THE SAFE CHOICE FOR
INDUSTRIAL MEMORY AND DATA SECURITY

Be the first to see Datakey’s new Mini-Bar at Electronica, Munich in Hall 5, Booth C176!

Nexus Knowledge Centre

TECHNICAL BLOGS

An icon depicting a white pencil crossing a triangular ruler and a straight ruler, symbolizing design or drafting, on a transparent background. Perfect for use in a Knowledge Centre environment to enhance creative learning resources.

A Comprehensive Guide to Industrial Memory Product Selection and Customisation

In an increasingly digitalised world, businesses are relying on efficient memory products to streamline their operations and improve their overall performance. With the increasing demand for customised solutions tailored to different industries, it is crucial for businesses to select and customise memory products that best

An icon depicting a white pencil crossing a triangular ruler and a straight ruler, symbolizing design or drafting, on a transparent background. Perfect for use in a Knowledge Centre environment to enhance creative learning resources.

Make data invisible – Flexxon X-Mask™

In today’s digital age, data security has become a top priority for individuals and businesses alike. With the rise of cyber threats and data breaches, safeguarding sensitive information has become more crucial than ever before. Flexxon, a leading innovator in flash storage solutions, has taken

An icon depicting a white pencil crossing a triangular ruler and a straight ruler, symbolizing design or drafting, on a transparent background. Perfect for use in a Knowledge Centre environment to enhance creative learning resources.

eMMC vs SSD: Which to use, where and why

  The issue of embedded Multimedia Card versus Solid State Drive (eMMC vs SSD) can be a consideration for PC or laptop storage, the designers of embedded systems requiring the storage of relatively large volumes of (local) data may be pondering the issue too. Both

An icon depicting a white pencil crossing a triangular ruler and a straight ruler, symbolizing design or drafting, on a transparent background. Perfect for use in a Knowledge Centre environment to enhance creative learning resources.

Write-Once-Read-Many (WORM) tamper proof technology

The chances are you know that WORM stands for write-once-read-many times. A WORM kit improves data security in the workplace and in your embedded systems. Data cannot be erased or manipulated once written to Flexxon’s Write-Once-Read-Many (WORM) SD cards and microSD cards, and in-built, unalterable

An icon depicting a white pencil crossing a triangular ruler and a straight ruler, symbolizing design or drafting, on a transparent background. Perfect for use in a Knowledge Centre environment to enhance creative learning resources.

Why and Where to Use an Encrypted USB Memory Stick?

The difference between an encrypted and unencrypted memory stick An encrypted USB drive and a memory stick (also known as a USB flash drive) are both portable storage devices that use USB technology to transfer data between computers. However, there are some important differences between

An icon depicting a white pencil crossing a triangular ruler and a straight ruler, symbolizing design or drafting, on a transparent background. Perfect for use in a Knowledge Centre environment to enhance creative learning resources.

Why use NVMe SSD?

Non-volatile memory express (NVMe) is a storage protocol that allows users to get the most out of high-performance flash based solid-state drives (SSD). It is well suited to multicore processing, and many simultaneous I/O operations can be accommodated, which has made NVMe SSD extremely popular

An icon depicting a white pencil crossing a triangular ruler and a straight ruler, symbolizing design or drafting, on a transparent background. Perfect for use in a Knowledge Centre environment to enhance creative learning resources.

Securing Your Data at the Hardware Level

In part 1 of this securing embedded memory blog, we considered how your data is at risk and concluded that security needs to start at the hardware level. And as your IIoT’s data resides in memory, that’s the best place to start. Isolation through partitioning

An icon depicting a white pencil crossing a triangular ruler and a straight ruler, symbolizing design or drafting, on a transparent background. Perfect for use in a Knowledge Centre environment to enhance creative learning resources.

What is a Value-Added Distributor?

Unfortunately, it’s a fact of life that most distributors are just a local presence for their suppliers. They take orders. And they hold some stock. Thankfully, in the B2B engineering sectors, it’s somewhat different as there is, quite rightly, an expectation that value should be

An icon depicting a white pencil crossing a triangular ruler and a straight ruler, symbolizing design or drafting, on a transparent background. Perfect for use in a Knowledge Centre environment to enhance creative learning resources.

How Secure Is Your Data?

In our increasingly connected world, embedded systems, such as those at the heart of IoT and IIoT devices, need to carry sensitive data. Accordingly, if you’re an embedded systems designer, you’re advised (certainly by us) to not only make security a priority from the start

An icon depicting a white pencil crossing a triangular ruler and a straight ruler, symbolizing design or drafting, on a transparent background. Perfect for use in a Knowledge Centre environment to enhance creative learning resources.

