Nexus Blog

Here you will find posts covering the latest industry topics, Nexus product updates and more

Connected vehicles

Video: How a leading automaker uses the Nexus PKI platform to protect Car2X communication

11 September, 2019
In this 9-minute video, public key infrastructure (PKI) expert Tamás Horváth explains how a leading automaker protects car-to-everything (Car2X, al...
Access control Authentication Cards & credentials Lifecycle management Workforce

How to achieve a Zero Trust security model

5 September, 2019
Many organizations have understood that they need a new approach to digital workplace security – and that it is a matter of top priority. Cybercrim...
IoT security

Video: Why trusted identities are crucial in IoT projects

3 September, 2019
We are really happy to announce the release of the Nexus Smart ID Summer 2019 video. Here we try to package information on new features and solutio...
Access control Authentication

Encrypt emails to further improve information security

19 June, 2019
More and more organizations have a need for a smooth solution to secure emails. Managing the full lifecycle and securing the distribution of certif...
Authentication

14 steps to enforce a Zero Trust security model

10 May, 2019
Many organizations have understood that they need a new approach to digital workplace security – and that this should be a top priority. “Most secu...
Lifecycle management Workforce

How PSD2 affects payment service providers – and how Nexus can help with compliance

26 April, 2019
The new Payment Services Directive (PSD2) is having massive impact on the European payment service landscape. Christophe Cauche, technical account ...
Other

“I’ll make sure we create an amazing user experience”

1 April, 2019
GET TO KNOW Fredrik Broman, vice president of engineering at identity and security company Nexus Group. “What makes me tick is delivering innovativ...
Authentication

What is a Zero-trust security approach and why is it important?

13 March, 2019
An intense discussion and trend over the last few years has been to move away from on premises installed applications and replace them with cloud s...
Authentication

How to protect your Windows devices with multi-factor authentication

8 March, 2019
With the digitalization of the workplace, it’s becoming obvious that it is no longer secure to access digital resources with only usernames and sta...
IoT security PKI

Risks of the Internet of Things (IoT) and its solutions

4 March, 2019
Every second, the Internet of Things grows by 129 newly connected devices. By 2020 alone, 90 percent of all newly delivered cars should be connecte...
1 2 3 4 11 12 13