Nexus Blog

Here you will find posts covering the latest industry topics, Nexus product updates and more

IoT security PKI

How to design a PKI certificate lifecycle management process for IoT devices

28 September, 2018
Public key infrastructure (PKI) certificates are straightforward to use in internet of things (IoT) devices for secure communication, access contro...
IoT security PKI

A brief history of modern communication security – and why PKI is the state of the art

24 September, 2018
Encryption techniques have been used for millennia to protect communication – first on Mesopotamian clay tablets and most recently in the internet ...
Connected vehicles Customer Cases IoT IoT security

How a leading automaker uses the Nexus PKI platform to protect Car2X communication

17 September, 2018
How a leading automaker uses the Nexus PKI platform to protect Car2X communication One of the largest automakers in the world has opted for identi...
IoT security PKI

How to secure the internet of things with digital identities

14 September, 2018
Enabling secure digital identities based on certificates is a crucial step in risk management for the internet of things. In this text, IoT expert ...
IoT security

To make the Internet of Things safe, start with manufacturing

11 September, 2018
In this blog, and in an accompanying interview on the Thales Blog with our colleague Daniel Hjort from Nexus Group, we discuss the challenges that ...
Connected vehicles PKI

How the Nexus PKI platform helps secure connected vehicles

6 September, 2018
Enabling trusted digital identities for all connected devices and services is a critical part of securing vehicle-to-everything (V2X) communication...
PKI

What is Public Key Infrastructure? 

3 September, 2018
What is Public Key Infrastructure?  The Public Key Infrastructure (PKI) security method has seen a major upswing in popularity and is used for eve...
Access control Lifecycle management Workforce

5 biggest time thieves and cost allocators in the IT department

29 August, 2018
No matter which sector you're in, IT departments of all shapes and sizes face similar challenges when it comes to managing resources. If you're not...
Authentication

The benefits of 2FA

15 August, 2018
IT departments across all industries are fighting a constant battle to protect company networks from hackers and fraudsters. Two-factor authenticat...
Cards & credentials

4 reasons to upgrade to multifunctional smart cards

12 July, 2018
Multifunctional smart cards – that is, cards that can be used for a wide range of applications – are becoming increasingly popular. “There are 4 ma...
1 2 3 8 9 10 11 12 17 18 19