Bench Talk for Design Engineers

Bench Talk

rss

Bench Talk for Design Engineers | The Official Blog of Mouser Electronics


New MCU Hardware Enhances IoT Security Steven Keeping
Hackers are getting smarter and quickly finding new ways to circumvent IoT chip protection. However, chip makers are rising to the challenge by enhancing MCU hardware security. Developers can now use Root-of-Trust, secure processing, and fault injection protection to guard against malicious attacks.

Keeping Data Secure in a Post-Quantum Computer World Steven Keeping
Encryption protects internet data from cybercriminals. But quantum computers will easily break the keys based on current algorithms. To fight back, engineers have spent years developing post-quantum cryptography algorithms that tomorrow’s computers will find impossible to crack.

How to Keep Cryptographic Keys Secure Steven Keeping
The internet exposes data to malicious intents, and while encryption protects it from hackers, cryptographic keys are often mishandled due to lax security procedures. Hardware security modules ensure keys remain secure and beyond the grasp of even the most determined hacker.

How Unbreakable is the Blockchain? Jon Gabay
Blockchain security has gained attention and praise from many. Looking at the process, software, and weaknesses leaves doubts as to how effective it really is. So, how secure is blockchain?

Assessing Risk on Home Network Security Devices Jeff Fellinge
Many options are available today to protect your IoT and other smart devices. These devices monitor network usage, look for common misconfigurations, and alert you to possible vulnerabilities or activities that could allow an attacker into your home network and grant access to your sensitive data.

Understanding How Quantum Technologies Can Work Liam Critchley
Quantum technologies are starting to be developed, and if realized to their full potential, will be able to outperform classical computing technologies in many ways. Here, we look at the theory behind how basic quantum technologies are starting to work and how certain functions will work in the future.

Unclonable PUF Function Can Boost MCU Security Christine Young
Want to make hacker's life a lot harder—and protect your customers and your business? Learn how a secure microcontroller with physically unclonable function (PUF) technology can be your best friend.

SSH Part 3: Configuring SSH Reverse Tunnel to Reduce Exposed Ports Jeff Fellinge
You can use the Secure Shell (SSH) standard and tools for more than just secure remote administration. Learn how to use SSH port forwarding to securely connect to remote systems without exposing them to insecure networks.

SSH Part 2: Configuring SSH from a Windows 10 Workstation Jeff Fellinge
Microsoft’s support for the Windows Subsystem for Linux and the OpenSSH standard increases your options to manage Linux-based cloud environments and IoT devices. Use these tools to securely authenticate your devices and encrypt all communications.

SSH Part 1: Configuring SSH to Securely Connect to Remote Devices Jeff Fellinge
The Secure Shell (SSH) standard and tools provide essential command-line remote administration access for the secure and remote management of your IoT devices and cloud infrastructure. Learn how to configure SSH to securely connect to remote devices.

All Authors

Mostra altri Mostra altri
Visualizza i blog per Data

Archivio