In part 1 of this securing embedded memory blog, we considered how your data is at risk and concluded that security needs to start at the hardware level. And as your IIoT’s data resides in memory, that’s the best place to start. Isolation through partitioning is key to securing embedded memory. Partitioning is also great for achieving higher reliability and…
Unfortunately, it’s a fact of life that most distributors are just a local presence for their suppliers. They take orders. And they hold some stock. Thankfully, in the B2B engineering sectors, it’s somewhat different as there is, quite rightly, an expectation that value should be added. So, what is a value-added distributor? And what exactly is the nature of that…
In our increasingly connected world, embedded systems, such as those at the heart of IoT and IIoT devices, need to carry sensitive data. Accordingly, if you’re an embedded systems designer, you’re advised (certainly by us) to not only make security a priority from the start but also to think beyond just software measures. Securing embedded memory is the ideal starting…
If you’re an engineer and you need your data protected from the elements AND malicious threats, book a visit with our engineers at Embedded World 2022 now… Who are Nexus Industrial Memory? We provide specialist memory products, designed specifically for industrial systems and information security. Each product we supply addresses specific pain points that widely available products do not. Nexus…
Industrial IoT (IIoT) is at the heart of Industry 4.0, facilitating easy connectivity for harnessing and interpreting data, which in turn helps manufacturers tailor their predictive maintenance programmes for greater efficiency. However, with so many systems and devices in different networks, security is becoming a growing concern. There are various motivations for cyberattacks, some focus on data theft (to acquire…
The wireless revolution has changed lives for billions of people around the world, allowing us access to news, entertainment, education and assistance at the touch of a button, with no wires required. Occasionally, the wireless tech in our homes and businesses goes awry, and when it does, it’s usually a pretty minor inconvenience, where we have to restart the router,…
In an earlier blog I discussed the security challenges for embedded memory and stressed that making products, such as IoT-enabled devices, more secure should be taking a much higher priority than it currently is. And in another blog, I outlined how embedded memory might be attacked and offered some simple solutions. Now, it’s time to discuss how to secure embedded…
Open a newspaper, turn on the TV, head online for your daily dose of news, and there’s one subject that’s impossible to escape. And surprisingly, it’s nothing to do with a blonde, British Prime Minister. Instead, the tensions between Russia and Ukraine have taken over, with minute-by-minute news and commentary being relayed to us. As if the prospect of war…
Nexus Industrial Memory specialises in the provision of memory-based products designed especially for applications where commercial solutions are simply not secure enough, rugged enough or have no guaranteed long-term availability. Nexus Industrial Memory will be showcasing some of the electronics industry’s most secure embedded memory solutions on stand C75 at Southern Manufacturing & Electronics on 8-10th February in Farnborough and…
In an earlier blog I discussed how embedded memory might be attacked through a forced memory buffer overflow, and I indicated how to protect against such an attack. However, while the countermeasures I suggested are relatively simple ones, certainly at the engineering level, there are other methods of attack which are harder to thwart. Also, the bigger picture of implementing…