Change Location Europe - Flag EUR
 
Mouser Europe - Flag Mouser Europe

Incoterms: DDP is available to customers in EU Member States.
All prices include duty and customs fees on select shipping methods.

Incoterms: DDU applies to most non-EU customers.
Duty, customs fees and taxes are collected at time of delivery.


Please confirm your currency selection:

Euros
Euros are accepted for payment only in EU member states these countries.

US Dollars
USD is accepted in all countries.

Other currency options may also be available - see
Mouser Worldwide.

Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


IoT Developers Must Consider Design and Security M. Tim Jones
The landscape of technology for connected device development has exploded recently. A considerable number of challenges are associated with Internet of Things development and deployment, which means designers should consider interoperability, security and data protection, and data fatigue.

Unclonable PUF Function Can Boost MCU Security Christine Young
Want to make hacker's life a lot harder—and protect your customers and your business? Learn how a secure microcontroller with physically unclonable function (PUF) technology can be your best friend.

DIGI Seminar to Discuss Remote Working Solutions Tommy Cummings
Mouser Electronics is sponsoring a webinar with DIGI® titled “Secure, Reliable Connections: Networking Strategies for Remote Workers.” Registration is being accepted for the seminar, which starts at 10 a.m. (CST) April 14 and will also be available on demand after the event.

How Gateways Can Secure IoT Architectures Sravani Bhattacharjee
IoT gateways are typically considered edge aggregation and computing equipment. Their security role is mostly understated, during system requirements and design. Here’s how IoT gateways can act as a major security component in IoT architectures, from the edge to the cloud.

Hardware-based Trust Is Critical for Securing IoT Sravani Bhattacharjee
Designers can learn the crucial role of silicon-based security, and useful methodologies to embed trust in IoT hardware by applying the security principles of trusted computing to Internet of Things devices and architectures.

Keeping Edge Devices Secure in Process Setups M. Tim Jones
Modern processor architectures include security building blocks that can help you design secure edge devices. Here, we'll explore some of the most important features for edge computing and the security measures that will help keep your device and its data secure.

How to Secure Internet of Things Systems Charles Byers
As IoT systems become mission-critical, their security capabilities must keep pace. The addition of actuators to IoT systems creates the alarming potential for security breaches or hacking to injure or kill people. Hardware and software techniques described here can help keep IoT systems secure.

How AI Helps Fight Cybercrime Poornima Apte
Artificial Intelligence attends to a lot of the grunt work involved in cyber policing so analysts can focus on threat intelligence and more proactive responses, instead of simply putting out fires.

Eyes Up: Benefits of Centralized Logging Jeff Fellinge
Centralizing event data helps defenders run queries to spot anomalies, trends, and other phenomena otherwise not readily visible. The centralized logging of security events is a fundamental security control to help ensure attackers don’t go unnoticed.

SSH Part 3: Configuring SSH Reverse Tunnel to Reduce Exposed Ports Jeff Fellinge
You can use the Secure Shell (SSH) standard and tools for more than just secure remote administration. Learn how to use SSH port forwarding to securely connect to remote systems without exposing them to insecure networks.

All Authors

Show More Show More
View Blogs by Date