SEVN-X Blog
I N S I D E T H E P E R I M E T E R
Latest Stories
Legal Robbery?!?
The Video Matt opens up about his journey into becoming a nationally recognized expert on physical and cybersecurity, in...
What's In My Physical Testing Field Kit 2022!
The Video While these two experts both do the same thing, their styles and tools, in some cases, can be pretty far apart...
Apple AirTags Used to Stalk Victims
The Video What You Can Do If you own an Apple device Make sure your device is an iPhone 6s or newer and running iOS 14.5...
FOUR-X Day Work Week
Bottom Line Up Front Now that babies and barking dogs have become mainstays in the background of our daily Zoom calls, w...
Recording Physical Security Engagements
The Video In this episode of The SEVN-X Bookshelf, Matt Barnett walks viewers through various camera technology used by ...
The Impact of the Log4j Vulnerability
The Video In Simple Terms... Log4j is an open source logging framework from the Apache Foundation. Its primary purpose i...
007x - Physical Security Tradecraft
The Video What Does it Take to Keep You Safe? Admittedly, the amount of people that have the skillset, capabilities, and...
Physical Security: Breaking Down the Break-in
The Video More Info If you're looking to conduct your first physical security test, or even if you've had them done in t...
Creating Forensic Images of APFS Drives
The Video The Commands Creating a forensic image, while following a forensically-sound process is a bit of a tightrope a...
In a world saturated with alerts, headlines, and opinions, the most important signals are often the hardest to see.
This blog exists to surface those signals. We explore how modern attacks unfold, why defenses fail in unexpected ways, and what disciplined security programs do differently — long before crisis forces the conversation.
This is where observation turns into understanding.