India - Flag India

Please confirm your currency selection:

Indian Rupee
Incoterms:FCA (Shipping Point)
Duty, customs fees and taxes are collected at time of delivery.
Payment accepted in Credit cards only

US Dollars
Incoterms:FCA (Shipping Point)
Duty, customs fees and taxes are collected at time of delivery.
All payment options available

Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


Cybersecurity Challenges of Smart Cities Poornima Apte
Growing urbanization calls for digitalization to optimize resources, but this heightens risks for cyberattacks. Smart cities face threats like data breaches and ransomware. Implementing cybersecurity measures, such as Zero Trust and network segmentation, helps protect critical infrastructure.

Protect IoT Applications Using Three Key Security Enablers Stephen Evanczuk
Zero trust security builds on fundamental principles of security, but in the IoT domain, developers can find it easier to conform to those principles by taking advantage of three key security enablers: hardware-based security, defined security policies, and security health monitoring.

Hardware-based Trust Is Critical for Securing IoT Sravani Bhattacharjee
Designers can learn the crucial role of silicon-based security, and useful methodologies to embed trust in IoT hardware by applying the security principles of trusted computing to Internet of Things devices and architectures.

Securing IoT Products from Unique Threats Sravani Bhattacharjee
IoT products are vulnerable to several attack vectors and are frequently hacked for the lack of adequate security measures. This blog discusses the unique challenges of securing IoT and presents a methodical 4-tier system design approach to predictably secure IoT products.

Arm TechCon: Securing the IoT is the Call to Action Mouser Staff
Grant Imahara and electronics product experts from Mouser Electronics were at Arm TechCon 2017 to demonstrate how Arm-based products and technologies are shaping smarter cities. This year’s Arm TechCon featured embedded security as the overarching theme in keynotes, presentations, and exhibit floor time.

Securing IoT and IIoT Environments, Part 3 Michael Camp
In parts 1 and 2, we looked at protecting the MCU, data, and physical access. In the final part of this series we will examine network security.

All Authors

Show More Show More
View Blogs by Date

Archives