a locked drawer and the threat model of a very determined coat thief. Floppy disks were the workhorses of the era, and Britannica notes they were popular from the 1970s until the late 1990s, made of flexible plastic coated with magnetic material. Before the internet became an everyday business utility, many workplaces were still mostly offline; Pew Research found that in 1995 only 14% of U.S. adults had internet access, and 42% had never heard of it.

    THE LOCKED-BOX LOGIC

    If your payroll files, drafts, and backups lived on removable media, the cleanest security move was physical control. Put the disks in a cabinet, lock the cabinet, and hope nobody on the third floor had a master key and a curious streak. It was a blunt system, but it worked because access was local, slow, and obvious. If someone needed a copy, they usually had to walk over, ask, sign something, and maybe endure a suspicious look from whoever guarded the supply room.

    That is the part people forget when they romanticize the old days. The security was not magical; the attack surface was just tiny. To steal the data, someone usually had to be in the building, or at least within arm’s reach of the media. Annoyingly low-tech, yes. Also annoyingly effective.

    MODERN SECURITY, NEW PROBLEMS

    Once files moved onto networks and cloud systems, the game changed. NIST defines intrusion detection as monitoring events in a system or network for signs of possible incidents, and says intrusion prevention systems can also try to stop them. CISA says firewalls shield computers and networks from malicious or unnecessary traffic, while NIST says cryptography is used to protect sensitive digitized information during transmission and while in storage. In other words: the modern office traded one locked box for a whole stack of digital locks, alarms, and panic buttons.

    Of course, the modern setup has its own virtues. Data can be backed up automatically, shared instantly, and protected with layered controls that the floppy-disk era never needed. NIST’s storage-encryption guidance still says organizations should physically secure devices and removable media, which is a polite way of saying: the box still matters, even when the box now lives in a server rack. Security did not become less important; it became more complicated, which is basically the same thing with extra meetings.

    So yes, a locked plastic box full of floppies could be safer than a badly configured internet-facing system. But that is not because the past was wiser. It is because the past had fewer doors, fewer windows, and fewer strangers trying every handle on the planet at once. Security has always been a trade-off between convenience and control; we just used to do the math with keys instead of passwords.

    Sources:
    Britannica — https://www.britannica.com/technology/floppy-disk
    Pew Research Center — https://www.pewresearch.org/internet/2014/02/27/part-1-how-the-internet-has-woven-itself-into-american-life/
    NIST SP 800-94 — https://csrc.nist.gov/pubs/sp/800/94/final
    CISA firewalls — https://www.cisa.gov/news-events/news/understanding-firewalls-home-and-small-office-use
    NIST SP 800-175B Rev. 1 — https://csrc.nist.gov/pubs/sp/800/175/b/r1/final
    NIST SP 800-111 — https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf
    Wikimedia Commons image page — https://commons.wikimedia.org/wiki/File:Floppy_Disk_HD.jpg

    The Thisclaimer logo blends a classic warning symbol with a brain icon to represent critical thinking, curiosity, and thoughtful disclaimers. #cybersecurity #dataSecurity #encryption #firewalls #floppyDisks #internet #internetHistory #intrusionDetection #officeHistory #openSource #physicalSecurity #techNostalgia #technology #ubuntu #wordpress
  15. Why a Locked Floppy Disk Could Be Safer Than a Modern Network

    Photo by CCDBarcodeScanner, licensed CC BY-SA 4.0 via Wikimedia Commons.

    Dear Cherubs, in the 1990s, office security had the elegance of a locked drawer and the threat model of a very determined coat thief. Floppy disks were the workhorses of the era, and Britannica notes they were popular from the 1970s until the late 1990s, made of flexible plastic coated with magnetic material. Before the internet became an everyday business utility, many workplaces were still mostly offline; Pew Research found that in 1995 only 14% of U.S. adults had internet access, and 42% had never heard of it.

    THE LOCKED-BOX LOGIC

    If your payroll files, drafts, and backups lived on removable media, the cleanest security move was physical control. Put the disks in a cabinet, lock the cabinet, and hope nobody on the third floor had a master key and a curious streak. It was a blunt system, but it worked because access was local, slow, and obvious. If someone needed a copy, they usually had to walk over, ask, sign something, and maybe endure a suspicious look from whoever guarded the supply room.

