<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Physical</title>
    <description>
      <![CDATA[Information and products for enterprise physical security executives. ]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2787-physical</link>
    <language>en-us</language>
    <item>
      <title>World Cup Safety and Security Is About More than Just Crime</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The 2026 World Cup tests every framework of public safety.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102159</guid>
      <pubDate>Fri, 06 Mar 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102159-world-cup-safety-and-security-is-about-more-than-just-crime</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/05/World-Cup-trophy-beside-goal-by-My-Profit-Tutor.webp?t=1772727405" type="image/png" length="505749"/>
    </item>
    <item>
      <title>Enhancing Incident Response with Integrated Access Control and Video Verification</title>
      <description>
        <![CDATA[<p>Evolving threats have security teams on alert to integrate solutions that both mitigate and combat different scenarios.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102145</guid>
      <pubDate>Fri, 27 Feb 2026 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102145-enhancing-incident-response-with-integrated-access-control-and-video-verification</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-F3-Feat-Slide1-1170x658.webp?t=1772642385" type="image/jpeg" length="161473"/>
    </item>
    <item>
      <title>From the Outside In: A Smarter Approach to Vendor Access</title>
      <description>
        <![CDATA[<p>Modern access control strategies are shifting focus to vendors, contractors, and the perimeter itself.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102141</guid>
      <pubDate>Wed, 25 Feb 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102141-from-the-outside-in-a-smarter-approach-to-vendor-access</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0226-F4-Feat-Slide1-1170x658.webp?t=1772642386" type="image/jpeg" length="72673"/>
    </item>
    <item>
      <title>Implementing Meaningful De-Escalation Training in Your Security Program</title>
      <description>
        <![CDATA[<p>Effective de-escalation training includes these four main focus points.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102131</guid>
      <pubDate>Fri, 20 Feb 2026 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102131-implementing-meaningful-de-escalation-training-in-your-security-program</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-Edu-Feat-Slide1-1170x658.webp?t=1772041698" type="image/jpeg" length="40389"/>
    </item>
    <item>
      <title>DHS Shutdown to Begin Saturday, February 14</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Funding for the Department of Homeland Security (DHS) will expire at 12 am on Saturday, February 14th.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102125</guid>
      <pubDate>Fri, 13 Feb 2026 13:00:34 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102125-dhs-shutdown-to-begin-saturday-february-14</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/13/luke-michael-Tdwu35bCUj0-unsplash.webp?t=1772041698" type="image/jpeg" length="118039"/>
    </item>
    <item>
      <title>55% Healthcare Workers Faced Increases in Violence — How Is Security Adapting to Protect Them?</title>
      <author></author>
      <description>
        <![CDATA[<p>How are organizations responding to rising threats against healthcare staff? </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102119</guid>
      <pubDate>Wed, 11 Feb 2026 02:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102119-55-healthcare-workers-faced-increases-in-violence-how-is-security-adapting-to-protect-them</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/06/Healthcare-worker-by-Nappy.webp?t=1770858201" type="image/png" length="349288"/>
    </item>
    <item>
      <title>Security Risks Around Super Bowl LX: What Security Leaders Should Be Watching</title>
      <description>
        <![CDATA[<p>The Super Bowl is not just a game, but a blueprint for how modern risk must be managed.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102114</guid>
      <pubDate>Fri, 06 Feb 2026 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102114-security-risks-around-super-bowl-lx-what-security-leaders-should-be-watching</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/02/05/NFL-footballs-by-Adrian-Curiel.webp?t=1770858201" type="image/png" length="480705"/>
    </item>
    <item>
      <title>How Banks Can Protect Their Most Valuable Asset: Customers</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security experts share how banks and financial institutions can defend their people, property and customers.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102104</guid>
      <pubDate>Tue, 03 Feb 2026 00:08:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102104-how-banks-can-protect-their-most-valuable-asset-customers</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/02-February/SEC-0226-F1-Feat-Slide1-1170x658.webp?t=1770858202" type="image/jpeg" length="76899"/>
    </item>
    <item>
      <title>How to Safeguard Executives Through Proactive Planning and Managing Online Presence</title>
      <description>
        <![CDATA[<p>Organizations can think about executive protection in three simple steps: assess, design and then deliver.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102097</guid>
      <pubDate>Tue, 27 Jan 2026 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102097-how-to-safeguard-executives-through-proactive-planning-and-managing-online-presence</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/01/26/Man-in-suit-by-Ben-Rosett.webp?t=1769626262" type="image/png" length="402239"/>
    </item>
    <item>
      <title>The Salary of a Chief Security Officer</title>
      <description>
        <![CDATA[<p>The 24th annual Security and Compliance Compensation report gives industry professionals insight into what their peers are earning.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102069</guid>
      <pubDate>Tue, 13 Jan 2026 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102069-the-salary-of-a-chief-security-officer</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/01-January/SEC-0126-F1-HERO-Slide-1440x750.webp?t=1768469520" type="image/jpeg" length="179508"/>
    </item>
    <item>
