Nexus Blog

Here you will find posts covering the latest industry topics, Nexus product updates and more

Authentication

The benefits of 2FA

15 August, 2018
IT departments across all industries are fighting a constant battle to protect company networks from hackers and fraudsters. Two-factor authenticat...
LTE PKI

The big car makers are taking 5G telecoms into a head-to-head with the US g...

16 May, 2018
Interesting article in today’s Wall Street Journal. The big car makers are taking 5G (next gen) telecoms into a head-to-head with the US government...
Authentication

Three ways of building a cost-efficient and secure IT management system

2 May, 2018
IT departments are being asked to do more with less, despite a growing list of challenges and threats. Under such circumstances, it is vital that I...
Authentication

How to implement a better login method than passwords – in 2 hours

24 April, 2018
Passwords have once again gotten a lot of negative attention, and a steady stream of organizations are moving to more secure and user-friendly iden...
IoT security PKI

eTravel is on its way of becoming largely PKI-based

20 April, 2018
The story of international travel, built around air travel, passport documents, and visa processes, is a story of success. The journey to future gr...
Authentication

9 reasons why your users will love your organization for saying goodbye to ...

18 April, 2018
Passwords are a hassle for both internal and external users, and there are now better login methods available.
Authentication

Bringing two-factor authentication (2FA) and Office 365 together

11 April, 2018
The challenges facing technology manager are moving at unprecedented pace, with the areas of digital transformation and security presenting new thr...
Authentication

How to get rid of password management and other help desk errands

9 April, 2018
Corporate IT help desks can easily become swamped by non-tech savvy users needing repeated assistance with the most mundane of tasks, such as passw...
Authentication Lifecycle management

10 reasons why users are the biggest threat to your company’s IT envi...

5 April, 2018
Your people are one of your company's most valuable assets, but unfortunately users can also be one of your biggest threat when it comes to securin...
Authentication Lifecycle management

Why you should protect Office 365 with an easy-to-use and versatile 2FA sol...

4 April, 2018
Implementing two-factor authentication (2FA) for logging into Office 365 is one important puzzle piece in utilizing the cloud without compromising ...
1 2 3 4 5 6 7 8