Nexus Knowledge Centre
TECHNICAL BLOGS
The best possible protection for the data and program files in your embedded system comes to Embedded World 2022 …
If you’re an engineer and you need your data protected from the elements AND malicious threats, book a visit with our engineers at Embedded World 2022 now… Who are Nexus Industrial Memory? We provide specialist memory products, designed specifically for industrial systems and information security.
The wireless revolution has changed lives for billions of people around the world, allowing us access to news, entertainment, education and assistance at the touch of a button, with no wires required. Occasionally, the wireless tech in our homes and businesses goes awry, and when
In an earlier blog I discussed the security challenges for embedded memory and stressed that making products, such as IoT-enabled devices, more secure should be taking a much higher priority than it currently is. And in another blog, I outlined how embedded memory might be
Open a newspaper, turn on the TV, head online for your daily dose of news, and there’s one subject that’s impossible to escape. And surprisingly, it’s nothing to do with a blonde, British Prime Minister. Instead, the tensions between Russia and Ukraine have taken over,
Nexus Industrial Memory specialises in the provision of memory-based products designed especially for applications where commercial solutions are simply not secure enough, rugged enough or have no guaranteed long-term availability. Nexus Industrial Memory will be showcasing some of the electronics industry’s most secure embedded memory
IoT-enabled devices used in industrial applications are vulnerable to many forms of cyberattack. Michael Barrett, managing director of Nexus Industrial Memory, outlines some ways in which devices might be attacked and suggests how they can be made more secure. Security is a growing concern
In an earlier blog I discussed how embedded memory might be attacked through a forced memory buffer overflow, and I indicated how to protect against such an attack. However, while the countermeasures I suggested are relatively simple ones, certainly at the engineering level, there are
IIoT-enabled operating technology (OT) embedded systems are exposed to risks from the moment their comms ports open. In this blog we’ll ask and answer the question ‘How might an embedded system be attacked?’ by considering the two common types of attack. Historically, embedded systems have
SSDs are increasingly popular as a method for storing data, but they also open up the risk of cyberattacks. Secure erasing them is ideal for optimising PC performance, but also necessary for critical applications in case of attacks or data breaches. Thanks to an innovation
The modern world is heavily data-oriented and is reliant on technology that provides easy, fast and secure access to high volumes of data. In the past, hard disk drives (HDDs) were relied on for storage. Increasingly, Solid-State Drives (SSDs) are used. They provide much faster
As Coronavirus COVID-19 continues to challenge our industry it’s important we don’t lower our guard against digital viruses. Michael Barrett, MD of Nexus Industrial Memory, explains how ‘going industrial’ can improve the security of applications that use removable memory devices. Cybersecurity is a growing concern
I wanted to share a couple of thoughts on the current manufacturing and supply issues around semi-conductors. It really is a significant problem at the moment – you know it’s bad when it reaches the mainstream media; just the other day I read in The
Various forms of malware, including the offspring of the Stuxnet worm that was written to hunt for controller hardware, are tailored to transfer via USB drive. Michael Barrett, MD of Nexus Industrial Memory, recommends the use of industrial form factor devices in all instances where
One upshot of more time at home has been the increased opportunity to discover new things, and get some reading done and over the last couple of weeks, there’s a piece I’ve found hugely helpful for anyone who uses, or is considering using, product design
There are many ways of incorporating this popular memory type into your embedded system, but one of the early questions to ask yourself is: permanent installation or have the ability to easily replace the EEPROM? Electrically erasable programmable read-only memory (E2PROM but more commonly called
Datakey’s new CryptoAuthentication™ tokens, now available in the UK, Ireland, Germany, Austria, Switzerland and Scandinavia from Nexus Industrial Memory. The line comprises four products; the IAT4.5Kb, the IAX4.5Kb, the IAT10.5Kb and the IAX10.5Kb. All are ideal for embedded systems that require ‘cyber robust’ removable memory
GB Electronics (UK) Ltd (GBE) selects Datakey® RUGGEDrive™ UFX tokens and IP67-rated UR4410IM receptacles for use in harsh environment data logging applications. Data logging in harsh environments is a challenge, especially where environmental monitoring plays an essential role in modern life. Data regarding wind speed,
Electronic systems tend not to like high vibration levels or G forces, but sometimes they just can’t be avoided; they’re just aspects of the harsh environments. It’s no surprise therefore that when removable industrial memory devices are used in motorsports – for quick data transfer
Want to find out more?
We would love to hear from you…
"*" indicates required fields