![To Encrypt or not to Encrypt in OT Networks](https://www.swidch.com/hubfs/To%20Encrypt%20or%20not%20to%20Encrypt%20in%20OT%20Networks.jpg)
When I transitioned from cybersecurity in IT to...
![Securing the Seas through Advanced Authentication Revolutionising Safer and Cleaner Shipping](https://www.swidch.com/hubfs/Securing%20the%20Seas%20through%20Advanced%20Authentication%20Revolutionising%20Safer%20and%20Cleaner%20Shipping.jpeg)
The maritime industry is undergoing a significant...
![Synergizing Standards: How NIS2, CRA, and IEC 62443 Forge a Unified Front in OT Cyber Security](https://www.swidch.com/hubfs/Synergizing%20Standards%20How%20NIS2%2c%20CRA%2c%20and%20IEC62443%20Forge%20a%20Unified%20Front%20in%20OT%20Cyber%20Security.png)
In the rapidly evolving landscape of Operational...
![Strengthening Cybersecurity in Critical Infrastructures Through Advanced Authentication](https://www.swidch.com/hubfs/Strengthening%20Cybersecurity%20in%20Critical%20Infrastructures%20Through%20Advanced%20Authentication.jpg)
In an age where cyber threats are becoming...
![The Future of Industrial Cybersecurity: IEC 62443 Meets OTAC](https://www.swidch.com/hubfs/The%20Future%20of%20Industrial%20Cybersecurity%20IEC%2062443%20Meets%20OTAC.jpg)
In the realm of industrial operations, the...
![Intrigue and Defense in Critical Industries Unveiling the Cyber Battlefield](https://www.swidch.com/hubfs/Intrigue%20and%20Defense%20in%20Critical%20Industries%20Unveiling%20the%20Cyber%20Battlefield.jpeg)
In the digital age, where connectivity is...
![Cyber Shield: The Dawn of Digital Resilience with Cyber Resilience Act (CRA)](https://www.swidch.com/hubfs/Cyber%20Shield%20The%20Dawn%20of%20Digital%20Resilience%20with%20Cyber%20Resilience%20Act%20%28CRA%29.jpg)
In an era where digital frontiers are expanding...
![Navigating the Evolution of Authentication from Past to Present](https://www.swidch.com/hubfs/Evolution%20of%20Authentication%20From%20Past%20to%20Present.jpg)
In the dynamic landscape of cybersecurity,...
![Quantum-Proofing Our Secrets: Safeguarding Communication in the Age of Quantum Computers](https://www.swidch.com/hubfs/Quantum-Proofing%20Our%20Secrets%20Safeguarding%20Communication%20in%20the%20Age%20of%20Quantum%20Computers.jpg)
Quantum computers represent a paradigm shift in...
![Iran's Gas Stations Cyberattack Sparks Urgent Calls for Industrial Cybersecurity Reform](https://www.swidch.com/hubfs/Irans%20Gas%20Stations%20Cyberattack%20Sparks%20Urgent%20Calls%20for%20Industrial%20Cybersecurity%20Reform_swIDch.jpg)
In recent headlines, an Israel-linked group has...
![Risks of Default Passwords: Why Passwords are a Relic of the Past](https://www.swidch.com/hubfs/Risks%20of%20Default%20Passwords.jpg)
Artificial intelligence (AI) is pervasive in...
![Navigating the Digital Jungle: Hot Cybersecurity Trends for 2024](https://www.swidch.com/hubfs/Navigating%20the%20Digital%20Jungle%20Hot%20Cybersecurity%20Trends%20for%202024.jpg)
The online world is in constant flux, and so are...
![A Comprehensive Guide to NIS2 Compliance and Operational Technology Resilience](https://www.swidch.com/hubfs/A%20Comprehensive%20Guide%20to%20NIS2%20Compliance%20and%20Operational%20Technology%20Resilience.jpg)
The NIS2 Directive is the EU-wide legislation on...
![Underestimating the Vulnerabilities of Authentication Processes on PLCs: A Perilous Oversight](https://www.swidch.com/hubfs/Underestimating%20the%20Vulnerabilities%20of%20Authentication%20Processes%20on%20PLCs.jpg)
In the realm of industrial automation, PLCs...
![How to put your customers in control of their digital Identity even if they lose their phone](https://www.swidch.com/hubfs/How%20to%20put%20your%20customers%20in%20control%20of%20their%20digital%20Identity%20even%20if%20they%20lose%20their%20phone.jpg)
In a hyper connected world mobile phones have...
![Passwordless Authentication: The Next Step in Cybersecurity](https://www.swidch.com/hubfs/shutterstock_491735752.jpg)
Many industries are changing their authentication...
![Identity Defined Security (IDS) to Safeguard the Digital Realm](https://www.swidch.com/hubfs/swIDch%20Identity%20Defined%20Security.jpg)
Cyber security is a term that has become...
![Protecting Industrial Control Systems (ICS) from Identity Breach Incidents: Lessons from Notable Cases](https://www.swidch.com/hubfs/shutterstock_1687164907.jpg)
In today's interconnected world, the security of...
