<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>EntryBit Blog</title><description>Engineering, security and product stories from the EntryBit team.</description><link>https://entrybit.net/</link><language>en-us</language><atom:link href="https://entrybit.net/blog/rss.xml" rel="self" type="application/rss+xml"/><lastBuildDate>Thu, 02 Apr 2026 00:00:00 GMT</lastBuildDate><item><title>Zero trust for physical security</title><link>https://entrybit.net/blog/zero-trust-physical-security/</link><guid isPermaLink="true">https://entrybit.net/blog/zero-trust-physical-security/</guid><description>How zero trust principles like continuous authentication, micro-segmented zones, and just-in-time access are reshaping physical access control.</description><pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate><category>Security</category><author>EntryBit Team</author></item><item><title>Why we built EntryBit — rethinking access control</title><link>https://entrybit.net/blog/why-we-built-entrybit/</link><guid isPermaLink="true">https://entrybit.net/blog/why-we-built-entrybit/</guid><description>The story behind a cloud-native take on physical access control — and why we think the category was long overdue for a rewrite.</description><pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate><category>Company</category><author>EntryBit Team</author></item><item><title>Scaling to 1,000 sites with zero downtime</title><link>https://entrybit.net/blog/scaling-to-1000-sites/</link><guid isPermaLink="true">https://entrybit.net/blog/scaling-to-1000-sites/</guid><description>Cell-based architecture, blast radius containment, and offline resilience — how we scaled access control across four continents.</description><pubDate>Sat, 28 Mar 2026 00:00:00 GMT</pubDate><category>Engineering</category><author>EntryBit Team</author></item><item><title>Designing audit logs you can actually trust</title><link>https://entrybit.net/blog/designing-audit-logs/</link><guid isPermaLink="true">https://entrybit.net/blog/designing-audit-logs/</guid><description>How tamper-evident hash chains change incident response and what we learned implementing them in production.</description><pubDate>Wed, 18 Mar 2026 00:00:00 GMT</pubDate><category>Engineering</category><author>EntryBit Team</author></item><item><title>Visitor management: from lobby chaos to concierge</title><link>https://entrybit.net/blog/visitor-management-enterprise/</link><guid isPermaLink="true">https://entrybit.net/blog/visitor-management-enterprise/</guid><description>How modern visitor management transforms front-desk operations with pre-registration, digital NDA signing, auto-expiring badges, and lobby analytics.</description><pubDate>Tue, 10 Mar 2026 00:00:00 GMT</pubDate><category>Product</category><author>EntryBit Team</author></item><item><title>Mobile credentials: the end of the keycard</title><link>https://entrybit.net/blog/mobile-credentials/</link><guid isPermaLink="true">https://entrybit.net/blog/mobile-credentials/</guid><description>What we learned shipping Apple Wallet and Google Wallet credentials to 50,000 users across 40 sites.</description><pubDate>Sun, 22 Feb 2026 00:00:00 GMT</pubDate><category>Product</category><author>EntryBit Team</author></item><item><title>Biometric access control and privacy: a guide</title><link>https://entrybit.net/blog/biometrics-privacy-gdpr/</link><guid isPermaLink="true">https://entrybit.net/blog/biometrics-privacy-gdpr/</guid><description>A practitioner&apos;s guide to deploying face recognition and fingerprint readers while respecting biometric privacy regulations.</description><pubDate>Fri, 20 Feb 2026 00:00:00 GMT</pubDate><category>Compliance</category><author>EntryBit Team</author></item><item><title>Security from day one: trust baked into the stack</title><link>https://entrybit.net/blog/soc2-from-day-one/</link><guid isPermaLink="true">https://entrybit.net/blog/soc2-from-day-one/</guid><description>How we built enterprise-grade security controls into our infrastructure from our first commit — and what we would do differently.</description><pubDate>Wed, 04 Feb 2026 00:00:00 GMT</pubDate><category>Security</category><author>EntryBit Team</author></item><item><title>Building real-time event streams at sub-50ms</title><link>https://entrybit.net/blog/realtime-event-streams/</link><guid isPermaLink="true">https://entrybit.net/blog/realtime-event-streams/</guid><description>A deep dive into our WebSocket architecture, back-pressure handling, and how we achieve consistent low latency.</description><pubDate>Tue, 20 Jan 2026 00:00:00 GMT</pubDate><category>Engineering</category><author>EntryBit Team</author></item><item><title>Hardware-agnostic access control matters</title><link>https://entrybit.net/blog/hardware-agnostic/</link><guid isPermaLink="true">https://entrybit.net/blog/hardware-agnostic/</guid><description>Why we refuse to lock customers into proprietary controllers — and what it took to support every major protocol.</description><pubDate>Sun, 14 Dec 2025 00:00:00 GMT</pubDate><category>Hardware</category><author>EntryBit Team</author></item></channel></rss>