How to Secure Embedded Memory

By | Blog, Non volatile memory, Secure memory | No Comments

In an earlier blog I discussed the security challenges for embedded memory and stressed that making products, such as IoT-enabled devices, more secure should be taking a much higher priority than it currently is. And in another blog, I outlined how embedded memory might be attacked and offered some simple solutions. Now, it’s time to discuss how to secure embedded…

Read More

Is your facility connected? You are then at risk…

By | PR, Secure memory | No Comments

IoT-enabled devices used in industrial applications are vulnerable to many forms of cyberattack. Michael Barrett, managing director of Nexus Industrial Memory, outlines some ways in which devices might be attacked and suggests how they can be made more secure.   Security is a growing concern for the IoT and its industrial counterpart (the IIoT) so I won’t recount any numbers,…

Read More

Security Challenges For Embedded Memory

By | Blog, Secure memory | No Comments

In an earlier blog I discussed how embedded memory might be attacked through a forced memory buffer overflow, and I indicated how to protect against such an attack. However, while the countermeasures I suggested are relatively simple ones, certainly at the engineering level, there are other methods of attack which are harder to thwart. Also, the bigger picture of implementing…

Read More

Embedded But Exposed

By | Blog, Cyber Security, Secure memory | No Comments

With more and more operational technology systems becoming IoT-enabled, the attack surface for cyberattacks is getting larger. Michael Barrett, Managing Director of Nexus Industrial Memory, discusses threats and solutions. In the world of consumer electronics, the internet of things (IoT) provides authorised users with remote access to a wealth of smart appliances. Similarly, the industrial IoT (IIoT) provides authorised users…

Read More

How might an embedded system be attacked?

By | Blog, Secure memory | No Comments

IIoT-enabled operating technology (OT) embedded systems are exposed to risks from the moment their comms ports open. In this blog we’ll ask and answer the question ‘How might an embedded system be attacked?’ by considering the two common types of attack. Historically, embedded systems have been relatively secure. To steal data or install a rogue program, a hacker would need…

Read More