Resources

Here you will find a complete collection of Nexus news, events, blog posts, guides, whitepapers, videos and more. Want to stay up-to-date? The Nexus newsletter contains news, updates from our Resources section and much more.  Enter your email address below and receive it free of charge. You can choose to unsubscribe at any time through the unsubscription link provided in every newsletter. 

Sign up for our newsletter

Nexus processes personal data in connection with your subscription to our newsletters. The processing is carried out to enable us to administer the subscription and send out the information and the legal basis is the performance of the contract concluded when you register as a subscriber.

For more information about how Nexus processes personal data, please visit our Privacy Policy.

  • All resources
  • Filter by category
    • Access control
    • Authentication
    • Blog
    • Cards & credentials
    • Connected vehicles
    • Customer Cases
    • ID06
    • IoT security
    • Lifecycle management
    • LTE
    • News
    • Online service
    • Other
    • PKI
    • Report
    • Research
    • Virtual smart cards
    • Whitepaper/Guide
    • Workforce
Blog

How to Send an Encrypted Email in Outlook

9 October, 2024
Did you know that 94% of malware is delivered via email? With cyber threats increasing, businesses must take extra precautions to secure their communications. One simple yet powerful solution is encrypting your emails.  In this blog, we’ll walk you through...
Blog

What is PCI SSC?

4 October, 2024
Did you know that global payment fraud losses hit $41 billion in 2023? As businesses continue to embrace digital payments, securing sensitive data has never been more important. That’s where the Payment Card Industry Security Standards Council (PCI SSC) co...
Blog

What is NIS2?

2 October, 2024
Cyberattacks are increasing rapidly, and the damage they cause can be severe! In fact, in 2022, over 50% of European companies reported facing some kind of cyberattack. To tackle this, the NIS2 directive was introduced to boost cybersecurity across the Eur...
Blog

How to Prevent Software Vulnerabilities?

25 September, 2024
Software vulnerabilities are a serious threat, especially for businesses managing IoT devices and security databases. If not addressed, these vulnerabilities can lead to cyberattacks, data breaches, and significant financial losses. Understanding how to pr...
Blog

How to Find Software Vulnerabilities?

24 September, 2024
Finding vulnerabilities in software is a critical task for any business aiming to protect its digital assets. Weaknesses in software can open doors for malicious actors, leading to data breaches and financial losses. As cyber threats continue to evolve, un...
Blog

What is Anti-spyware?

20 September, 2024
In an increasingly digital world, protecting sensitive information is vital for your businesses. Spyware, a type of malicious software designed to infiltrate and steal data, poses a major threat. This is where anti-spyware software comes into play!  Knowin...
Blog

What is Symmetric Encryption?

18 September, 2024
Symmetric encryption is a widely used method for securing data. It’s especially crucial for businesses that handle sensitive information, such as IoT devices and security databases. Understanding what symmetric encryption is, how it works, and how it’s use...
Blog

What is an Encrypted Email?

13 September, 2024
 Email communication is essential for businesses of all sizes. However, the convenience of email does come with a few security risks. Email encryption is the process of converting the content of an email into a code to prevent unauthorised access.   Did yo...