Change Location Europe - Flag EUR
 
Mouser Europe - Flag Mouser Europe

Incoterms: DDP is available to customers in EU Member States.
All prices include duty and customs fees on select shipping methods.

Incoterms: DDU applies to most non-EU customers.
Duty, customs fees and taxes are collected at time of delivery.


Please confirm your currency selection:

Euros
Euros are accepted for payment only in EU member states these countries.

US Dollars
USD is accepted in all countries.

Other currency options may also be available - see
Mouser Worldwide.

Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


Protect Device Communication Through Secure Protocols Jeff Fellinge
Stop attackers from snooping or tampering with your data by ensuring that your devices and systems use secure protocols for communicating with each other and other services across the internet and in the cloud.

How Device Inventory and Dependency Management Help Secure Larger Systems Jeff Fellinge
Building and maintaining a solid inventory of all on-premise and cloud-based assets with helpful metadata is a critical step to ensuring your security programs include all of your systems.

Threat Modeling Your Device Operations Helps Identify Unwanted Exposure Jeff Fellinge
Discover potential vulnerabilities and predict how your devices, network, and operations would survive an attack by performing regular threat modeling.

Configuration Management: Creating Baseline Configurations for Your Devices Reduces Security Gaps Jeff Fellinge
Lower the operational costs and improve the security of your systems and devices through configuration baselines that define exactly how these devices and technologies that you rely on every day should be correctly set up.

Security Fundamentals Begin with Patching: The Importance of Vulnerability Management in Preventing Attacks Jeff Fellinge
Drive down risk to your devices, systems, and networks by ensuring you have in place a robust vulnerability management process that combines policy and practice to reliably keep your systems running up-to-date software and all recommended security updates.

Identify Anomalous Device Behavior Through Logging and Alerting Jeff Fellinge
Logging and alerting are fundamental tools for detecting not only errors and creating maintenance tickets but also helping defenders detect attackers by piecing together individual events into a bigger picture.

Surface Area Management of Embedded Devices through Host and Network Based Firewalls Jeff Fellinge
Lower the risk of a successful attack on your network-connected devices by understanding the network ports and protocols they use and disabling or filtering those they do not need.

Unraveling the Gordian Knot of IoT Security Stephen Evanczuk
Manufacturers may well find that even the most robust technological solutions to IoT security aren’t enough.

Securing Embedded Systems in Industrial Environments Jeremy Cook
As industrial machinery becomes more and more automated, engineers and IT personnel must take security into account. Engineers must also design hardware with security in mind, a task made easier with Maxim’s DeepCover Security Reference Design.

Achieving Security Requires Much More Than Just Robust Technology Stephen Evanczuk
Although systems developers can draw on robust security technologies, effective security requires a combination of technologies, practices, and policies—and acceptance by each stakeholder of their own role in maintaining security.

All Authors

Show More Show More
View Blogs by Date