Shop by Store


Shop by Category

Home Automation

Cameras

Video

Alarm Systems

Recorders

Cables

Accessories

Power Supplies

Monitors

Wireless

Access Control

Business

Select a Brand:



Some of our Stores:

Smart Home, Inc

CHIEF

Spy Tec Inc

Shop Raspberry Pi at MCM Electronics

SimplexGrinnellStore.com



Home Automation News:

Hardening BYOD: Implementing Critical Security Control 3 in a Bring Your Own Device (BYOD) Architecture

The increasing prevalence of Bring Your Own Device (BYOD) architecture poses many challenges to information security professionals. These include, but are not limited to: the risk of loss or theft, unauthorized access to sensitive corporate data, and lack of standardization and control. This last challenge can be particularly troublesome for an enterprise trying to implement the Center for Internet Security (CIS) Critical Security Controls for Effective Cyber Defense (CSCs). CSC 3, Secure Config...


Botnet Resiliency via Private Blockchains

Criminals operating botnets are persistently in an arms race with network security engineers and law enforcement agencies to make botnets more resilient. Innovative features constantly increase the resiliency of botnets but cannot mitigate all the weaknesses exploited by researchers. Blockchain technology includes features which could improve the resiliency of botnet communications. A trusted, distributed, resilient, fully-functioning command and control communication channel can be achieved usi...


OSSIM: CIS Critical Security Controls Assessment in a Windows Environment.

Use of a Security Information and Event Management (SIEM) or log management platform is a recommendation common to several of the ?CIS Critical Security Controls For Effective Cyber Defense? (2016). Because the CIS Critical Security Controls (CSC) focus on automation, measurement and continuous improvement of control application, a SIEM is a valuable tool. Alienvaults Open Source SIEM (OSSIM) is free and capable, making it a popular choice for administrators seeking experience with SIEM. While t...


Trust No One: A Gap Analysis of Moving IP-Based Network Perimeters to A Zero Trust Network Architecture

Traditional IP-based access controls (e.g., firewall rules based on source and destination addresses) have defined the network perimeter for decades. Threats have evolved to evade and bypass these IP restrictions using techniques such as spear phishing, malware, credential theft, and lateral movement. As these threats evolve, so have the demands from end users for increased accessibility. Remote employees require secure access to internal resources. Cloud services have moved the perimeter outsid...


A Spicy Approach to WebSockets: Enhancing Bro's WebSockets Network Analysis by Generating a Custom Protocol Parser with Spicy

Although the Request for Comments (RFC) defining WebSockets was released in 2011, there has been little focus on using the Bro Intrusion Detection System (IDS) to analyze WebSockets traffic. However, there has been progress in exploiting the WebSockets protocol. The ability to customize and expand Bro?s capabilities to analyze new protocols is one of its chief benefits. The developers of Bro are also working on a new framework called Spicy that allows security professionals to generate new proto...


Does Network Micro-segmentation Provide Additional Security?

Network segmentation is a concept of taking a large group of hosts and creating smaller groups of hosts that can communicate with each other without traversing a security control. The smaller groups of hosts each have defined security controls, and groups are independent of each other. Network micro-segmentation takes the smaller group of hosts by configuring controls around individual hosts. The goal of network microsegmentation is to provide more granular security and reduce an attackers capab...


Search results for "Home Automation - HVAC"