Blog

Blog

Stay informed on the latest trends,
insight and research in cybersecurity with swIDch Blog.

Popular

Risks of Default Passwords: Why Passwords are a Relic of the Past
Risks of Default Passwords: Why Passwords are a Relic of the Past
Jan 22 2024

Artificial intelligence (AI) is pervasive in today’s world, especially in the domain of cyber...

Read More
Navigating the Digital Jungle: Hot Cybersecurity Trends for 2024
Navigating the Digital Jungle: Hot Cybersecurity Trends for 2024
Jan 02 2024

The online world is in constant flux, and so are the threats lurking within it. Fear not, intrepid...

Read More
A Comprehensive Guide to NIS2 Compliance and Operational Technology Resilience
A Comprehensive Guide to NIS2 Compliance and Operational Technology Resilience
Dec 12 2023

The NIS2 Directive is the EU-wide legislation on cybersecurity. It provides legal measures to boost...

Read More
Underestimating the Vulnerabilities of Authentication Processes on PLCs: A Perilous Oversight
Underestimating the Vulnerabilities of Authentication Processes on PLCs: A Perilous Oversight
Nov 22 2023

In the realm of industrial automation, PLCs (Programmable Logic Controllers) play a pivotal role in...

Read More
How to put your customers in control of their digital Identity even if they lose their phone
How to put your customers in control of their digital Identity even if they lose their phone
Nov 07 2023

In a hyper connected world mobile phones have become an essential part of our lives, not only for...

Read More
Passwordless Authentication: The Next Step in Cybersecurity
Passwordless Authentication: The Next Step in Cybersecurity
Oct 24 2023

Many industries are changing their authentication systems to passwordless systems. Technology...

Read More
Identity Defined Security (IDS) to Safeguard the Digital Realm
Identity Defined Security (IDS) to Safeguard the Digital Realm
Oct 10 2023

Cyber security is a term that has become ubiquitous in today’s digital world. Everyone is aware of...

Read More
Protecting Industrial Control Systems (ICS) from Identity Breach Incidents: Lessons from Notable Cases
Protecting Industrial Control Systems (ICS) from Identity Breach Incidents: Lessons from Notable Cases
Sep 20 2023

In today's interconnected world, the security of Industrial Control Systems (ICS) is of paramount...

Read More
Zero Trust maturity model: The path to transition to a Zero Trust architecture
Zero Trust maturity model: The path to transition to a Zero Trust architecture
Aug 23 2023

In an era marked by escalating cyber threats and the transformative power of digital connectivity,...

Read More
Securing Operational Technology in an Interconnected World: Challenges and the Imperative of Authentication
Securing Operational Technology in an Interconnected World: Challenges and the Imperative of Authentication
Aug 10 2023

In today's rapidly evolving technological landscape, the convergence of Operational Technology (OT)...

Read More

Featured

Understanding RTU Vulnerabilities to Protect the Heart of Critical Infrastructure
Understanding RTU ...
Read More
Open Secrets: How OT Networks are Compromised by Clear Text Passwords
Open Secrets: How OT Networks ...
Read More
Tackling Authentication Vulnerabilities in OT Devices Beyond PLCs
Tackling Authentication ...
Read More

Looking to stay up-to-date with our latest news?

Subscribe to our newsletter