Blog

Blog

Stay informed on the latest trends,
insight and research in cybersecurity with swIDch Blog.

Popular

Authentication vs authorisation - what's the difference?
Authentication vs authorisation - what's the difference?
Sep 15 2022

In the film "Mission Impossible", Ethan Hunt, an IMF agent infiltrates a secret facility by...

Read More
Is Zero Trust Fool's Gold?
Is Zero Trust Fool's Gold?
Aug 18 2022

These days, many enterprises and organisations are putting 'Zero Trust' at the forefront of their...

Read More
Smart cities are the future - but what is the best approach?
Smart cities are the future - but what is the best approach?
Aug 04 2022

Forbes notes the definition of a smart city to be ‘an urban area in which technology and sensors...

Read More
Global expansion of card tapping mobile OTP for security and convenience is imminent
Global expansion of card tapping mobile OTP for security and convenience is imminent
Jun 28 2022

If you transfer large sum remittance at once or request sensitive financial information, most...

Read More
swIDch is going GLOBAL - come and say hi LIVE and in person!
swIDch is going GLOBAL - come and say hi LIVE and in person!
May 30 2022

swIDch is going GLOBAL. Meet swIDch LIVE at one of our many upcoming exhibitions including London,...

Read More
How to pre-emptively deal with the risk of vulnerabilities in Industrial IoT
How to pre-emptively deal with the risk of vulnerabilities in Industrial IoT
May 10 2022

The assumption that hackers take control of the internet of things (IoT) and cause serious...

Read More
Top 3 IoT Security Trends for 2022
Top 3 IoT Security Trends for 2022
Apr 27 2022

For many 2022 has been highlighted as critical in terms of IoT security, with The PSA Certified...

Read More
Can convenience and security coexist in digital payment?
Can convenience and security coexist in digital payment?
Apr 04 2022

The quick and easy way we pay online is the most fundamental agenda of digital transformation...

Read More
Smart factory vulnerabilities: operational aspects are not the only thing at risk
Smart factory vulnerabilities: operational aspects are not the only thing at risk
Mar 23 2022

IoT provides opportunity for businesses to improve process, increase efficiency and thus...

Read More
Discover swIDch at MWC22 for the future of authentication in cyber security
Discover swIDch at MWC22 for the future of authentication in cyber security
Feb 24 2022

OTAC-embedded-Smart Card will change the future of authentication in the telecom industry and...

Read More

Featured

Understanding RTU Vulnerabilities to Protect the Heart of Critical Infrastructure
Understanding RTU ...
Read More
Open Secrets: How OT Networks are Compromised by Clear Text Passwords
Open Secrets: How OT Networks ...
Read More
Tackling Authentication Vulnerabilities in OT Devices Beyond PLCs
Tackling Authentication ...
Read More

Looking to stay up-to-date with our latest news?

Subscribe to our newsletter