Nexus Blog

Here you will find posts covering the latest industry topics, Nexus product updates and more

Authentication Online service

This is how easy it is to have people digitally sign a PDF (video + text)

7 December, 2018
The cloud service Nexus GO PDF Signing enables all your users to make secure digital signatures on PDF documents. “We’ve made the service really ea...
Access control Authentication

How to choose what kind of electronic signatures to use

28 November, 2018
Before you get going with e-signing, it’s important to investigate what kind of e-signatures you need to ensure compliance with current and future ...
Authentication

The eIDAS regulation explained in 3 minutes

12 November, 2018
eIDAS – the European Union’s Electronic Identification, Authentication and Trust Services regulation – is being applied directly and in its entiret...
Access control Authentication Lifecycle management Online service

How to use external identity provider for Nexus’ security services

2 November, 2018
Many new use cases have emerged from the new partnership between the new European identity platform Verimi and the identity and security company Ne...
Other

“Today, Nexus sells ready-made products that the market demands”

1 November, 2018
GET TO KNOW Tobias Eng, Key Account Manager at Nexus, who left Nexus 2.5 years ago and now is back. "Nexus has made a great journey since then. Tod...
IoT security PKI

How to validate certificates in IoT devices

5 October, 2018
Public key infrastructure (PKI) certificates are the best available technology to use in internet of things (IoT) devices for secure communication,...
IoT security PKI

How to design a PKI certificate lifecycle management process for IoT devices

28 September, 2018
Public key infrastructure (PKI) certificates are straightforward to use in internet of things (IoT) devices for secure communication, access contro...
IoT security PKI

A brief history of modern communication security – and why PKI is the state of the art

24 September, 2018
Encryption techniques have been used for millennia to protect communication – first on Mesopotamian clay tablets and most recently in the internet ...
Connected vehicles Customer Cases

How a leading automaker uses the Nexus PKI platform to protect Car2X communication

17 September, 2018
How a leading automaker uses the Nexus PKI platform to protect Car2X communication One of the largest automakers in the world has opted for identi...
IoT security PKI

How to secure the internet of things with digital identities

14 September, 2018
Enabling secure digital identities based on certificates is a crucial step in risk management for the internet of things. In this text, IoT expert ...
1 2 3 4 5 11 12 13