Nexus Blog

Here you will find posts covering the latest industry topics, Nexus product updates and more

IoT security PKI

How Tesla should have protected its app – instead of blaming the user

28 November, 2016
A security company has shown how easy it is for a hacker to take over a Tesla car via its owner’s mobile app. Tesla says it is the user’s own fault...
Other

This is Nexus – and why our customers put their trust in us

15 November, 2016
Lars Pettersson, CEO of identity and security company Nexus Group, on what kind of firm Nexus is – and why a quickly increasing number of organizat...
IoT security

This is how drones could take over and turn off the lights in a city

11 November, 2016
Researchers have shown how hackers easily could take over all light bulbs in a city. Björn Söland, internet of things (IoT) expert at identity and ...
PKI

“Say goodbye to physical security”

26 October, 2016
The line between physical and digital security is getting increasingly blurry – and will soon disappear altogether, according to Daniel Hjort, busi...
IoT security

50 billion online gadgets – all of them need an identity

29 September, 2016
Billions of online gadgets are expected in the future – gigantic amounts of information are expected that should not get on the loose. The internet...
Authentication

How to reduce the risk of fraud

29 September, 2016
How can banks and businesses reduce the risk of fraud, and what preventive actions should be taken? We provide tips about the most important steps ...
Authentication

5 ways to get hacked

29 September, 2016
How safe are you on the web? We list the top five steps to becoming a victim of a hacker attack.
Access control Authentication

Identify yourself! 5 steps to secure identity management

29 September, 2016
Why do units need an identity and what are the risks associated with unprotected connectivity? We explain the concept and guide you through abbrevi...
Authentication

Sign digitally! 5 advantages with Citizen ID (eID for citizens)

29 September, 2016
How does Citizen ID work and what are the advantages with electronic identification? We have listed 5 reasons for implementation of eID for secure ...
Authentication

The future of electronic identification

29 September, 2016
Procure both interim system and integration with standardized identity certificates. Simultaneously. Otherwise, your e-service will not function wh...
1 2 3 10 11 12 13 14