Nexus Blog

Here you will find posts covering the latest industry topics, Nexus product updates and more

IoT security PKI

New lightweight PKI technologies help secure constrained IoT devices

9 December, 2019
New lightweight PKI technologies help secure constrained IoT devices As billions of devices are being connected to the internet of things, securit...
Customer Cases IoT security PKI

Nexus enables seamless vehicle charging through Hubject

12 November, 2019
Nexus enables seamless vehicle charging through Hubject Hubject selected Nexus' IoT PKI as a Service to enable a seamless and secure service for i...
Authentication

ACME to enable Zero Trust for Enterprises

17 September, 2019
Certificate automation… could that really be secure and is it beneficial for your organisation? The ACME protocol, that was published as RFC 8555 i...
Access control Authentication Cards & credentials Lifecycle management Workforce

How to achieve a Zero Trust security model

5 September, 2019
Many organizations have understood that they need a new approach to digital workplace security – and that it is a matter of top priority. Cybercrim...
IoT security

Video: Why trusted identities are crucial in IoT projects

3 September, 2019
We are really happy to announce the release of the Nexus Smart ID Summer 2019 video. Here we try to package information on new features and solutio...
IoT security

Top Strategic IoT Trends and Technologies Through 2023 Gartner report

7 August, 2019
The Gartner report “Top Strategic IoT Trends and Technologies Through 2023” gives insight into the most important IoT trends and emerging technolog...
Access control Authentication

Encrypt emails to further improve information security

19 June, 2019
More and more organizations have a need for a smooth solution to secure emails. Managing the full lifecycle and securing the distribution of certif...
Authentication

14 steps to enforce a Zero Trust security model

10 May, 2019
Many organizations have understood that they need a new approach to digital workplace security – and that this should be a top priority. “Most secu...
Authentication

What is a Zero-trust security approach and why is it important?

13 March, 2019
An intense discussion and trend over the last few years has been to move away from on premises installed applications and replace them with cloud s...
Authentication

How to protect your Windows devices with multi-factor authentication

8 March, 2019
With the digitalization of the workplace, it’s becoming obvious that it is no longer secure to access digital resources with only usernames and sta...
1 2 3 6 7 8