Blog

Blog

Stay informed on the latest trends,
insight and research in cybersecurity with swIDch Blog.

Popular

The three key challenges facing today's Drone industry
The three key challenges facing today's Drone industry
Sep 06 2021

The potential benefits of drones to radically accelerate and change the landscape across multiple...

Read More
How does CIAM protect your customer's account information?
How does CIAM protect your customer's account information?
Aug 19 2021

Social media hacking occurs day by day. The hackers who obtain social media account information...

Read More
API vs SDK. What’s the difference? It's what you're developing...
API vs SDK. What’s the difference? It's what you're developing...
Aug 02 2021

In today’s rapidly changing business environment, many organisations are looking to develop...

Read More
Why should we pay attention to authentication SDKs?
Why should we pay attention to authentication SDKs?
Jul 12 2021

swIDch, an authentication technology startup in cybersecurity has launched a new product. It is...

Read More
The era of DIY kits for software development
The era of DIY kits for software development
Jun 17 2021

As social distancing has become common due to the prolonged impact of COVID-19, Do-It-Yourself...

Read More
swIDch does it again! Making the Cybertech 100 for the second consecutive year
swIDch does it again! Making the Cybertech 100 for the second consecutive year
Jun 08 2021

CyberTech is one of the fastest growing sectors within the FinTech industry, with FinTech Global ...

Read More
IoT IAM is the basis of IoT security
IoT IAM is the basis of IoT security
May 20 2021

The recent cyber-attack that paralyzed the Colonial Pipeline, the largest pipeline system for...

Read More
Is 2021 the 'last hurrah' for passwords?
Is 2021 the 'last hurrah' for passwords?
May 05 2021

Last year the Covid-19 pandemic saw a radical shift to remote working for many industries....

Read More
ICAM applies the concept of 'Zero Trust'
ICAM applies the concept of 'Zero Trust'
Apr 21 2021

With the spread of cloud, remote work, and working from home, Zero Trust is emerging as a new...

Read More
Why We Should Care About Smart Factory Security
Why We Should Care About Smart Factory Security
Mar 30 2021

A smart factory that can enhance not only automation, but also innovative value chains and...

Read More

Featured

Understanding RTU Vulnerabilities to Protect the Heart of Critical Infrastructure
Understanding RTU ...
Read More
Open Secrets: How OT Networks are Compromised by Clear Text Passwords
Open Secrets: How OT Networks ...
Read More
Tackling Authentication Vulnerabilities in OT Devices Beyond PLCs
Tackling Authentication ...
Read More

Looking to stay up-to-date with our latest news?

Subscribe to our newsletter