Nexus Blog

Here you will find posts covering the latest industry topics, Nexus product updates and more

Customer Cases IoT security PKI

Nexus enables seamless vehicle charging through Hubject

12 November, 2019
Nexus enables seamless vehicle charging through Hubject Hubject selected Nexus' IoT PKI as a Service to enable a seamless and secure service for i...
Authentication

ACME to enable Zero Trust for Enterprises

17 September, 2019
Certificate automation… could that really be secure and is it beneficial for your organisation? The ACME protocol, that was published as RFC 8555 i...
Access control Authentication Cards & credentials Lifecycle management Workforce

How to achieve a Zero Trust security model

5 September, 2019
Many organizations have understood that they need a new approach to digital workplace security – and that it is a matter of top priority. Cybercrim...
IoT security

Video: Why trusted identities are crucial in IoT projects

3 September, 2019
We are really happy to announce the release of the Nexus Smart ID Summer 2019 video. Here we try to package information on new features and solutio...
IoT security

Top Strategic IoT Trends and Technologies Through 2023 Gartner report

7 August, 2019
The Gartner report “Top Strategic IoT Trends and Technologies Through 2023” gives insight into the most important IoT trends and emerging technolog...
Access control Authentication

Encrypt emails to further improve information security

19 June, 2019
More and more organizations have a need for a smooth solution to secure emails. Managing the full lifecycle and securing the distribution of certif...
Authentication

14 steps to enforce a Zero Trust security model

10 May, 2019
Many organizations have understood that they need a new approach to digital workplace security – and that this should be a top priority. “Most secu...
Authentication

What is a Zero-trust security approach and why is it important?

13 March, 2019
An intense discussion and trend over the last few years has been to move away from on premises installed applications and replace them with cloud s...
Authentication

How to protect your Windows devices with multi-factor authentication

8 March, 2019
With the digitalization of the workplace, it’s becoming obvious that it is no longer secure to access digital resources with only usernames and sta...
IoT security PKI

Risks of the Internet of Things (IoT) and its solutions

4 March, 2019
Every second, the Internet of Things grows by 129 newly connected devices. By 2020 alone, 90 percent of all newly delivered cars should be connecte...
1 2 3 6 7 8