Blog

Blog

Stay informed on the latest trends,
insight and research in cybersecurity with swIDch Blog.

Popular

ICAM applies the concept of 'Zero Trust'
ICAM applies the concept of 'Zero Trust'
Apr 21 2021

With the spread of cloud, remote work, and working from home, Zero Trust is emerging as a new...

Read More
Why We Should Care About Smart Factory Security
Why We Should Care About Smart Factory Security
Mar 30 2021

A smart factory that can enhance not only automation, but also innovative value chains and...

Read More
How do we to create a safe smart city without a cyber citadel?
How do we to create a safe smart city without a cyber citadel?
Mar 05 2021

Smart cities are getting more attention over the world as a solution for various urban problems....

Read More
Does IoT qualify as a core infrastructure in the era of Industry 4.0?
Does IoT qualify as a core infrastructure in the era of Industry 4.0?
Feb 08 2021

The Internet of Things (IoT) beyond just network-connected devices, such as smart watches and AI...

Read More
Variables hindering the growth of connected cars that changed the paradigm of transportation
Variables hindering the growth of connected cars that changed the paradigm of transportation
Jan 19 2021

The commercialization of connected cars became increasingly clear when a large number of...

Read More
What is the solution to the current digital key for security, to limit user inconvenience?
What is the solution to the current digital key for security, to limit user inconvenience?
Jan 05 2021

Digitalization extends to spaces ranging from offices and homes, aircraft to subways, and now...

Read More
swIDch, Web Summit 2020 advance to final
swIDch, Web Summit 2020 advance to final
Dec 08 2020

The Web Summit, Europe's largest technology conference, was held online and offline in Lisbon,...

Read More
OTAC tech applied in Indonesian e-wallet App
OTAC tech applied in Indonesian e-wallet App
Mar 04 2020

OTAC tech applied in Indonesian e-wallet App

Read More

Featured

The Urgent Need for Enhanced OT Security in an AI-Driven World
The Urgent Need for Enhanced ...
Read More
Spotlight on PLC Security Risks and Industrial Vulnerabilities
Spotlight on PLC Security ...
Read More
To Encrypt or not to Encrypt in OT Networks
To Encrypt or not to Encrypt ...
Read More

Looking to stay up-to-date with our latest news?

Subscribe to our newsletter