Nexus Blog

Here you will find posts covering the latest industry topics, Nexus product updates and more

IoT security PKI

How to validate certificates in IoT devices

5 October, 2018
Public key infrastructure (PKI) certificates are the best available technology to use in internet of things (IoT) devices for secure communication,...
IoT security PKI

How to design a PKI certificate lifecycle management process for IoT devices

28 September, 2018
Public key infrastructure (PKI) certificates are straightforward to use in internet of things (IoT) devices for secure communication, access contro...
IoT security PKI

A brief history of modern communication security – and why PKI is the state of the art

24 September, 2018
Encryption techniques have been used for millennia to protect communication – first on Mesopotamian clay tablets and most recently in the internet ...
Connected vehicles Customer Cases

How a leading automaker uses the Nexus PKI platform to protect Car2X communication

17 September, 2018
How a leading automaker uses the Nexus PKI platform to protect Car2X communication One of the largest automakers in the world has opted for identi...
IoT security PKI

How to secure the internet of things with digital identities

14 September, 2018
Enabling secure digital identities based on certificates is a crucial step in risk management for the internet of things. In this text, IoT expert ...
IoT security

To make the Internet of Things safe, start with manufacturing

11 September, 2018
In this blog, and in an accompanying interview on the Thales Blog with our colleague Daniel Hjort from Nexus Group, we discuss the challenges that ...
Connected vehicles PKI

How the Nexus PKI platform helps secure connected vehicles

6 September, 2018
Enabling trusted digital identities for all connected devices and services is a critical part of securing vehicle-to-everything (V2X) communication...
PKI

Public key infrastructure (PKI) explained in 4 minutes

3 September, 2018
The public key infrastructure (PKI) security method has seen a major upswing in popularity and is used for everything from enabling internet of thi...
Access control Lifecycle management Workforce

5 biggest time thieves and cost allocators in the IT department

29 August, 2018
No matter which sector you're in, IT departments of all shapes and sizes face similar challenges when it comes to managing resources. If you're not...
Authentication

The benefits of 2FA

15 August, 2018
IT departments across all industries are fighting a constant battle to protect company networks from hackers and fraudsters. Two-factor authenticat...
1 2 3 4 5 6 7 13 14 15