    That is the part people forget when they romanticize the old days. The security was not magical; the attack surface was just tiny. To steal the data, someone usually had to be in the building, or at least within arm’s reach of the media. Annoyingly low-tech, yes. Also annoyingly effective.

    MODERN SECURITY, NEW PROBLEMS

    Once files moved onto networks and cloud systems, the game changed. NIST defines intrusion detection as monitoring events in a system or network for signs of possible incidents, and says intrusion prevention systems can also try to stop them. CISA says firewalls shield computers and networks from malicious or unnecessary traffic, while NIST says cryptography is used to protect sensitive digitized information during transmission and while in storage. In other words: the modern office traded one locked box for a whole stack of digital locks, alarms, and panic buttons.

    Of course, the modern setup has its own virtues. Data can be backed up automatically, shared instantly, and protected with layered controls that the floppy-disk era never needed. NIST’s storage-encryption guidance still says organizations should physically secure devices and removable media, which is a polite way of saying: the box still matters, even when the box now lives in a server rack. Security did not become less important; it became more complicated, which is basically the same thing with extra meetings.

    So yes, a locked plastic box full of floppies could be safer than a badly configured internet-facing system. But that is not because the past was wiser. It is because the past had fewer doors, fewer windows, and fewer strangers trying every handle on the planet at once. Security has always been a trade-off between convenience and control; we just used to do the math with keys instead of passwords.

    Sources:
    Britannica — https://www.britannica.com/technology/floppy-disk
    Pew Research Center — https://www.pewresearch.org/internet/2014/02/27/part-1-how-the-internet-has-woven-itself-into-american-life/
    NIST SP 800-94 — https://csrc.nist.gov/pubs/sp/800/94/final
    CISA firewalls — https://www.cisa.gov/news-events/news/understanding-firewalls-home-and-small-office-use
    NIST SP 800-175B Rev. 1 — https://csrc.nist.gov/pubs/sp/800/175/b/r1/final
    NIST SP 800-111 — https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf
    Wikimedia Commons image page — https://commons.wikimedia.org/wiki/File:Floppy_Disk_HD.jpg

    The Thisclaimer logo blends a classic warning symbol with a brain icon to represent critical thinking, curiosity, and thoughtful disclaimers. #cybersecurity #dataSecurity #encryption #firewalls #floppyDisks #internet #internetHistory #intrusionDetection #officeHistory #openSource #physicalSecurity #techNostalgia #technology #ubuntu #wordpress
  16. Why a Locked Floppy Disk Could Be Safer Than a Modern Network

    Photo by CCDBarcodeScanner, licensed CC BY-SA 4.0 via Wikimedia Commons.

    Dear Cherubs, in the 1990s, office security had the elegance of a locked drawer and the threat model of a very determined coat thief. Floppy disks were the workhorses of the era, and Britannica notes they were popular from the 1970s until the late 1990s, made of flexible plastic coated with magnetic material. Before the internet became an everyday business utility, many workplaces were still mostly offline; Pew Research found that in 1995 only 14% of U.S. adults had internet access, and 42% had never heard of it.

    THE LOCKED-BOX LOGIC

    If your payroll files, drafts, and backups lived on removable media, the cleanest security move was physical control. Put the disks in a cabinet, lock the cabinet, and hope nobody on the third floor had a master key and a curious streak. It was a blunt system, but it worked because access was local, slow, and obvious. If someone needed a copy, they usually had to walk over, ask, sign something, and maybe endure a suspicious look from whoever guarded the supply room.

    That is the part people forget when they romanticize the old days. The security was not magical; the attack surface was just tiny. To steal the data, someone usually had to be in the building, or at least within arm’s reach of the media. Annoyingly low-tech, yes. Also annoyingly effective.

    MODERN SECURITY, NEW PROBLEMS

    Once files moved onto networks and cloud systems, the game changed. NIST defines intrusion detection as monitoring events in a system or network for signs of possible incidents, and says intrusion prevention systems can also try to stop them. CISA says firewalls shield computers and networks from malicious or unnecessary traffic, while NIST says cryptography is used to protect sensitive digitized information during transmission and while in storage. In other words: the modern office traded one locked box for a whole stack of digital locks, alarms, and panic buttons.