      <title>Why it’s Time to Move on From Legacy Access Control Systems</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The modern workplace or campus looks very different from even a decade ago — and older access control systems struggle to keep up.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102057</guid>
      <pubDate>Thu, 08 Jan 2026 11:42:58 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102057-why-its-time-to-move-on-from-legacy-access-control-systems</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/19/sebastian-scholz-nuki-IJkSskfEqrM-unsplash.webp?t=1767896985" type="image/jpeg" length="70233"/>
    </item>
    <item>
      <title>CISA Releases Guide for Stadium and Arena Security</title>
      <author></author>
      <description>
        <![CDATA[<p>This published guide supports security leaders in protecting venues.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102061</guid>
      <pubDate>Wed, 24 Dec 2025 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102061-cisa-releases-guide-for-stadium-and-arena-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/22/Confetti-falling-on-crowd-by-Elena-de-Soto.webp?t=1768469520" type="image/png" length="830345"/>
    </item>
    <item>
      <title>What Can Security Leaders Learn From Prevented University Attack?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Campus police were targeted in a planned university attack.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102055</guid>
      <pubDate>Fri, 19 Dec 2025 05:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102055-what-can-security-leaders-learn-from-prevented-university-attack</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/18/Smiling-officer-by-Arthur-Ogleznev.webp?t=1766527865" type="image/png" length="517084"/>
    </item>
    <item>
      <title>No More Failures of Imagination: Future Proofing Airport Employee Screening</title>
      <description>
        <![CDATA[<p>How to protect American flyers and airport employees from another tragic <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">“failure of imagination.”</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102053</guid>
      <pubDate>Thu, 18 Dec 2025 03:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102053-no-more-failures-of-imagination-future-proofing-airport-employee-screening</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/17/Emply-airplane-seats-by-Parmanand-Jagnandan.webp?t=1766527864" type="image/png" length="431431"/>
    </item>
    <item>
      <title>Breaking Down the Security, Risk of Recent University Firing</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security expert discusses the recent firing of University of Michigan coach Sherrone Moore.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102052</guid>
      <pubDate>Tue, 16 Dec 2025 07:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102052-breaking-down-the-security-risk-of-recent-university-firing</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/15/Football-on-field-by-Paolo-Aldrighetti.webp?t=1766527865" type="image/png" length="556616"/>
    </item>
    <item>
      <title>Cost Center to Value Driver: How Physical Security Is Transforming</title>
      <author></author>
      <description>
        <![CDATA[<p>Physical security’s contributions to organizational objectives have increased.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102043</guid>
      <pubDate>Fri, 12 Dec 2025 04:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102043-cost-center-to-value-driver-how-physical-security-is-transforming</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/11/Security-guard-by-Job-Moses.webp?t=1766527866" type="image/png" length="279444"/>
    </item>
    <item>
      <title>The Evolving Role of VMS in Connected Cities</title>
      <description>
        <![CDATA[<p>By integrating data from connected systems, sensors and devices, ‘smart cities’ better understand how municipal resources are used and where problems arise.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102039</guid>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102039-the-evolving-role-of-vms-in-connected-cities</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/09/ben-o-bro-wpU4veNGnHg-unsplash.webp?t=1765309428" type="image/jpeg" length="177069"/>
    </item>
    <item>
      <title>US Survey Respondents Indicate Desire for Additional Gun Detection</title>
      <description>
        <![CDATA[<p>Americans share desire for additional gun detection.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102038</guid>
      <pubDate>Wed, 10 Dec 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102038-us-survey-respondents-indicate-desire-for-additional-gun-detection</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/12-December/SEC-1225-News2-Feat-Slide1-1170x658.webp?t=1765296238" type="image/jpeg" length="129590"/>
    </item>
    <item>
      <title>The New Real-Time Crime Center in an Age of Agentic AI</title>
      <description>
        <![CDATA[<p>Real-time crime centers have become integral to many public safety efforts.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102035</guid>
      <pubDate>Tue, 09 Dec 2025 02:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102035-the-new-real-time-crime-center-in-an-age-of-agentic-ai</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/08/Monitors-with-symbols-by-Dan-LeFebvre.webp?t=1765215114" type="image/png" length="539487"/>
    </item>
    <item>
      <title>Balancing Security with Tenant Privacy</title>
      <description>
        <![CDATA[<p>Bala Consulting Engineers is the 2025 recipient of the Elliot A. Boxerbaum award.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102033</guid>
      <pubDate>Mon, 08 Dec 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102033-balancing-security-with-tenant-privacy</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/12-December/SEC-1225-F4-Feat-Slide1-1170x658.webp?t=1765204276" type="image/jpeg" length="157492"/>
    </item>
    <item>
      <title>How to Ensure Security Barriers Don't Become Guest Barriers</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Balancing security and the guest experience can be difficult. But, if implemented effectively, visitor management systems and processes can benefit the guest experience rather than hinder it.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102031</guid>
