<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://www.bombadilsecurity.com/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-08</lastmod>
  </url>
  <url>
    <loc>https://www.bombadilsecurity.com/blog/low-frequency-access-cards-what-are-they-and-are-they-a-thing-of-the-past</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2026-01-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/674fd833e7fb2a7a7ded1d7c/8a2b061b-11ba-4416-8145-c0929457e12d/ChatGPT+Image+Jan+6%2C+2026%2C+09_24_11+PM.png</image:loc>
      <image:title>BLOG - Low Frequency Access Cards | What Are They and Are They A Thing of The Past?</image:title>
      <image:caption>Additionally, you need to look at the size of a card you need. Is a 26-bit sufficient? Or do you need to move to a 35 or 37-bit card? We commonly have 65k+ active badges in the system. With employee and contractor turnover, we needed something larger than 26-bit card.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/674fd833e7fb2a7a7ded1d7c/948e9ecd-43fd-4d11-b1b2-ba64984aa971/DACS.png</image:loc>
      <image:title>BLOG - Low Frequency Access Cards | What Are They and Are They A Thing of The Past?</image:title>
      <image:caption>The company I work with, like many other organizations, utilize access control cards for not only access control to our facilities, but also for timekeeping and vending machines (tool and PPE distribution) within the plant operations. One of the biggest hurdles I have had to overcome with access cards is getting all my locations onto a single enterprise system and then all on the same badge. For context, when I first took over Corporate Security Technology (CST), we had roughly a dozen different access control systems across the globe. Many of these systems were not even supported or in business anymore. For the systems that were still supported, Lenel and Hirsch Velocity, we weren’t even aligned on the badges within each system. Between Hirsch, which is our primary access control system, we were using both Indala and HID badges, typically 26-bit LF. However, we could be running over 20 different facility codes across the enterprise with some individuals needing three and even four badges to get into all the facilities they manage. I know, it seems ludicrous. So, what did we need to do? Well, the first step we took was looking at which access control systems we were going to stay with and how we would upgrade the older systems.  Ultimately, we ended up selecting Hirsch Velocity as our primary access control system and began moving many of the one-off systems over to Hirsch. Hirsch is a great system but does have its downfalls depending on how you look at it. One of the issues you will see with Hirsch is that they function on proprietary boards, SNIBS as they are referred to, versus a Mercury board that many of the other systems can utilize. This has not been as much of a problem in the US but has caused us issues outside of the US and in more remote regions of South America, Africa, and Asia where having trained technicians can be difficult.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/674fd833e7fb2a7a7ded1d7c/010419a0-2fd3-4869-8f5f-8e01f4239877/ChatGPT+Image+Jan+6%2C+2026%2C+09_12_44+PM.png</image:loc>
      <image:title>BLOG - Low Frequency Access Cards | What Are They and Are They A Thing of The Past? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/674fd833e7fb2a7a7ded1d7c/20900258-ce10-4476-879f-4337f3758f23/ChatGPT+Image+Jan+6%2C+2026%2C+09_22_16+PM.png</image:loc>
      <image:title>BLOG - Low Frequency Access Cards | What Are They and Are They A Thing of The Past?</image:title>
      <image:caption>I would say it is not obsolete, yet. However, I do think its use is very limited and should be avoided if possible. If you already have a legacy system which is limited to reading low frequency cards, then a 125kHz card may be acceptable – depending on your risk tolerance. I would say that if you are installing a new system or upgrading your system, then strongly consider moving to the more secure high frequency cards.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/674fd833e7fb2a7a7ded1d7c/13afb8eb-52c3-479f-8a98-7108f2036fbc/ChatGPT+Image+Jan+7%2C+2026%2C+08_56_40+PM.png</image:loc>
      <image:title>BLOG - Low Frequency Access Cards | What Are They and Are They A Thing of The Past? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/674fd833e7fb2a7a7ded1d7c/5678c759-67a6-48e9-a946-93accdbb9aaa/ChatGPT+Image+Jan+6%2C+2026%2C+09_19_03+PM.png</image:loc>
