Blog
insight and research in cybersecurity with swIDch Blog.
Popular
Traditional perimeter-centric network security is based around a well defined network boundary...
2FA and MFA are methods of verifying a user’s identity using two or more factors, such as...
In today's interconnected world, Operational Technology (OT) faces increasing security challenges...
The smart factory is a representative technology innovation field of Industry 4.0. It increases...
This is one of the most commonly asked questions in relation to industrial control and automation...
In September 2022, 55 programmable logic controllers (PLCs) used in major facilities in Israel were...
While driving, sometimes a digital map guides you not to the initial route, but to an alternative...
Throughout 2022, cyber security continued to evolve at pace as both hackers and cyber criminals...
COVID-19 has propelled society into a fully-fledged digital era where everything is connected by...
Abstract swIDch introduces an entirely new type of user authentication factor with the Tap-OTAC...
Looking to stay up-to-date with our latest news?