Resources

Here you will find a complete collection of Nexus news, events, blog posts, guides, whitepapers, videos and more. Want to stay up-to-date? The Nexus newsletter contains news, updates from our Resources section and much more.  Enter your email address below and receive it free of charge. You can choose to unsubscribe at any time through the unsubscription link provided in every newsletter. 

Sign up for our newsletter

Nexus processes personal data in connection with your subscription to our newsletters. The processing is carried out to enable us to administer the subscription and send out the information and the legal basis is the performance of the contract concluded when you register as a subscriber.

For more information about how Nexus processes personal data, please visit our Privacy Policy.

  • All resources
  • Filter by category
    • Access control
    • Authentication
    • Blog
    • Cards & credentials
    • Connected vehicles
    • Customer Cases
    • ID06
    • IoT security
    • Lifecycle management
    • LTE
    • News
    • Online service
    • Other
    • PKI
    • Report
    • Research
    • Virtual smart cards
    • Whitepaper/Guide
    • Workforce
Blog IoT security News PKI Workforce Workplace Zero Trust

Google’s drastic decision is a hard lesson on Crypto-Agility

25 July, 2024
In the wake of the recent incident, organizations must strengthen their digital trust framework by focusing on crypto-agility.
Blog

Difference Between Symmetric and Asymmetric Cryptography

25 July, 2024
What is the Difference Between Asymmetric and Symmetric Cryptography? Cryptography plays a crucial role in Public Key Infrastructure (PKI) by ensuring secure communication and data protection. In PKI, cryptographic techniques are used to encrypt data, auth...
Blog

Who Invented Public Key Cryptography?

23 July, 2024
Public key cryptography is a security technique that uses a pair of public and private keys for encrypting and decrypting data. It allows you to securely exchange information over the Internet, ensuring your communications and data are protected from unaut...
Blog

What is Asymmetric Cryptography?

18 July, 2024
Asymmetric cryptography has revolutionised the security of communications over insecure networks. It provides a robust method within your Public Key Infrastructure (PKI) framework for protecting data and ensuring privacy. With this encryption method, you c...
Blog

What is Public and Private Key in Cryptography? 

16 July, 2024
What is the Difference Between Public and Private Key Cryptography Public Key Infrastructure (PKI) is a comprehensive framework that enhances the security of digital communications and transactions within organisations. PKI utilises encryption as a measure...
Blog

What is Public Key Cryptography?

11 July, 2024
What is Public Key Cryptography and How Does it Work? Public key cryptography is a fundamental component of Public Key Infrastructure (PKI). It enables secure data exchange, authentication, and integrity verification, making it essential for businesses loo...
Blog

Expert Interview | Secure identity management with PKI

9 July, 2024
In this interview, we sit down with Tarun to understand how Nexus Smart ID PKI helps promote digital trust across industries.
Blog

What is Edge Computing in IoT?

9 July, 2024
The term “Internet of Things” (IoT) first came up in 1999, and since then, it has changed how businesses operate worldwide. IoT devices sit at the edge of networks where they gather data and send it to centralised services or the cloud. This da...