      <image:title>BLOG - Low Frequency Access Cards | What Are They and Are They A Thing of The Past? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.bombadilsecurity.com/blog/is-a-masters-of-business-administration-mba-worth-it-in-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/674fd833e7fb2a7a7ded1d7c/0297e065-64fb-40da-ad7b-2562886a3a61/Business+School.png</image:loc>
      <image:title>BLOG - Is a Masters of Business Administration (MBA) worth it in Security?</image:title>
      <image:caption>One of the main reasons I got an MBA at the time was that I was working in engineering and data science. Primarily, my day to day was project management and data science and, with having an undergrad in Business, I was a little limited to which programs would accept me. When I decided I wanted to attend grad school, I looked at a lot of master’s in science degrees – Cyber, Data Science, etc. but many of them were requiring undergrad degrees in science and/or prior C/C++ classes. My undergrad degree was in arts as a business degree, not ideal for being competitive in technical fields. I was also a former cop who had just left law enforcement and didn’t necessarily have the educational background or work experience to be competitive for many desirable programs. I had taken several courses in Python and R which had landed me in the data science and project management role I was currently doing. Unfortunately, that didn’t hold much weight to the college admin boards for the programs I was looking at. However, I did find finance and economic intriguing and began looking at MBA degrees with a focus on data analytics and data science. Now, I’m sure you are well aware that about anyone has an MBA program and most of them are nothing more than degree mills with little focus on the actual curriculum. I wanted to make sure that if I was going to spend my time and money on returning to college that I got something out of it that was going to be beneficial in my future career, and I wanted to make sure that it was an accredited business school. I began looking strictly at AACSB accredited programs with a focus on data analytics.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/674fd833e7fb2a7a7ded1d7c/940cb980-c7a3-4b86-8fba-4fe5d11596b2/Reading+Books.png</image:loc>
      <image:title>BLOG - Is a Masters of Business Administration (MBA) worth it in Security? - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.bombadilsecurity.com/blog/reactive-vs-proactive-gsoc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-11-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/674fd833e7fb2a7a7ded1d7c/d6eea72c-0bb5-4245-b076-591364c04d73/GSOC.png</image:loc>
      <image:title>BLOG - Reactive Vs Proactive | GSOC - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/674fd833e7fb2a7a7ded1d7c/bc5bbc59-2e82-40d5-a864-951341ea98b5/Reactive+vs+Proactive+GSOC.png</image:loc>
      <image:title>BLOG - Reactive Vs Proactive | GSOC - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/674fd833e7fb2a7a7ded1d7c/25c869eb-475e-415f-b1a2-bd3009b82cbe/KPI.png</image:loc>
      <image:title>BLOG - Reactive Vs Proactive | GSOC - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.bombadilsecurity.com/blog/technical-training-as-a-manager</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/674fd833e7fb2a7a7ded1d7c/13819497-b1d7-47d8-99cf-1f5bc27240c4/axis_certified_professional_en_1401.jpg</image:loc>
      <image:title>BLOG - Technical Training as a Manager - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/674fd833e7fb2a7a7ded1d7c/f1e7bd5c-ca74-4061-a972-a787f5696839/Compressed+Server.png</image:loc>
      <image:title>BLOG - Technical Training as a Manager - Zipstream and Bitrate</image:title>
      <image:caption>Zipstream was the most interesting for me from a management perspective. If you are new to Zipstream, it is a compression feature that Axis has created that has roughly a ~50% reduction in storage versus standard H.264 compression. While it does compress the video, it makes sure to preserve the forensic quality in important areas (faces, license plates, moving objects) while applying more aggressive compression to less important regions (e.g., static walls, lawns).   Zipstream is able to complete this compression with the superior reduction due to its use of “I” and “P” frames along with Dynamic ROI, Dynamic GOP, and Dynamic FSP.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.bombadilsecurity.com/blog/isc2-certified-in-cybersecurity-cc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/674fd833e7fb2a7a7ded1d7c/72671625-6b82-42dd-b720-73cfb156b225/Certified.png</image:loc>
