View all Posts

Quantum-Proofing Our Secrets: Safeguarding Communication in the Age of Quantum Computers
Quantum-Proofing Our Secrets: Safeguarding Communication in the Age of Quantum Computers
Mar 11 2024

Quantum computers represent a paradigm shift in...

Read More
Iran's Gas Stations Cyberattack Sparks Urgent Calls for Industrial Cybersecurity Reform
Iran's Gas Stations Cyberattack Sparks Urgent Calls for Industrial Cybersecurity Reform
Feb 19 2024

In recent headlines, an Israel-linked group has...

Read More
Risks of Default Passwords: Why Passwords are a Relic of the Past
Risks of Default Passwords: Why Passwords are a Relic of the Past
Jan 22 2024

Artificial intelligence (AI) is pervasive in...

Read More
Navigating the Digital Jungle: Hot Cybersecurity Trends for 2024
Navigating the Digital Jungle: Hot Cybersecurity Trends for 2024
Jan 02 2024

The online world is in constant flux, and so are...

Read More
A Comprehensive Guide to NIS2 Compliance and Operational Technology Resilience
A Comprehensive Guide to NIS2 Compliance and Operational Technology Resilience
Dec 12 2023

The NIS2 Directive is the EU-wide legislation on...

Read More
Underestimating the Vulnerabilities of Authentication Processes on PLCs: A Perilous Oversight
Underestimating the Vulnerabilities of Authentication Processes on PLCs: A Perilous Oversight
Nov 22 2023

In the realm of industrial automation, PLCs...

Read More
How to put your customers in control of their digital Identity even if they lose their phone
How to put your customers in control of their digital Identity even if they lose their phone
Nov 07 2023

In a hyper connected world mobile phones have...

Read More
Passwordless Authentication: The Next Step in Cybersecurity
Passwordless Authentication: The Next Step in Cybersecurity
Oct 24 2023

Many industries are changing their authentication...

Read More
Identity Defined Security (IDS) to Safeguard the Digital Realm
Identity Defined Security (IDS) to Safeguard the Digital Realm
Oct 10 2023

Cyber security is a term that has become...

Read More
Protecting Industrial Control Systems (ICS) from Identity Breach Incidents: Lessons from Notable Cases
Protecting Industrial Control Systems (ICS) from Identity Breach Incidents: Lessons from Notable Cases
Sep 20 2023

In today's interconnected world, the security of...

Read More
Zero Trust maturity model: The path to transition to a Zero Trust architecture
Zero Trust maturity model: The path to transition to a Zero Trust architecture
Aug 23 2023

In an era marked by escalating cyber threats and...

Read More
Securing Operational Technology in an Interconnected World: Challenges and the Imperative of Authentication
Securing Operational Technology in an Interconnected World: Challenges and the Imperative of Authentication
Aug 10 2023

In today's rapidly evolving technological...

Read More
Why should continuous authentication be at the heart of your Zero Trust Architecture?
Why should continuous authentication be at the heart of your Zero Trust Architecture?
Jul 26 2023

Traditional perimeter-centric network security is...

Read More
2FA & MFA: The Good, The Bad & The Ugly
2FA & MFA: The Good, The Bad & The Ugly
Jul 04 2023

2FA and MFA are methods of verifying a user’s...

Read More
A comprehensive guide to secure operational technology (OT)
A comprehensive guide to secure operational technology (OT)
Jun 05 2023

In today's interconnected world, Operational...

Read More
Facts to keep in mind to address smart factory security vulnerabilities
Facts to keep in mind to address smart factory security vulnerabilities
Mar 23 2023

The smart factory is a representative technology...

Read More
DCS vs PLC - what are the key differences?
DCS vs PLC - what are the key differences?
Feb 16 2023

This is one of the most commonly asked questions...

Read More
Taking the leap - Overcoming security concerns to realise PLCs full potential
Taking the leap - Overcoming security concerns to realise PLCs full potential
Jan 24 2023

In September 2022, 55 programmable logic...

Read More
How to protect IoT with zero trust
How to protect IoT with zero trust
Jan 04 2023

While driving, sometimes a digital map guides you...

Read More
Key cyber security trends for 2023
Key cyber security trends for 2023
Nov 30 2022

Throughout 2022, cyber security continued to...

Read More
Evolution of identity authentication technology required by digital transformation
Evolution of identity authentication technology required by digital transformation
Oct 26 2022

COVID-19 has propelled society into a...

Read More
Implementing MFA with swIDch's TAP-OTAC [Technical article]
Implementing MFA with swIDch's TAP-OTAC [Technical article]
Oct 12 2022

Abstract swIDch introduces an entirely new type...

Read More
Authentication vs authorisation - what's the difference?
Authentication vs authorisation - what's the difference?
Sep 15 2022

In the film "Mission Impossible", Ethan Hunt, an...

Read More
Is Zero Trust Fool's Gold?
Is Zero Trust Fool's Gold?
Aug 18 2022

These days, many enterprises and organisations...

Read More
Smart cities are the future - but what is the best approach?
Smart cities are the future - but what is the best approach?
Aug 04 2022

Forbes notes the definition of a smart city to be...

Read More
Global expansion of card tapping mobile OTP for security and convenience is imminent
Global expansion of card tapping mobile OTP for security and convenience is imminent
Jun 28 2022

If you transfer large sum remittance at once or...

Read More
swIDch is going GLOBAL - come and say hi LIVE and in person!
swIDch is going GLOBAL - come and say hi LIVE and in person!
May 30 2022

swIDch is going GLOBAL. Meet swIDch LIVE at one...