      <pubDate>Fri, 05 Dec 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102031-how-to-ensure-security-barriers-dont-become-guest-barriers</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/12-December/SEC-1225-Edu-Feat-Slide1-1170x658.webp?t=1768469521" type="image/jpeg" length="133142"/>
    </item>
    <item>
      <title>Is Your Biggest Security Threat Already in Your Ear?</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">When a theft occurs at a blackjack table or a disturbance erupts near the slot machines, every second counts.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102028</guid>
      <pubDate>Thu, 04 Dec 2025 01:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102028-is-your-biggest-security-threat-already-in-your-ear</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/12/03/Cards-and-chips-on-table-by-Micha-Parzuchowski.webp?t=1764776115" type="image/png" length="337832"/>
    </item>
    <item>
      <title>Inside The 2025 Security Benchmark Report</title>
      <description>
        <![CDATA[<p>Rachelle Blair-Frasier, Editor in Chief at <em>Security</em> magazine, presents a selection of findings from The 2025 Security Benchmark Report.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102009</guid>
      <pubDate>Wed, 19 Nov 2025 00:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/102009-inside-the-2025-security-benchmark-report</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2025/11-November/SEC-1125-Talk-Feat-Slide1-1170x658.webp?t=1763047752" type="image/jpeg" length="83767"/>
    </item>
    <item>
      <title>After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">When thieves stole more than $80 million in jewels from the Louvre in Paris, they didn’t exploit a total absence of security but rather gaps in the museum’s broader security program.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101998</guid>
      <pubDate>Mon, 10 Nov 2025 12:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101998-after-the-theft-why-camera-upgrades-should-begin-with-a-risk-assessment</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/07/The-Louvre-by-Diogo-Fagundes.webp?t=1763157542" type="image/png" length="456605"/>
    </item>
    <item>
      <title>Will Bernhjelm to Deliver Keynote at 2025 SECURITY 500 Conference</title>
      <author></author>
      <description>
        <![CDATA[<p>Will Bernhjelm, <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Vice President of Security for Mall of America,&nbsp;</span>will deliver the keynote address at the SECURITY 500 Conference in Washington, D.C. this November.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101982</guid>
      <pubDate>Mon, 10 Nov 2025 01:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101982-will-bernhjelm-to-deliver-keynote-at-2025-security-500-conference</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/06/Copy-of-SEC-500-Panel-header-(6).webp?t=1763157543" type="image/png" length="158568"/>
    </item>
    <item>
      <title>Inside SECURITY 500: Reinventing Security Leadership</title>
      <description>
        <![CDATA[<p>In this episode of Lock It Down with <em>Security</em>Magazine, Will Bernhjelm, Mall of America Vice President of Security, and the 2025 SECURITY 500 Conference Morning Keynote Speaker, talks about his career, the security industry and the upcoming conference.
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101986</guid>
      <pubDate>Wed, 05 Nov 2025 08:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101986-inside-security-500-reinventing-security-leadership</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/05/SEC-Podcast-Header-11.5.25-Will-Bernhjelm.webp?t=1762363021" type="image/png" length="118979"/>
    </item>
    <item>
      <title>Vice President Dick Cheney Passes Away at Age 84</title>
      <description>
        <![CDATA[<p>Former Vice President Dick Cheney passed away at age 84 on November 3, 2025 with a public announcement on November 4, 2025.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101992</guid>
      <pubDate>Tue, 04 Nov 2025 09:24:25 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101992-vice-president-dick-cheney-passes-away-at-age-84</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/11/04/charles-duck-unitas-hPq1nLfLgBY-unsplash.webp?t=1762266065" type="image/jpeg" length="139469"/>
    </item>
    <item>
      <title>James Weston to Deliver Keynote at 2025 SECURITY 500 Conference</title>
      <author></author>
      <description>
        <![CDATA[<p>James Weston, Director, Global Security Liaison & IDL Security Advisor at McDonald’s Corporation, <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">will deliver an afternoon keynote address at the SECURITY 500 Conference in Washington, D.C. this November.</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101984</guid>
      <pubDate>Mon, 03 Nov 2025 02:00:00 -0500</pubDate>
      <link>https://www.securitymagazine.com/articles/101984-james-weston-to-deliver-keynote-at-2025-security-500-conference</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/10/31/Copy-of-SEC-500-Panel-header.webp?t=1763157543" type="image/png" length="201836"/>
    </item>
    <item>
      <title>Determining the Credibility of Online Threats in a World of Digital Noise</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">While many online threats are nothing more than idle chatter, pranks, or cries for attention, others are chillingly real — and the challenge is determining which is which before tragedy strikes.</span>
</p><br>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/101983</guid>
      <pubDate>Thu, 30 Oct 2025 03:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/101983-determining-the-credibility-of-online-threats-in-a-world-of-digital-noise</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/10/29/Stressed-woman-at-laptop-by-Elisa-Ventur.webp?t=1772041697" type="image/png" length="446361"/>
    </item>
    <item>
      <title>A Glimpse of the Future: How AI Will Transform Physical Security</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Steve Lindsey, CTO and Co-Founder of LVT, shares his insights regarding the future of AI in physical security. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/101979</guid>
      <pubDate>Wed, 29 Oct 2025 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/101979-a-glimpse-of-the-future-how-ai-will-transform-physical-security</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2025/10/27/Lindsey-podcast-news-header.webp?t=1761584111" type="image/png" length="139280"/>
    </item>
  </channel>
</rss>