    Of course, the modern setup has its own virtues. Data can be backed up automatically, shared instantly, and protected with layered controls that the floppy-disk era never needed. NIST’s storage-encryption guidance still says organizations should physically secure devices and removable media, which is a polite way of saying: the box still matters, even when the box now lives in a server rack. Security did not become less important; it became more complicated, which is basically the same thing with extra meetings.

    So yes, a locked plastic box full of floppies could be safer than a badly configured internet-facing system. But that is not because the past was wiser. It is because the past had fewer doors, fewer windows, and fewer strangers trying every handle on the planet at once. Security has always been a trade-off between convenience and control; we just used to do the math with keys instead of passwords.

    Sources:
    Britannica — https://www.britannica.com/technology/floppy-disk
    Pew Research Center — https://www.pewresearch.org/internet/2014/02/27/part-1-how-the-internet-has-woven-itself-into-american-life/
    NIST SP 800-94 — https://csrc.nist.gov/pubs/sp/800/94/final
    CISA firewalls — https://www.cisa.gov/news-events/news/understanding-firewalls-home-and-small-office-use
    NIST SP 800-175B Rev. 1 — https://csrc.nist.gov/pubs/sp/800/175/b/r1/final
    NIST SP 800-111 — https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-111.pdf
    Wikimedia Commons image page — https://commons.wikimedia.org/wiki/File:Floppy_Disk_HD.jpg

    The Thisclaimer logo blends a classic warning symbol with a brain icon to represent critical thinking, curiosity, and thoughtful disclaimers. #cybersecurity #dataSecurity #encryption #firewalls #floppyDisks #internet #internetHistory #intrusionDetection #officeHistory #openSource #physicalSecurity #techNostalgia #technology #ubuntu #wordpress
  17. Fitness Equipment Exposes Weak Link in Gym Security

    A recent security mishap at a gym serves as a stark reminder of the importance of safeguarding sensitive information, as a technician's careless mistake - stapling configuration details to a cupboard - left fitness equipment vulnerable to exploitation by mischief makers. This embarrassing blunder highlights the need for vigilance in…

    osintsights.com/fitness-equipm

    #GymSecurity #PhysicalSecurity #IotSecurity #EmergingThreats #FitnessEquipment

  18. Bulk edit 500 cameras across every site - one screen, one click.

    Recording schedules, credentials, modes - any manufacturer, updated in real time.

    Rows glow when something changes, so nothing slips past you.

    Live now for all TetherX users.

    How do you currently handle config changes across a large estate - one device at a time?

    #VideoSurveillance #SecurityIntegrators #PhysicalSecurity #TetherX

  19. #physicalsecurity #cybersecurity #trustedplatformmodule #tpm #fujitsu secured! The tpm is only plugged and the only defense against simply unplugging it and taking it away together with the mass storage is a strategically dremeled screw. Well, it is a rather cheap system, but still...

  20. #physicalsecurity #cybersecurity #trustedplatformmodule #tpm #fujitsu secured! The tpm is only plugged and the only defense against simply unplugging it and taking it away together with the mass storage is a strategically dremeled screw. Well, it is a rather cheap system, but still...

  21. #physicalsecurity #cybersecurity #trustedplatformmodule #tpm #fujitsu secured! The tpm is only plugged and the only defense against simply unplugging it and taking it away together with the mass storage is a strategically dremeled screw. Well, it is a rather cheap system, but still...

  22. #physicalsecurity #cybersecurity #trustedplatformmodule #tpm #fujitsu secured! The tpm is only plugged and the only defense against simply unplugging it and taking it away together with the mass storage is a strategically dremeled screw. Well, it is a rather cheap system, but still...

  23. This guy is handcuffed in our village! If you want to learn how to get out of handcuffs come by RSAC, in Moscone South 204 before we close at 2pm! #RSAC #RSAC2026 #RSAConference #physicalsecurity #handcuffs #physicalsecurityvillage

  24. This guy is handcuffed in our village! If you want to learn how to get out of handcuffs come by RSAC, in Moscone South 204 before we close at 2pm! #RSAC #RSAC2026 #RSAConference #physicalsecurity #handcuffs #physicalsecurityvillage

  25. This guy is handcuffed in our village! If you want to learn how to get out of handcuffs come by RSAC, in Moscone South 204 before we close at 2pm! #RSAC #RSAC2026 #RSAConference #physicalsecurity #handcuffs #physicalsecurityvillage

