Nexus Knowledge Centre
TECHNICAL BLOGS
In an increasingly digitalised world, businesses are relying on efficient memory products to streamline their operations and improve their overall performance. With the increasing demand for customised solutions tailored to different industries, it is crucial for businesses to select and customise memory products that best
In today’s digital age, data security has become a top priority for individuals and businesses alike. With the rise of cyber threats and data breaches, safeguarding sensitive information has become more crucial than ever before. Flexxon, a leading innovator in flash storage solutions, has taken
The issue of embedded Multimedia Card versus Solid State Drive (eMMC vs SSD) can be a consideration for PC or laptop storage, the designers of embedded systems requiring the storage of relatively large volumes of (local) data may be pondering the issue too. Both
The chances are you know that WORM stands for write-once-read-many times. A WORM kit improves data security in the workplace and in your embedded systems. Data cannot be erased or manipulated once written to Flexxon’s Write-Once-Read-Many (WORM) SD cards and microSD cards, and in-built, unalterable
The difference between an encrypted and unencrypted memory stick An encrypted USB drive and a memory stick (also known as a USB flash drive) are both portable storage devices that use USB technology to transfer data between computers. However, there are some important differences between
Non-volatile memory express (NVMe) is a storage protocol that allows users to get the most out of high-performance flash based solid-state drives (SSD). It is well suited to multicore processing, and many simultaneous I/O operations can be accommodated, which has made NVMe SSD extremely popular
In part 1 of this securing embedded memory blog, we considered how your data is at risk and concluded that security needs to start at the hardware level. And as your IIoT’s data resides in memory, that’s the best place to start. Isolation through partitioning
Unfortunately, it’s a fact of life that most distributors are just a local presence for their suppliers. They take orders. And they hold some stock. Thankfully, in the B2B engineering sectors, it’s somewhat different as there is, quite rightly, an expectation that value should be
In our increasingly connected world, embedded systems, such as those at the heart of IoT and IIoT devices, need to carry sensitive data. Accordingly, if you’re an embedded systems designer, you’re advised (certainly by us) to not only make security a priority from the start

The best possible protection for the data and program files in your embedded system comes to Embedded World 2022 …
If you’re an engineer and you need your data protected from the elements AND malicious threats, book a visit with our engineers at Embedded World 2022 now… Who are Nexus Industrial Memory? We provide specialist memory products, designed specifically for industrial systems and information security.
The wireless revolution has changed lives for billions of people around the world, allowing us access to news, entertainment, education and assistance at the touch of a button, with no wires required. Occasionally, the wireless tech in our homes and businesses goes awry, and when
In an earlier blog I discussed the security challenges for embedded memory and stressed that making products, such as IoT-enabled devices, more secure should be taking a much higher priority than it currently is. And in another blog, I outlined how embedded memory might be
Open a newspaper, turn on the TV, head online for your daily dose of news, and there’s one subject that’s impossible to escape. And surprisingly, it’s nothing to do with a blonde, British Prime Minister. Instead, the tensions between Russia and Ukraine have taken over,
Nexus Industrial Memory specialises in the provision of memory-based products designed especially for applications where commercial solutions are simply not secure enough, rugged enough or have no guaranteed long-term availability. Nexus Industrial Memory will be showcasing some of the electronics industry’s most secure embedded memory
IoT-enabled devices used in industrial applications are vulnerable to many forms of cyberattack. Michael Barrett, managing director of Nexus Industrial Memory, outlines some ways in which devices might be attacked and suggests how they can be made more secure. Security is a growing concern
In an earlier blog I discussed how embedded memory might be attacked through a forced memory buffer overflow, and I indicated how to protect against such an attack. However, while the countermeasures I suggested are relatively simple ones, certainly at the engineering level, there are
IIoT-enabled operating technology (OT) embedded systems are exposed to risks from the moment their comms ports open. In this blog we’ll ask and answer the question ‘How might an embedded system be attacked?’ by considering the two common types of attack. Historically, embedded systems have
SSDs are increasingly popular as a method for storing data, but they also open up the risk of cyberattacks. Secure erasing them is ideal for optimising PC performance, but also necessary for critical applications in case of attacks or data breaches. Thanks to an innovation
Want to find out more?
We would love to hear from you…
"*" indicates required fields