India - Flag India

Please confirm your currency selection:

Indian Rupee
Incoterms:FCA (Shipping Point)
Duty, customs fees and taxes are collected at time of delivery.
Payment accepted in Credit cards only

US Dollars
Incoterms:FCA (Shipping Point)
Duty, customs fees and taxes are collected at time of delivery.
All payment options available

Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


Hardware-based Trust Is Critical for Securing IoT Sravani Bhattacharjee
Designers can learn the crucial role of silicon-based security, and useful methodologies to embed trust in IoT hardware by applying the security principles of trusted computing to Internet of Things devices and architectures.

Keeping Edge Devices Secure in Process Setups M. Tim Jones
Modern processor architectures include security building blocks that can help you design secure edge devices. Here, we'll explore some of the most important features for edge computing and the security measures that will help keep your device and its data secure.

How to Secure Internet of Things Systems Charles Byers
As IoT systems become mission-critical, their security capabilities must keep pace. The addition of actuators to IoT systems creates the alarming potential for security breaches or hacking to injure or kill people. Hardware and software techniques described here can help keep IoT systems secure.

How AI Helps Fight Cybercrime Poornima Apte
Artificial Intelligence attends to a lot of the grunt work involved in cyber policing so analysts can focus on threat intelligence and more proactive responses, instead of simply putting out fires.

Eyes Up: Benefits of Centralized Logging Jeff Fellinge
Centralizing event data helps defenders run queries to spot anomalies, trends, and other phenomena otherwise not readily visible. The centralized logging of security events is a fundamental security control to help ensure attackers don’t go unnoticed.

SSH Part 3: Configuring SSH Reverse Tunnel to Reduce Exposed Ports Jeff Fellinge
You can use the Secure Shell (SSH) standard and tools for more than just secure remote administration. Learn how to use SSH port forwarding to securely connect to remote systems without exposing them to insecure networks.

SSH Part 1: Configuring SSH to Securely Connect to Remote Devices Jeff Fellinge
The Secure Shell (SSH) standard and tools provide essential command-line remote administration access for the secure and remote management of your IoT devices and cloud infrastructure. Learn how to configure SSH to securely connect to remote devices.

PKI Certificate Standards for IIoT Sravani Bhattacharjee
The security community is gravitating towards PKI to secure IoT. However, PKI certificates are considerably resource-intensive. This blog discusses the challenges of using PKI certificates for IoT as well as the new standards to overcome those challenges.

Penetration Testing and the Edge M. Tim Jones
Penetration testing (pen testing) is the evaluation of a network or device against known exploits using a variety of different types of tools. In this blog, you'll learn about Kali Linux, Metasploit, and some of the basic tools of the trade used to evaluate the security of edge devices.

Bluetooth® Heads in New Direction Steven Keeping
An upgrade to the Bluetooth® Core Specification, Bluetooth 5.1, adds direction finding capabilities. The enhancement promises much for applications such as indoor navigation, but implementation is challenging even for the experienced RF engineer.

All Authors

Show More Show More
View Blogs by Date