THE SAFE CHOICE FOR
INDUSTRIAL MEMORY AND DATA SECURITY

Be the first to see Datakey’s new Mini-Bar at Electronica, Munich in Hall 5, Booth C176!

Nexus Knowledge Centre

PUBLISHED TECHNICAL ARTICLES

Icon of a closed book with a rectangular label on the cover, symbolizing a Knowledge Centre. The spine features horizontal lines, hinting at text or design elements. The book is outlined in white on a transparent background.

How Secure Is Your Embedded Device?

For very good reason, security is getting its time in the sun right now. The world feels more unpredictable and dangerous than it has for quite some time, with tension all over the world. And as a design engineer, it falls on you to design products that are secure enough to counteract the threats that are out there.  You’ve got to protect sensitive data, prevent unauthorised access, and safeguard against cyber threats.
Icon of a closed book with a rectangular label on the cover, symbolizing a Knowledge Centre. The spine features horizontal lines, hinting at text or design elements. The book is outlined in white on a transparent background.

Protecting IIoT Devices From Cyber Attacks

Unsurprisingly, plenty of governments, organisations and companies are considering afresh what they can do to bolster their cybersecurity, in light of the very real threat of hacking and cyberattacks. With that in mind, we’d like to direct you to a recent article of ours published in Electronics World – Protecting IIoT devices from cyberattacks
Icon of a closed book with a rectangular label on the cover, symbolizing a Knowledge Centre. The spine features horizontal lines, hinting at text or design elements. The book is outlined in white on a transparent background.

Embedded But Exposed

With more and more operational technology systems becoming IoT enabled, the attack surface for cyber-attacks is getting larger. Michael Barrett discusses the threats and solutions.
Icon of a closed book with a rectangular label on the cover, symbolizing a Knowledge Centre. The spine features horizontal lines, hinting at text or design elements. The book is outlined in white on a transparent background.

All Round Protection

For many applications data collected in the field must be stored onto removable memory devices. Michael Barrett, MD of Nexus Industrial Memory, provides guidance on what to look for when selecting a drive for use in harsh environments
Icon of a closed book with a rectangular label on the cover, symbolizing a Knowledge Centre. The spine features horizontal lines, hinting at text or design elements. The book is outlined in white on a transparent background.

Non Volatile Memory (NVM ROM) Refresh

Non-volatile memory is used in most embedded systems. The question is : with all the different memory types available, which is the best to use, and why? This question is tackled in this technical blog.

Want to find out more?

We would love to hear from you…

FREE comparison guide – EEPROM Vs Flash Memory

Request for Brochure

"*" indicates required fields

Name*

By submitting this form, you agree to Nexus sending you occasional details about our goods and services, and other value-added information.
For more details, please see our Privacy Notice.