IIoT-enabled operating technology (OT) embedded systems are exposed to risks from the moment their comms ports open. In this blog we’ll ask and answer the question ‘How might an embedded system be attacked?’ by considering the two common types of attack. Historically, embedded systems have been relatively secure. To steal data or install a rogue program, a hacker would need…
SSDs are increasingly popular as a method for storing data, but they also open up the risk of cyberattacks. Secure erasing them is ideal for optimising PC performance, but also necessary for critical applications in case of attacks or data breaches. Thanks to an innovation from Flexxon, not only this security problem, but also multiple other issues created by using…
The modern world is heavily data-oriented and is reliant on technology that provides easy, fast and secure access to high volumes of data. In the past, hard disk drives (HDDs) were relied on for storage. Increasingly, Solid-State Drives (SSDs) are used. They provide much faster access than HDDs and, as they have no moving parts, reliability is much higher. Solid…
As Coronavirus COVID-19 continues to challenge our industry it’s important we don’t lower our guard against digital viruses. Michael Barrett, MD of Nexus Industrial Memory, explains how ‘going industrial’ can improve the security of applications that use removable memory devices. Cybersecurity is a growing concern in all sectors and the electronics industry is considered particularly at risk because it comprises…
NVM is used in most embedded systems, but with different memory types available which is best to use and why? Michael Barrett, Managing Director of Nexus Industrial Memory, provides a brief refresher course and touches on removable NVM devices. Many factors will govern your choice of non-volatile memory (NVM) technology. These include storage capacity, the speed with which data needs…
I wanted to share a couple of thoughts on the current manufacturing and supply issues around semi-conductors. It really is a significant problem at the moment – you know it’s bad when it reaches the mainstream media; just the other day I read in The Times newspaper that a couple of UK start-ups are in danger of going out of…
Various forms of malware, including the offspring of the Stuxnet worm that was written to hunt for controller hardware, are tailored to transfer via USB drive. Michael Barrett, MD of Nexus Industrial Memory, recommends the use of industrial form factor devices in all instances where the use of removable memory is essential to operations. Removable memory devices are used for…
One upshot of more time at home has been the increased opportunity to discover new things, and get some reading done and over the last couple of weeks, there’s a piece I’ve found hugely helpful for anyone who uses, or is considering using, product design reviews. Click here to give it a read. It’s not my work – it’s written…
There are many ways of incorporating this popular memory type into your embedded system, but one of the early questions to ask yourself is: permanent installation or have the ability to easily replace the EEPROM? Electrically erasable programmable read-only memory (E2PROM but more commonly called EEPROM) is one of five common non-volatile memory (NVM) types. Here’s how they compare: Read…
Datakey’s new CryptoAuthentication™ tokens, now available in the UK, Ireland, Germany, Austria, Switzerland and Scandinavia from Nexus Industrial Memory. The line comprises four products; the IAT4.5Kb, the IAX4.5Kb, the IAT10.5Kb and the IAX10.5Kb. All are ideal for embedded systems that require ‘cyber robust’ removable memory devices for applications that include the transfer of passwords (or other data needed for user…
Recent Comments