Bench Talk | Security
 
Canada - Flag Canada

Please confirm your currency selection:

Canadian Dollars
Incoterms:DDP
All prices include duty and customs fees on select shipping methods.
Free shipping on most orders over $100 (CAD)

US Dollars
Incoterms:FCA (Shipping Point)
Duty, customs fees and GST collected at time of delivery.
Free shipping on most orders over $100 (USD)

Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


New Tech Tuesdays: Real Biometric Solutions for Consumer Devices Rudy Ramos
Products that help obtain and process biometric data show great promise in future consumer devices. This week's New Tech Tuesday will look at biometric solution products from Maxim Integrated and Kneron and their potential in consumer devices.

New Tech Tuesdays: What’s Driving Vehicle Safety, Security, and Performance? Rudy Ramos
In this week's New Tech Tuesday, we'll look at the roles the Infineon Traveo™ II microcontroller and Molex MXP120 sealed connector system can play in automotive safety, security, and performance.

Practical Tips for Embedded System Security Mike Parks
The sheer number of embedded system devices makes them an increasingly valuable target for bad actors looking to run illegal botnets and cryptocurrency mining operations. This blog outlines practical security measures developers can use in their embedded designs.

Securing the Edge in an Insecure World Robin Mitchell
With more than 21 billion IoT devices worldwide and an increased reliance on cloud computing, security is critical. Yet, billions of devices remain vulnerable to attack. How did the industry become so insecure, what is edge computing, and how can it, along with hardware, improve edge device security?

The IoT Machine Authentication Dilemma Jon Gabay
There are more machine-to-machine communications today than person-to-person. Securing the exponentially growing number of IoT devices is no simple task. Can a device authenticate who it is talking to? If everything can be accessed from anywhere, is anything truly safe?

Establishing Secure Authentication in Automotive Paul Golata
Maxim Integrated, now a part of Analog Devices, offers solutions that ensure vehicle safety and reliability by authenticating automotive components. Learn how the DS28E40 DeepCover® Automotive 1-Wire Authenticator provides embedded security for automotive applications.

Edge Security in an Insecure World M. Tim Jones
Security is often an afterthought in edge device design. Edge devices can be secured when you understand how they can be exploited. In this blog, we'll explore access security, data security, and manageability as the means to ensure your edge device doesn't become the next security incident headline.

Eight Principles of IoT Security Jackie Padgett
Embedded development engineers face many challenges implementing security measures. Developers can use eight principles to make the task of securing IoT systems much easier. In this post, we will discuss these eight principles.

Windows Subsystem Boosts Linux 2.0 Jeff Fellinge
Windows Subsystem for Linux 2.0 advances Microsoft’s commitment to enhance interoperation with Linux environments with increased file system performance and better support for Linux system calls. WSL 2 promises to bring more Linux tools to your Windows workstation without having to spin up a separate virtual machine or remotely connect to another system.

How to Increase Container Security Awareness Jeff Fellinge
Docker containers are increasingly the go-to technology for virtualized cloud deployments. Containers are more portable, easier to scale, and can be more secure than traditional virtual machines. But the tools and processes to secure and manage these new technologies must also be container aware or you could have gaps in your defenses.

All Authors

Show More Show More
View Blogs by Date