Nexus Logo industrial memory 180px tall

THE SAFE CHOICE FOR
INDUSTRIAL MEMORY AND DATA SECURITY

Search
Close this search box.

Secure memory

Updates from the Nexus team

Data security is essential in sensitive environments such as hospitals, financial services and government organisations. USB-based malware attacks are not uncommon in today’s digital society and according to a new report from Mandiant, researchers say in the first half of...

In today’s digital age, data security has become a top priority for individuals and businesses alike. With the rise of cyber threats and data breaches, safeguarding sensitive information has become more crucial than ever before. Flexxon, a leading innovator in...

The chances are you know that WORM stands for write-once-read-many times. A WORM kit improves data security in the workplace and in your embedded systems. Data cannot be erased or manipulated once written to Flexxon’s Write-Once-Read-Many (WORM) SD cards and...

The difference between an encrypted and unencrypted memory stick An encrypted USB drive and a memory stick (also known as a USB flash drive) are both portable storage devices that use USB technology to transfer data between computers. However, there...

In part 1 of this securing embedded memory blog, we considered how your data is at risk and concluded that security needs to start at the hardware level. And as your IIoT’s data resides in memory, that’s the best place...

In our increasingly connected world, embedded systems, such as those at the heart of IoT and IIoT devices, need to carry sensitive data. Accordingly, if you’re an embedded systems designer, you’re advised (certainly by us) to not only make security...

In an earlier blog I discussed the security challenges for embedded memory and stressed that making products, such as IoT-enabled devices, more secure should be taking a much higher priority than it currently is. And in another blog, I outlined...

IoT-enabled devices used in industrial applications are vulnerable to many forms of cyberattack. Michael Barrett, managing director of Nexus Industrial Memory, outlines some ways in which devices might be attacked and suggests how they can be made more secure.  ...

In an earlier blog I discussed how embedded memory might be attacked through a forced memory buffer overflow, and I indicated how to protect against such an attack. However, while the countermeasures I suggested are relatively simple ones, certainly at...

IIoT-enabled operating technology (OT) embedded systems are exposed to risks from the moment their comms ports open. In this blog we’ll ask and answer the question ‘How might an embedded system be attacked?’ by considering the two common types of...

Request for Brochure

"*" indicates required fields

Name*

By submitting this form, you agree to Nexus sending you occasional details about our goods and services, and other value-added information.
For more details, please see our Privacy Notice.