Nexus Blog

Here you will find posts covering the latest industry topics, Nexus product updates and more

IoT security Online service PKI

Identities for IoT devices soon available as a Service  

23 January, 2019
Nexus launches a cloud service for issuance of digital identities (PKI certificates) for IoT devices. Ordering a test environment enables Nexus cus...
Authentication Online service

How “What You See Is What You Sign” works

12 December, 2018
What You See Is What You Sign (WYSIWYS) refers to the part of the signature process where you read the document you intend to sign and ensure that ...
Authentication Online service

This is how easy it is to have people digitally sign a PDF (video + text)

7 December, 2018
The cloud service Nexus GO PDF Signing enables all your users to make secure digital signatures on PDF documents. “We’ve made the service really ea...
Access control Authentication

How to choose what kind of electronic signatures to use

28 November, 2018
Before you get going with e-signing, it’s important to investigate what kind of e-signatures you need to ensure compliance with current and future ...
Authentication

The eIDAS regulation explained in 3 minutes

12 November, 2018
eIDAS – the European Union’s Electronic Identification, Authentication and Trust Services regulation – is being applied directly and in its entiret...
Access control Authentication Lifecycle management Online service

How to use external identity provider for Nexus’ security services

2 November, 2018
Many new use cases have emerged from the new partnership between the new European identity platform Verimi and the identity and security company Ne...
IoT security PKI

How to validate certificates in IoT devices

5 October, 2018
Public key infrastructure (PKI) certificates are the best available technology to use in internet of things (IoT) devices for secure communication,...
IoT security PKI

How to design a PKI certificate lifecycle management process for IoT device...

28 September, 2018
Public key infrastructure (PKI) certificates are straightforward to use in internet of things (IoT) devices for secure communication, access contro...
IoT security PKI

A brief history of modern communication security – and why PKI is the state...

24 September, 2018
Encryption techniques have been used for millennia to protect communication – first on Mesopotamian clay tablets and most recently in the internet ...
IoT security PKI

How to secure the internet of things with digital identities

14 September, 2018
Enabling secure digital identities based on certificates is a crucial step in risk management for the internet of things. In this text, IoT expert ...
1 2 3 4 6 7 8