Romania - Flag Romania

Please confirm your currency selection:

LEU
Incoterms:DDP
All prices include duty and customs fees on select shipping methods.
Free shipping on most orders over 380 RON (RON).
Payment accepted in Credit cards only

Euros
Incoterms:DDP
All prices include duty and customs fees on select shipping methods.
Free shipping on most orders over 75 € (EUR).
All payment options available

US Dollars
Incoterms:DDP
All prices include duty and customs fees on select shipping methods.
Free shipping on most orders over $90 (USD).
All payment options available

Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


Connecting to the Google Cloud IoT with the AVR-IoT WG Eval Board Greg Toth
The Microchip AC164160 AVR-IoT WG Evaluation Board allows you to prototype sensor applications using a secure-element cryptographic coprocessor and low-power microcontroller to securely connect to the Google Cloud IoT.

Help Defenders Effectively Investigate Incidents with Event Logs Jeff Fellinge
Event logs include a treasure trove of information that security defenders rely on to investigate and resolve security incidents. Help your defenders quickly and effectively respond to incidents by carefully choosing which events to log and the pertinent information to include.

Router Security Vulnerabilities Could Compromise the IoT Steven Keeping
Wi-Fi routers offer a cheap, convenient gateway to connect IoT sensors to the Cloud, but tests reveal the devices have weak security. As the IoT grows, they could prove even more enticing targets for hackers. New developments bring more protection, but other technologies could prove a better option.

Securing IoT Products from Unique Threats Sravani Bhattacharjee
IoT products are vulnerable to several attack vectors and are frequently hacked for the lack of adequate security measures. This blog discusses the unique challenges of securing IoT and presents a methodical 4-tier system design approach to predictably secure IoT products.

Next-generation Firewalls: More than ACL Filters Jeff Fellinge
Next-generation firewall capabilities and features now extend far beyond their traditional predecessors and are worth a serious look for many different scenarios from small-home office to enterprise.

Protect Device Communication Through Secure Protocols Jeff Fellinge
Stop attackers from snooping or tampering with your data by ensuring that your devices and systems use secure protocols for communicating with each other and other services across the internet and in the cloud.

How Device Inventory and Dependency Management Help Secure Larger Systems Jeff Fellinge
Building and maintaining a solid inventory of all on-premise and cloud-based assets with helpful metadata is a critical step to ensuring your security programs include all of your systems.

Threat Modeling Your Device Operations Helps Identify Unwanted Exposure Jeff Fellinge
Discover potential vulnerabilities and predict how your devices, network, and operations would survive an attack by performing regular threat modeling.

Configuration Management: Creating Baseline Configurations for Your Devices Reduces Security Gaps Jeff Fellinge
Lower the operational costs and improve the security of your systems and devices through configuration baselines that define exactly how these devices and technologies that you rely on every day should be correctly set up.

Security Fundamentals Begin with Patching: The Importance of Vulnerability Management in Preventing Attacks Jeff Fellinge
Drive down risk to your devices, systems, and networks by ensuring you have in place a robust vulnerability management process that combines policy and practice to reliably keep your systems running up-to-date software and all recommended security updates.

All Authors

Show More Show More
View Blogs by Date

Archives