The best possible protection for the data and program files in your embedded system comes to Embedded World 2022 …

By | Blog | No Comments

If you’re an engineer and you need your data protected from the elements AND malicious threats, book a visit with our engineers at Embedded World 2022 now… Who are Nexus Industrial Memory? We provide specialist memory products, designed specifically for industrial systems and information security. Each product we supply addresses specific pain points that widely available products do not. Nexus…

Read More

Protecting IIoT Devices From Cyber Attacks

By | Blog, Cyber Security | No Comments

Industrial IoT (IIoT) is at the heart of Industry 4.0, facilitating easy connectivity for harnessing and interpreting data, which in turn helps manufacturers tailor their predictive maintenance programmes for greater efficiency. However, with so many systems and devices in different networks, security is becoming a growing concern. There are various motivations for cyberattacks, some focus on data theft (to acquire…

Read More

How to Accurately Pair Wireless Medical Devices with a Physical Token

By | Blog, Wireless medical devices | No Comments

The wireless revolution has changed lives for billions of people around the world, allowing us access to news, entertainment, education and assistance at the touch of a button, with no wires required. Occasionally, the wireless tech in our homes and businesses goes awry, and when it does, it’s usually a pretty minor inconvenience, where we have to restart the router,…

Read More

How to Secure Embedded Memory

By | Blog, Non volatile memory, Secure memory | No Comments

In an earlier blog I discussed the security challenges for embedded memory and stressed that making products, such as IoT-enabled devices, more secure should be taking a much higher priority than it currently is. And in another blog, I outlined how embedded memory might be attacked and offered some simple solutions. Now, it’s time to discuss how to secure embedded…

Read More

Cyber Secure Memory – Live demonstrations

By | Blog | No Comments

Nexus Industrial Memory specialises in the provision of memory-based products designed especially for applications where commercial solutions are simply not secure enough, rugged enough or have no guaranteed long-term availability. Nexus Industrial Memory will be showcasing some of the electronics industry’s most secure embedded memory solutions on stand C75 at Southern Manufacturing & Electronics on 8-10th February in Farnborough and…

Read More

Security Challenges For Embedded Memory

By | Blog, Secure memory | No Comments

In an earlier blog I discussed how embedded memory might be attacked through a forced memory buffer overflow, and I indicated how to protect against such an attack. However, while the countermeasures I suggested are relatively simple ones, certainly at the engineering level, there are other methods of attack which are harder to thwart. Also, the bigger picture of implementing…

Read More

Embedded But Exposed

By | Blog, Cyber Security, Secure memory | No Comments

With more and more operational technology systems becoming IoT-enabled, the attack surface for cyberattacks is getting larger. Michael Barrett, Managing Director of Nexus Industrial Memory, discusses threats and solutions. In the world of consumer electronics, the internet of things (IoT) provides authorised users with remote access to a wealth of smart appliances. Similarly, the industrial IoT (IIoT) provides authorised users…

Read More

All Round Protection

By | Blog, Harsh environments | No Comments

For many applications data collected in the field must be stored onto removable memory devices. Michael Barrett, MD of Nexus Industrial Memory, provides guidance on what to look for when selecting a drive for use in harsh environments. Data logging is at the heart of condition monitoring which, in the industrial sector, for example, is at the heart of predictive…

Read More

How might an embedded system be attacked?

By | Blog, Secure memory | No Comments

IIoT-enabled operating technology (OT) embedded systems are exposed to risks from the moment their comms ports open. In this blog we’ll ask and answer the question ‘How might an embedded system be attacked?’ by considering the two common types of attack. Historically, embedded systems have been relatively secure. To steal data or install a rogue program, a hacker would need…

Read More