      <image:title>BLOG - ISC2 Certified in Cybersecurity (CC)</image:title>
      <image:caption>Earlier this year I took the ISC2 Certified in Cybersecurity (CC) exam. This was my first cyber specific exam, and I have to say, I was impressed with the exam and ISC2. For transparency, I do not work directly in the Cybersecurity department. Instead, I work in the “Physical Security” or corporate security side of the house. I do, however, oversee our technology department and GSOC which works heavily with our IT, Cyber, and Business Continuity teams.  I found the domains for the CC exam to be directly related to my team’s roles and responsibilities. If you are unfamiliar with the domains covered in the CC exam, they are as follows: Domain 1. Security Principles Domain 2. Business Continuity (BC), Disaster Recovery (DR) &amp; Incident Response Concepts Domain 3. Access Controls Concepts Domain 4. Network Security Domain 5. Security Operations Here is the exam outline provided by ISC2</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.bombadilsecurity.com/blog/transitioning-from-law-enforcement-to-corporate-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-10-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/674fd833e7fb2a7a7ded1d7c/81131073-a970-4962-bc3d-5bf43c87068a/squad+thoughts.png</image:loc>
      <image:title>BLOG - Transitioning From Law Enforcement to Corporate Security</image:title>
      <image:caption>This sounded great! I was able to re-establish my prior certifications and return to teaching at the police academy, along with helping out a local community a few nights a week. A few shifts into driving around on night shift really started causing some nostalgia. It made me realize how badly I had missed being an officer and how I needed to get back into law enforcement. It caused me to despise the mundane nature of my full-time job in engineering management. It wasn’t that the work of an engineer wasn’t stimulating. Building data pipelines for optimization models and overseeing million dollar projects certainly was, however, while these skills benefited me later on in security, the desk work was excruciating. I began applying for Federal LEO jobs along with State Police and there was one Corporate Security job. I applied for the Corporate Security job thinking I didn’t have a chance. Corporate Security positions can be very selective and since I didn’t know anyone in this Corporate Security department, I didn’t think I had a chance. Fortunately for me, they were looking for someone to build up their corporate security technology side and align their security systems on a global scale. My time in engineering and data science along with LEO experience aligned perfectly for what they were looking for.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/674fd833e7fb2a7a7ded1d7c/d0547939-a1d0-4025-b1db-e74707c92803/Uniform+to+Suit+-+Copy.png</image:loc>
      <image:title>BLOG - Transitioning From Law Enforcement to Corporate Security - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.bombadilsecurity.com/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2025-12-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/674fd833e7fb2a7a7ded1d7c/e0eb21c3-1d01-4a99-861c-31671b7a4843/bS%283%29.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.bombadilsecurity.com/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-21</lastmod>
  </url>
  <url>
    <loc>https://www.bombadilsecurity.com/blank</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-07-15</lastmod>
  </url>
  <url>
    <loc>https://www.bombadilsecurity.com/services-old</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-07-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/64f0a4610f250e0159eb6aeb/41a1914d-8167-442a-b3c0-997d34f84d21/Stocksy_comp_5061784_V3.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/64f0a4610f250e0159eb6aeb/23a01fd1-e738-4f24-b235-a0c66724daa7/Stocksy_comp_3636289_V3.jpg</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/64f0a4610f250e0159eb6aeb/24477200-1278-4449-9ca1-8fa9c1257474/Stocksy_comp_4792777_V3.jpg</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://www.bombadilsecurity.com/privacy-policy</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-07-15</lastmod>
  </url>
  <url>
    <loc>https://www.bombadilsecurity.com/services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-21</lastmod>
  </url>
  <url>
    <loc>https://www.bombadilsecurity.com/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-21</lastmod>
  </url>
</urlset>

