Change Location EUR
 
Mouser Europe - Flag Mouser Europe

Incoterms: DDP is available to customers in EU Member States.
All prices include duty and customs fees on select shipping methods.

Incoterms: DDU applies to most non-EU customers.
Duty, customs fees and taxes are collected at time of delivery.


Please confirm your currency selection:

Euros
Euros are accepted for payment only in EU member states these countries.

US Dollars
USD is accepted in all countries.

Other currency options may also be available - see
Mouser Worldwide.

Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


New MCU Hardware Enhances IoT Security Steven Keeping
Hackers are getting smarter and quickly finding new ways to circumvent IoT chip protection. However, chip makers are rising to the challenge by enhancing MCU hardware security. Developers can now use Root-of-Trust, secure processing, and fault injection protection to guard against malicious attacks.

New Tech Tuesdays: Progression of Authentication: Comparing Passwords, Passphrases, and Passkeys Rudy Ramos
Human errors and behaviors pose the biggest vulnerabilities in cybersecurity. With password security issues at the top of the list, understanding authentication best practices has never been so important. Continuous education and a security-conscious culture are essential in mitigating these risks.

The IoT Machine Authentication Dilemma Jon Gabay
There are more machine-to-machine communications today than person-to-person. Securing the exponentially growing number of IoT devices is no simple task. Can a device authenticate who it is talking to? If everything can be accessed from anywhere, is anything truly safe?

Why Blockchain and IoT Belong Together Tyler Wojciechowicz
IoT and blockchain technologies are taking off in many diverse industries. But have you considered combining the two together? Learn how an IoT-enabled blockchain unlocks process efficiencies, increases security, and allows for cost-savings.

IoT Device Management Affects System Design Sravani Bhattacharjee
Gone are the days of manual provisioning of devices and equipment. In the world of the Internet of Things, millions of devices are provisioned and managed using cloud-based services. How does that affect system design? What new factors must be considered during system design?

Unclonable PUF Function Can Boost MCU Security Christine Young
Want to make hacker's life a lot harder—and protect your customers and your business? Learn how a secure microcontroller with physically unclonable function (PUF) technology can be your best friend.

How IoT System Design Makes a Difference Sravani Bhattacharjee
In highly competitive IoT markets, it is hard to ensure secure design without tilting tight pricing and time-to-market. We’ll discuss a systematic, full-stack approach that simplifies security design for IoT systems by leveraging various security enabler solutions.

PKI Certificate Standards for IIoT Sravani Bhattacharjee
The security community is gravitating towards PKI to secure IoT. However, PKI certificates are considerably resource-intensive. This blog discusses the challenges of using PKI certificates for IoT as well as the new standards to overcome those challenges.

Protect Device Communication Through Secure Protocols Jeff Fellinge
Stop attackers from snooping or tampering with your data by ensuring that your devices and systems use secure protocols for communicating with each other and other services across the internet and in the cloud.

Surface Area Management of Embedded Devices through Host and Network Based Firewalls Jeff Fellinge
Lower the risk of a successful attack on your network-connected devices by understanding the network ports and protocols they use and disabling or filtering those they do not need.

All Authors

Show More Show More
View Blogs by Date

Archives