Read More
How to pre-emptively deal with the risk of vulnerabilities in Industrial IoT
How to pre-emptively deal with the risk of vulnerabilities in Industrial IoT
May 10 2022

The assumption that hackers take control of the...

Read More
Top 3 IoT Security Trends for 2022
Top 3 IoT Security Trends for 2022
Apr 27 2022

For many 2022 has been highlighted as critical...

Read More
Can convenience and security coexist in digital payment?
Can convenience and security coexist in digital payment?
Apr 04 2022

The quick and easy way we pay online is the most...

Read More
Smart factory vulnerabilities: operational aspects are not the only thing at risk
Smart factory vulnerabilities: operational aspects are not the only thing at risk
Mar 23 2022

IoT provides opportunity for businesses to...

Read More
Discover swIDch at MWC22 for the future of authentication in cyber security
Discover swIDch at MWC22 for the future of authentication in cyber security
Feb 24 2022

OTAC-embedded-Smart Card will change the future...

Read More
The 2022 IoT clamp down: how impending UK regulations are influencing the market
The 2022 IoT clamp down: how impending UK regulations are influencing the market
Jan 27 2022

Governments are becoming increasingly aware of...

Read More
Is there a solution to the hacking problem behind the convenient IoT world?
Is there a solution to the hacking problem behind the convenient IoT world?
Jan 12 2022

The world is getting smarter. As various products...

Read More
Drone Misuse: A Threat To Be Reckoned With
Drone Misuse: A Threat To Be Reckoned With
Dec 15 2021

A recent report published by the Department for...

Read More
Why the Cyber Security of your business is in the hands of your most frustrated employee
Why the Cyber Security of your business is in the hands of your most frustrated employee
Dec 08 2021

According to a study by Tech News World, more...

Read More
(Part 4) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 4) Key security vulnerabilities in IoT environment and how to effectively counteract them
Nov 29 2021

Welcome to the final instalment, part 4 of our...

Read More
Gen N Brings New Importance to User Authentication in Today’s Hybrid Work Environments
Gen N Brings New Importance to User Authentication in Today’s Hybrid Work Environments
Nov 10 2021

Remote working environments are not necessarily...

Read More
(Part 3) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 3) Key security vulnerabilities in IoT environment and how to effectively counteract them
Nov 10 2021

Join me, Charlie Choi, for Part 3 of our Key IoT...

Read More
(Part 2) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 2) Key security vulnerabilities in IoT environment and how to effectively counteract them
Oct 26 2021

Join me, Charlie Choi, as I once again walk you...

Read More
(Part 1) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 1) Key security vulnerabilities in IoT environment and how to effectively counteract them
Oct 11 2021

The IoT (Internet of Things) accounts for the...

Read More
Current drone monitoring systems, pros and cons and how to solve them
Current drone monitoring systems, pros and cons and how to solve them
Sep 27 2021

Back in 2010, the drone market exploded with the...

Read More
The three key challenges facing today's Drone industry
The three key challenges facing today's Drone industry
Sep 06 2021

The potential benefits of drones to radically...

Read More
How does CIAM protect your customer's account information?
How does CIAM protect your customer's account information?
Aug 19 2021

Social media hacking occurs day by day. The...

Read More
API vs SDK. What’s the difference? It's what you're developing...
API vs SDK. What’s the difference? It's what you're developing...
Aug 02 2021

In today’s rapidly changing business environment,...

Read More
Why should we pay attention to authentication SDKs?
Why should we pay attention to authentication SDKs?
Jul 12 2021

swIDch, an authentication technology startup in...

Read More
The era of DIY kits for software development
The era of DIY kits for software development
Jun 17 2021

As social distancing has become common due to...

Read More
swIDch does it again! Making the Cybertech 100 for the second consecutive year
swIDch does it again! Making the Cybertech 100 for the second consecutive year
Jun 08 2021

CyberTech is one of the fastest growing sectors...

Read More
IoT IAM is the basis of IoT security
IoT IAM is the basis of IoT security
May 20 2021

The recent cyber-attack that paralyzed the...

Read More
Is 2021 the 'last hurrah' for passwords?
Is 2021 the 'last hurrah' for passwords?
May 05 2021

Last year the Covid-19 pandemic saw a radical...

Read More
ICAM applies the concept of 'Zero Trust'
ICAM applies the concept of 'Zero Trust'
Apr 21 2021

With the spread of cloud, remote work, and...

Read More
Why We Should Care About Smart Factory Security
Why We Should Care About Smart Factory Security
Mar 30 2021

A smart factory that can enhance not only...

Read More
How do we to create a safe smart city without a cyber citadel?
How do we to create a safe smart city without a cyber citadel?
Mar 05 2021

Smart cities are getting more attention over the...

Read More
Does IoT qualify as a core infrastructure in the era of Industry 4.0?
Does IoT qualify as a core infrastructure in the era of Industry 4.0?
Feb 08 2021

The Internet of Things (IoT) beyond just...

Read More
Variables hindering the growth of connected cars that changed the paradigm of transportation
Variables hindering the growth of connected cars that changed the paradigm of transportation
Jan 19 2021

The commercialization of connected cars became...

Read More
What is the solution to the current digital key for security, to limit user inconvenience?
What is the solution to the current digital key for security, to limit user inconvenience?
Jan 05 2021

Digitalization extends to spaces ranging from...

Read More
swIDch, Web Summit 2020 advance to final
swIDch, Web Summit 2020 advance to final
Dec 08 2020

The Web Summit, Europe's largest technology...

Read More
OTAC tech applied in Indonesian e-wallet App
OTAC tech applied in Indonesian e-wallet App
Mar 04 2020

OTAC tech applied in Indonesian e-wallet App

Read More

Looking to stay up-to-date with our latest news?

Subscribe to our newsletter