United States - Flag United States

Please confirm your currency selection:

Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


How AI Helps Fight Cybercrime Poornima Apte
Artificial Intelligence attends to a lot of the grunt work involved in cyber policing so analysts can focus on threat intelligence and more proactive responses, instead of simply putting out fires.

Eyes Up: Benefits of Centralized Logging Jeff Fellinge
Centralizing event data helps defenders run queries to spot anomalies, trends, and other phenomena otherwise not readily visible. The centralized logging of security events is a fundamental security control to help ensure attackers don’t go unnoticed.

SSH Part 3: Configuring SSH Reverse Tunnel to Reduce Exposed Ports Jeff Fellinge
You can use the Secure Shell (SSH) standard and tools for more than just secure remote administration. Learn how to use SSH port forwarding to securely connect to remote systems without exposing them to insecure networks.

SSH Part 1: Configuring SSH to Securely Connect to Remote Devices Jeff Fellinge
The Secure Shell (SSH) standard and tools provide essential command-line remote administration access for the secure and remote management of your IoT devices and cloud infrastructure. Learn how to configure SSH to securely connect to remote devices.

PKI Certificate Standards for IIoT Sravani Bhattacharjee
The security community is gravitating towards PKI to secure IoT. However, PKI certificates are considerably resource-intensive. This blog discusses the challenges of using PKI certificates for IoT as well as the new standards to overcome those challenges.

Penetration Testing and the Edge M. Tim Jones
Penetration testing (pen testing) is the evaluation of a network or device against known exploits using a variety of different types of tools. In this blog, you'll learn about Kali Linux, Metasploit, and some of the basic tools of the trade used to evaluate the security of edge devices.

Bluetooth® Heads in New Direction Steven Keeping
An upgrade to the Bluetooth® Core Specification, Bluetooth 5.1, adds direction finding capabilities. The enhancement promises much for applications such as indoor navigation, but implementation is challenging even for the experienced RF engineer.

Use the Renesas AE-CLOUD2 to Send GPS Data to the Google Cloud IoT Greg Toth
Use this kit to prototype sensor and location tracking applications that connect to the Google Cloud IoT via Ethernet, Wi-Fi, or LTE Cat-M1/Cat-NM1/EGPRS LTE cellular networks. Create applications that read sensors, connect to the Internet, and communicate real-time sensor data to the Google Cloud.

Connecting to the Google Cloud IoT with the AVR-IoT WG Eval Board Greg Toth
The Microchip AC164160 AVR-IoT WG Evaluation Board allows you to prototype sensor applications using a secure-element cryptographic coprocessor and low-power microcontroller to securely connect to the Google Cloud IoT.

Help Defenders Effectively Investigate Incidents with Event Logs Jeff Fellinge
Event logs include a treasure trove of information that security defenders rely on to investigate and resolve security incidents. Help your defenders quickly and effectively respond to incidents by carefully choosing which events to log and the pertinent information to include.

All Authors

Show More Show More
View Blogs by Date