Blog

Blog

Stay informed on the latest trends,
insight and research in cybersecurity with swIDch Blog.

Popular

Tackling Authentication Vulnerabilities in OT Devices Beyond PLCs
Tackling Authentication Vulnerabilities in OT Devices Beyond PLCs
Nov 25 2024

Operational Technology (OT) devices, including SCADA systems, Distributed Control Systems (DCS),...

Read More
The Authentication Dilemma: Rising Vulnerabilities and Reluctance to Patch in OT
The Authentication Dilemma: Rising Vulnerabilities and Reluctance to Patch in OT
Nov 08 2024

In today's digital age, the importance of robust cybersecurity cannot be overstated. Yet, despite...

Read More
Tackling Legacy Vulnerabilities to Enhance OT Cybersecurity Through Robust Authentication Solutions
Tackling Legacy Vulnerabilities to Enhance OT Cybersecurity Through Robust Authentication Solutions
Nov 04 2024

In the fast-evolving realm of operational technology (OT), the infusion of digital systems into...

Read More
The Rise of Authentication Vulnerabilities in OT
The Rise of Authentication Vulnerabilities in OT
Oct 14 2024

There has been a noticeable rise in authentication vulnerabilities in Operational Technology (OT)...

Read More
Default Passwords: The Silent Threat to Critical Infrastructure
Default Passwords: The Silent Threat to Critical Infrastructure
Oct 01 2024

As industrial systems become increasingly interconnected, the operational technology (OT) landscape...

Read More
Authentication Bypass: CWE-294 & CVE-2024-3596 Deep Dive
Authentication Bypass: CWE-294 & CVE-2024-3596 Deep Dive
Sep 16 2024

In the ever-evolving landscape of cybersecurity, two critical vulnerabilities have recently come to...

Read More
The Urgent Need for Enhanced OT Security in an AI-Driven World
The Urgent Need for Enhanced OT Security in an AI-Driven World
Sep 02 2024

As artificial intelligence (AI) continues to evolve and integrate into various industries, it...

Read More
Spotlight on PLC Security Risks and Industrial Vulnerabilities
Spotlight on PLC Security Risks and Industrial Vulnerabilities
Aug 05 2024

In today's interconnected industrial landscape, the security of Programmable Logic Controllers...

Read More
To Encrypt or not to Encrypt in OT Networks
To Encrypt or not to Encrypt in OT Networks
Jul 17 2024

When I transitioned from cybersecurity in IT to Operational Technology (OT), I was initially...

Read More
Securing the Seas through Advanced Authentication Revolutionising Safer and Cleaner Shipping
Securing the Seas through Advanced Authentication Revolutionising Safer and Cleaner Shipping
Jul 01 2024

The maritime industry is undergoing a significant transformation, driven by the dual imperatives of...

Read More

Featured

Evaluating PKI and OTAC for Secure Operational Technology
Evaluating PKI and OTAC for ...
Read More
Why Are Cyberattacks on OT Systems More Dangerous Than IT Breaches?
Why Are Cyberattacks on OT ...
Read More
Securing OT: Moving Beyond Passwords with swIDch's OTAC
Securing OT: Moving Beyond ...
Read More

Looking to stay up-to-date with our latest news?

Subscribe to our newsletter