  26. This guy is handcuffed in our village! If you want to learn how to get out of handcuffs come by RSAC, in Moscone South 204 before we close at 2pm! #RSAC #RSAC2026 #RSAConference #physicalsecurity #handcuffs #physicalsecurityvillage

  27. This guy is handcuffed in our village! If you want to learn how to get out of handcuffs come by RSAC, in Moscone South 204 before we close at 2pm! #RSAC #RSAC2026 #RSAConference #physicalsecurity #handcuffs #physicalsecurityvillage

  28. We spend so much time hardening our #GrapheneOS devices and sandboxing our apps, but we often leave our front doors wide open to analog tracking. 📬

    In Episode 19 of Impractical Privacy, we dive into:
    🔹 The MICT program
    🔹 The Informed Delivery trap
    🔹 Physical Defense

    Your residence shouldn't be a data point on a broker's map. It’s time to shred the paper trail. ✂️
    Listen here: impracticalprivacy.com
    #Privacy #DigitalSovereignty #Metadata #Sudo #OptOut #SelfHosting #PhysicalSecurity #USPS

  29. We spend so much time hardening our #GrapheneOS devices and sandboxing our apps, but we often leave our front doors wide open to analog tracking. 📬

    In Episode 19 of Impractical Privacy, we dive into:
    🔹 The MICT program
    🔹 The Informed Delivery trap
    🔹 Physical Defense

    Your residence shouldn't be a data point on a broker's map. It’s time to shred the paper trail. ✂️
    Listen here: impracticalprivacy.com
    #Privacy #DigitalSovereignty #Metadata #Sudo #OptOut #SelfHosting #PhysicalSecurity #USPS

  30. We spend so much time hardening our #GrapheneOS devices and sandboxing our apps, but we often leave our front doors wide open to analog tracking. 📬

    In Episode 19 of Impractical Privacy, we dive into:
    🔹 The MICT program
    🔹 The Informed Delivery trap
    🔹 Physical Defense

    Your residence shouldn't be a data point on a broker's map. It’s time to shred the paper trail. ✂️
    Listen here: impracticalprivacy.com
    #Privacy #DigitalSovereignty #Metadata #Sudo #OptOut #SelfHosting #PhysicalSecurity #USPS

  31. We spend so much time hardening our #GrapheneOS devices and sandboxing our apps, but we often leave our front doors wide open to analog tracking. 📬

    In Episode 19 of Impractical Privacy, we dive into:
    🔹 The MICT program
    🔹 The Informed Delivery trap
    🔹 Physical Defense

    Your residence shouldn't be a data point on a broker's map. It’s time to shred the paper trail. ✂️
    Listen here: impracticalprivacy.com
    #Privacy #DigitalSovereignty #Metadata #Sudo #OptOut #SelfHosting #PhysicalSecurity #USPS

  32. We spend so much time hardening our #GrapheneOS devices and sandboxing our apps, but we often leave our front doors wide open to analog tracking. 📬

    In Episode 19 of Impractical Privacy, we dive into:
    🔹 The MICT program
    🔹 The Informed Delivery trap
    🔹 Physical Defense

    Your residence shouldn't be a data point on a broker's map. It’s time to shred the paper trail. ✂️
    Listen here: impracticalprivacy.com
    #Privacy #DigitalSovereignty #Metadata #Sudo #OptOut #SelfHosting #PhysicalSecurity #USPS

  33. A little work kvetching here, but willing to be contradicted by people in the know:

    It is my experience that there are only two tiers of physical access control integrators: certifiably high-security operations, and everyone else.

    ...and my ongoing ~2 decades worth of experience with varied providers of the latter category is that they all seem to be awful without exception.

    #PhysicalSecurity #AccessControl #Security

  34. A little work kvetching here, but willing to be contradicted by people in the know:

    It is my experience that there are only two tiers of physical access control integrators: certifiably high-security operations, and everyone else.

    ...and my ongoing ~2 decades worth of experience with varied providers of the latter category is that they all seem to be awful without exception.

    #PhysicalSecurity #AccessControl #Security

  35. A little work kvetching here, but willing to be contradicted by people in the know:

    It is my experience that there are only two tiers of physical access control integrators: certifiably high-security operations, and everyone else.

