中国 - 标记 中国

请确认您选择的货币:

美元
国际贸易术语:FCA (装运点)
关税、进口税费和其它税收在交货时收取。

Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


New Tech Tuesdays: Smarter Cybersecurity Starts with AI Mouser Technical Content Staff
AI and machine learning are reshaping cybersecurity through predictive analysis powered by real-time intrusion detection, malware analysis, and automated defense—dramatically improving response speed and accuracy.

Understanding the Dangers Posed by Generative AI Phishing Steven Keeping
Malicious actors are leveraging the power of Generative AI to turbocharge the phishing process. To combat hackers, cybersecurity professionals must understand how cybercriminals exploit the technology and then use AI to shield against attacks.

Cybersecurity Challenges of Smart Cities Poornima Apte
Growing urbanization calls for digitalization to optimize resources, but this heightens risks for cyberattacks. Smart cities face threats like data breaches and ransomware. Implementing cybersecurity measures, such as Zero Trust and network segmentation, helps protect critical infrastructure.

Key Trends Shaping the Future of Embedded Systems Brandon Lewis
Mouser Electronics will be an exhibitor at the first North American embedded world conference, October 8-10 in Austin, Texas. The event will showcase AI, cybersecurity, open-source, human-machine interfaces, expert panels, keynotes, and Mouser's “Circuit Showdown.”

How to Keep Cryptographic Keys Secure Steven Keeping
The internet exposes data to malicious intents, and while encryption protects it from hackers, cryptographic keys are often mishandled due to lax security procedures. Hardware security modules ensure keys remain secure and beyond the grasp of even the most determined hacker.

The Impact of Zero Trust Architecture on Network Security Engineers Brandon Lewis
Zero trust architectures (ZTAs) are transforming network security by enforcing stringent verification protocols, requiring network engineers to adopt new skills and collaborative approaches. Learn how identity governance, micro-segmentation, and automation are all important in implementing ZTAs.

Zonal Architectures for Future SDV Success Divya Garikapati
By addressing the challenges of implementing zonal architectures in software-defined vehicles, we enable these architectures to be safer, more adaptable, more efficient, and lead to more personalized transportation in the future.

Prioritize Embedded System Security for Edge Applications Brandon Lewis
Utilizing a zero-trust decentralized security framework approach can protect edge devices against threats using layers of defense, from securing the hardware components at the design level to implementing encryption protocols.

New Tech Tuesdays: Digital Engineering and Space Cybersecurity Rudy Ramos
In this week's New Tech Tuesday, we will explore cybersecurity kits from Infineon Technologies and Maxim Integrated, plus the importance of digital engineering in cybersecurity research.

New Tech Tuesdays: Cybersecurity Solutions for a Secure Smart Home Tommy Cummings
In this week's New Tech Tuesday, we'll look at turnkey solutions from Infineon Technologies and NXP Semiconductors and a key storage device from Microchip Technology.

All Authors

Show More Show More
View Blogs by Date

Archives