Blog

Blog

Stay informed on the latest trends,
insight and research in cybersecurity with swIDch Blog.

Popular

Protecting Industrial Control Systems (ICS) from Identity Breach Incidents: Lessons from Notable Cases
Protecting Industrial Control Systems (ICS) from Identity Breach Incidents: Lessons from Notable Cases
Sep 20 2023

In today's interconnected world, the security of Industrial Control Systems (ICS) is of paramount...

Read More
Zero Trust Maturity Model: Transitioning to Zero Trust Architecture
Zero Trust Maturity Model: Transitioning to Zero Trust Architecture
Aug 23 2023

In an era marked by escalating cyber threats and the transformative power of digital connectivity,...

Read More
Securing Operational Technology in an Interconnected World: Challenges and the Imperative of Authentication
Securing Operational Technology in an Interconnected World: Challenges and the Imperative of Authentication
Aug 10 2023

In today's rapidly evolving technological landscape, the convergence of Operational Technology (OT)...

Read More
Continuous Authentication: The Core of Zero Trust Architecture
Continuous Authentication: The Core of Zero Trust Architecture
Jul 26 2023

Traditional perimeter-centric network security is based around a well defined network boundary...

Read More
2FA & MFA: The Good, The Bad & The Ugly - MFA Challenges
2FA & MFA: The Good, The Bad & The Ugly - MFA Challenges
Jul 04 2023

2FA and MFA are methods of verifying a user’s identity using two or more factors, such as...

Read More
A comprehensive guide to secure operational technology (OT)
A comprehensive guide to secure operational technology (OT)
Jun 05 2023

In today's interconnected world, Operational Technology (OT) faces increasing security challenges...

Read More
Facts to keep in mind to address smart factory security vulnerabilities
Facts to keep in mind to address smart factory security vulnerabilities
Mar 23 2023

The smart factory is a representative technology innovation field of Industry 4.0. It increases...

Read More
DCS vs PLC - what are the key differences?
DCS vs PLC - what are the key differences?
Feb 16 2023

This is one of the most commonly asked questions in relation to industrial control and automation...

Read More
Taking the leap - Overcoming security concerns to realise PLCs full potential
Taking the leap - Overcoming security concerns to realise PLCs full potential
Jan 24 2023

In September 2022, 55 programmable logic controllers (PLCs) used in major facilities in Israel were...

Read More
How to protect IoT with zero trust
How to protect IoT with zero trust
Jan 04 2023

While driving, sometimes a digital map guides you not to the initial route, but to an alternative...

Read More

Featured

Navigating the Landscape of Authentication Vulnerabilities in OT: A 2024 CVE Update
Navigating the Landscape of ...
Read More
Rising OT Cybersecurity Threats Demand Immediate Action
Rising OT Cybersecurity ...
Read More
The Vital Role of User Access Control and IAM in OT
The Vital Role of User Access ...
Read More

Looking to stay up-to-date with our latest news?

Subscribe to our newsletter