    ...and my ongoing ~2 decades worth of experience with varied providers of the latter category is that they all seem to be awful without exception.

    #PhysicalSecurity #AccessControl #Security

  36. A little work kvetching here, but willing to be contradicted by people in the know:

    It is my experience that there are only two tiers of physical access control integrators: certifiably high-security operations, and everyone else.

    ...and my ongoing ~2 decades worth of experience with varied providers of the latter category is that they all seem to be awful without exception.

    #PhysicalSecurity #AccessControl #Security

  37. A little work kvetching here, but willing to be contradicted by people in the know:

    It is my experience that there are only two tiers of physical access control integrators: certifiably high-security operations, and everyone else.

    ...and my ongoing ~2 decades worth of experience with varied providers of the latter category is that they all seem to be awful without exception.

    #PhysicalSecurity #AccessControl #Security

  38. Canada, Nordics Deepen Arctic Security Ties, Back Greenland Sovereignty

    Source: AFP (Bloomberg) — Canada and the Nordic countries agreed to ramp up defense production and deepen security…
    #Conflict #Conflicts #War #bloomberg #Canada #Danmark #denmark #Greenland #MarkCarney #physicalsecurity #TheArctic
    europesays.com/2855064/

  39. Caetra new release v1.2.0; added new shield that reacts when a webcam turns it on/off.

    With this shield we are trying to avoid privacy leaks from you and others, among possible security visual breaches like harvesting information about your surroundings. Do not forget to cover your webcam with a nice cat sticker :3

    github.com/carvilsi/caetra

    #physicalSecurity #physicalAttacks #linuxhardening #hardwareSecurity #bpf #ebpF #bcc

  40. Caetra new release v1.2.0; added new shield that reacts when a webcam turns it on/off.

    With this shield we are trying to avoid privacy leaks from you and others, among possible security visual breaches like harvesting information about your surroundings. Do not forget to cover your webcam with a nice cat sticker :3

    github.com/carvilsi/caetra

    #physicalSecurity #physicalAttacks #linuxhardening #hardwareSecurity #bpf #ebpF #bcc

  41. Caetra new release v1.2.0; added new shield that reacts when a webcam turns it on/off.

    With this shield we are trying to avoid privacy leaks from you and others, among possible security visual breaches like harvesting information about your surroundings. Do not forget to cover your webcam with a nice cat sticker :3

    github.com/carvilsi/caetra

    #physicalSecurity #physicalAttacks #linuxhardening #hardwareSecurity #bpf #ebpF #bcc

  42. Caetra new release v1.2.0; added new shield that reacts when a webcam turns it on/off.

    With this shield we are trying to avoid privacy leaks from you and others, among possible security visual breaches like harvesting information about your surroundings. Do not forget to cover your webcam with a nice cat sticker :3

    github.com/carvilsi/caetra

    #physicalSecurity #physicalAttacks #linuxhardening #hardwareSecurity #bpf #ebpF #bcc

  43. Thank you Guadalajara and HackGDL for having us! We hope you all had a great time at the village with us and we look forward to seeing you at the next con!

    #hackGDL #physsec #physicalsecurity #physicalsecurityvillage

  44. Thank you Guadalajara and HackGDL for having us! We hope you all had a great time at the village with us and we look forward to seeing you at the next con!

    #hackGDL #physsec #physicalsecurity #physicalsecurityvillage

  45. Thank you Guadalajara and HackGDL for having us! We hope you all had a great time at the village with us and we look forward to seeing you at the next con!

    #hackGDL #physsec #physicalsecurity #physicalsecurityvillage

  46. Thank you Guadalajara and HackGDL for having us! We hope you all had a great time at the village with us and we look forward to seeing you at the next con!

    #hackGDL #physsec #physicalsecurity #physicalsecurityvillage

  47. Evidence review just got faster.

    TetherX's new Event Player plays gapless footage start to finish - intelligent thumbnails surface the best frame every 5 seconds, so a one-second run-through doesn't get missed.

    Wall-clock timestamps. Variable speed. Full scrub control.

    is.gd/WDl9Mu

    How do you currently handle events where the key moment lasts under a second?

    #PhysicalSecurity #VideoSurveillance #SecurityIntegrators #TetherX