Shop by Store


Shop by Category

Home Automation

Cameras

Video

Alarm Systems

Recorders

Cables

Accessories

Power Supplies

Monitors

Wireless

Access Control

Business

Select a Brand:



Some of our Stores:

Smart Home, Inc

CHIEF

Spy Tec Inc

Shop Raspberry Pi at MCM Electronics

SimplexGrinnellStore.com



Home Automation News:

Targeted Attack Protection: A Review of Endgame's Endpoint Security Platform

SANS Analyst Dave Shackleford presents his experience reviewing Endgames Managed Detection and Response Services under real-world threats in a simulated environment....


Online Safety in a Foreign Language - Connecting with Teens

The inescapable dangers of our increasingly connected world are likely most threatening to our young adults. Teens, especially, see social media and related online platforms as inextricable from their public and private personas. These digital natives have grown up being comfortable with sharing all aspects of their lives with the Internet - without the healthy suspicion and caution of those who have seen the technology grow over the years. The importance of protecting our teenage Internet de...


Can the "Gorilla" Deliver? Assessing the Security of Google's New "Thread" Internet of Things (IoT) Protocol

Security incidents associated with Internet of Things (IoT) devices have recently gained high visibility, such as the Mirai botnet that exploited vulnerabilities in remote cameras and home routers. Currently, no industry standard exists to provide the right combination of security and ease-of-use in a low-power, low-bandwidth environment. In 2014, the Thread Group, Inc. released the new Thread networking protocol. Googles Nest Labs recently open-sourced their implementation of Thread in an attem...


AppSec: ROI Justifying Your AppSec Program Through Value-Stream Analysis

In this paper we focus narrowly on the impact of application security on the end-to-end software development value chain. We also look at ways to identify and balance cost and risk to help you decide which tools and practices are most practical and cost effective for your organization....


Cyber Security and Data Integrity Problems Within the GAMP 5 Validation Process

When addressing the pharmaceutical industrys computerized systems risk within manufacturing, the International Society for Pharmaceutical Engineering (ISPE) has created the Good Automated Manufacturing Process (GAMP) as a leading industry standard. It is a validation process based on user requirements and product quality that applies information security through its computer systems validation (CSV) guidance. Problems arise due to information security roles, methodologies and technical controls ...


Hardening BYOD: Implementing Critical Security Control 3 in a Bring Your Own Device (BYOD) Architecture

The increasing prevalence of Bring Your Own Device (BYOD) architecture poses many challenges to information security professionals. These include, but are not limited to: the risk of loss or theft, unauthorized access to sensitive corporate data, and lack of standardization and control. This last challenge can be particularly troublesome for an enterprise trying to implement the Center for Internet Security (CIS) Critical Security Controls for Effective Cyber Defense (CSCs). CSC 3, Secure Config...


Search results for "Home Automation - DiscSox"