The best possible protection for the data and program files in your embedded system comes to Embedded World 2022 …

If you’re an engineer and you need your data protected from the elements AND malicious threats, book a visit with our engineers at Embedded World 2022 now… Who are Nexus Industrial Memory? We provide specialist memory products, designed specifically for industrial systems and information security.

An icon depicting a white pencil crossing a triangular ruler and a straight ruler, symbolizing design or drafting, on a transparent background. Perfect for use in a Knowledge Centre environment to enhance creative learning resources.

How to Accurately Pair Wireless Medical Devices with a Physical Token

The wireless revolution has changed lives for billions of people around the world, allowing us access to news, entertainment, education and assistance at the touch of a button, with no wires required. Occasionally, the wireless tech in our homes and businesses goes awry, and when

An icon depicting a white pencil crossing a triangular ruler and a straight ruler, symbolizing design or drafting, on a transparent background. Perfect for use in a Knowledge Centre environment to enhance creative learning resources.

How to Secure Embedded Memory

In an earlier blog I discussed the security challenges for embedded memory and stressed that making products, such as IoT-enabled devices, more secure should be taking a much higher priority than it currently is. And in another blog, I outlined how embedded memory might be

An icon depicting a white pencil crossing a triangular ruler and a straight ruler, symbolizing design or drafting, on a transparent background. Perfect for use in a Knowledge Centre environment to enhance creative learning resources.

Cybersecurity in light of Russian turmoil

Open a newspaper, turn on the TV, head online for your daily dose of news, and there’s one subject that’s impossible to escape. And surprisingly, it’s nothing to do with a blonde, British Prime Minister. Instead, the tensions between Russia and Ukraine have taken over,

An icon depicting a white pencil crossing a triangular ruler and a straight ruler, symbolizing design or drafting, on a transparent background. Perfect for use in a Knowledge Centre environment to enhance creative learning resources.

Cyber Secure Memory – Live demonstrations

Nexus Industrial Memory specialises in the provision of memory-based products designed especially for applications where commercial solutions are simply not secure enough, rugged enough or have no guaranteed long-term availability. Nexus Industrial Memory will be showcasing some of the electronics industry’s most secure embedded memory

An icon depicting a white pencil crossing a triangular ruler and a straight ruler, symbolizing design or drafting, on a transparent background. Perfect for use in a Knowledge Centre environment to enhance creative learning resources.

Is your facility connected? You are then at risk…

IoT-enabled devices used in industrial applications are vulnerable to many forms of cyberattack. Michael Barrett, managing director of Nexus Industrial Memory, outlines some ways in which devices might be attacked and suggests how they can be made more secure.   Security is a growing concern

An icon depicting a white pencil crossing a triangular ruler and a straight ruler, symbolizing design or drafting, on a transparent background. Perfect for use in a Knowledge Centre environment to enhance creative learning resources.

Security Challenges For Embedded Memory

In an earlier blog I discussed how embedded memory might be attacked through a forced memory buffer overflow, and I indicated how to protect against such an attack. However, while the countermeasures I suggested are relatively simple ones, certainly at the engineering level, there are

An icon depicting a white pencil crossing a triangular ruler and a straight ruler, symbolizing design or drafting, on a transparent background. Perfect for use in a Knowledge Centre environment to enhance creative learning resources.

How might an embedded system be attacked?

IIoT-enabled operating technology (OT) embedded systems are exposed to risks from the moment their comms ports open. In this blog we’ll ask and answer the question ‘How might an embedded system be attacked?’ by considering the two common types of attack. Historically, embedded systems have

An icon depicting a white pencil crossing a triangular ruler and a straight ruler, symbolizing design or drafting, on a transparent background. Perfect for use in a Knowledge Centre environment to enhance creative learning resources.

How to securely erase an SSD and deliver sustainable embedded cybersecurity

SSDs are increasingly popular as a method for storing data, but they also open up the risk of cyberattacks. Secure erasing them is ideal for optimising PC performance, but also necessary for critical applications in case of attacks or data breaches. Thanks to an innovation

Want to find out more?

We would love to hear from you…

FREE comparison guide – EEPROM Vs Flash Memory

Request for Brochure

"*" indicates required fields

Name*

By submitting this form, you agree to Nexus sending you occasional details about our goods and services, and other value-added information.
For more details, please see our Privacy Notice.