![Zero Trust maturity model: The path to transition to a Zero Trust architecture](https://www.swidch.com/hubfs/Zero%20Trust%20Maturity%20Model%20Cover.jpg)
In an era marked by escalating cyber threats and...
![Securing Operational Technology in an Interconnected World: Challenges and the Imperative of Authentication](https://www.swidch.com/hubfs/shutterstock_1586609545.jpg)
In today's rapidly evolving technological...
![Why should continuous authentication be at the heart of your Zero Trust Architecture?](https://www.swidch.com/hubfs/swIDch%20blog%20zero%20trust%20image.jpg)
Traditional perimeter-centric network security is...
![2FA & MFA: The Good, The Bad & The Ugly](https://www.swidch.com/hubfs/MFA%20login.jpg)
2FA and MFA are methods of verifying a user’s...
![A comprehensive guide to secure operational technology (OT)](https://www.swidch.com/hubfs/shutterstock_1341095657%20resize.jpg)
In today's interconnected world, Operational...
![Facts to keep in mind to address smart factory security vulnerabilities](https://www.swidch.com/hubfs/shutterstock_1536997286%20small.jpg)
The smart factory is a representative technology...
![DCS vs PLC - what are the key differences?](https://www.swidch.com/hubfs/shutterstock_2248577885%20resized.jpg)
This is one of the most commonly asked questions...
![Taking the leap - Overcoming security concerns to realise PLCs full potential](https://www.swidch.com/hubfs/shutterstock_2248590911%20resized.jpg)
In September 2022, 55 programmable logic...
![How to protect IoT with zero trust](https://www.swidch.com/hubfs/IT_twi001t3311788%20small.jpg)
While driving, sometimes a digital map guides you...
![Key cyber security trends for 2023](https://www.swidch.com/hubfs/IT_twi001t3172434%20small.jpg)
Throughout 2022, cyber security continued to...
![Evolution of identity authentication technology required by digital transformation](https://www.swidch.com/hubfs/Evolution%20of%20identity%20auth%20technology%201.jpg)
COVID-19 has propelled society into a...
![Implementing MFA with swIDch's TAP-OTAC [Technical article]](https://www.swidch.com/hubfs/IT_twi001t3276159.jpg)
Abstract swIDch introduces an entirely new type...
![Authentication vs authorisation - what's the difference?](https://www.swidch.com/hubfs/IT_twi001t3350673%204MP.jpg)
In the film "Mission Impossible", Ethan Hunt, an...
![Is Zero Trust Fool's Gold?](https://www.swidch.com/hubfs/ZT%202%20%28small%29.jpg)
![Smart cities are the future - but what is the best approach?](https://www.swidch.com/hubfs/IT_twi001t3350644%204MP.jpg)
Forbes notes the definition of a smart city to be...
![Global expansion of card tapping mobile OTP for security and convenience is imminent](https://www.swidch.com/hubfs/Improve%20user%20experience%204MP.jpg)
If you transfer large sum remittance at once or...
![swIDch is going GLOBAL - come and say hi LIVE and in person!](https://www.swidch.com/hubfs/MWC%20pics.jpg)
swIDch is going GLOBAL. Meet swIDch LIVE at one...
![How to pre-emptively deal with the risk of vulnerabilities in Industrial IoT](https://www.swidch.com/hubfs/IT_twi001t3412506%204MP.jpg)
The assumption that hackers take control of the...
![Top 3 IoT Security Trends for 2022](https://www.swidch.com/hubfs/IT_twi001t3276058%204MP.jpg)
For many 2022 has been highlighted as critical...
![Can convenience and security coexist in digital payment?](https://www.swidch.com/hubfs/CK_cb036201611%204MP.jpg)
The quick and easy way we pay online is the most...
![Smart factory vulnerabilities: operational aspects are not the only thing at risk](https://www.swidch.com/hubfs/CK_pc004441751_l.jpg)
IoT provides opportunity for businesses to...
![Discover swIDch at MWC22 for the future of authentication in cyber security](https://www.swidch.com/hubfs/swIDch%20at%20MWC22.jpg)
OTAC-embedded-Smart Card will change the future...
![The 2022 IoT clamp down: how impending UK regulations are influencing the market](https://www.swidch.com/hubfs/CK_cb036120184_l.jpg)
Governments are becoming increasingly aware of...
![Is there a solution to the hacking problem behind the convenient IoT world?](https://www.swidch.com/hubfs/CK_cb036120161_l.jpg)
The world is getting smarter. As various products...
![Drone Misuse: A Threat To Be Reckoned With](https://www.swidch.com/hubfs/twi001t3216689%204MP.jpg)
A recent report published by the Department for...
![Why the Cyber Security of your business is in the hands of your most frustrated employee](https://www.swidch.com/hubfs/CK_yaytg309146_l.jpg)
According to a study by Tech News World, more...
![(Part 4) Key security vulnerabilities in IoT environment and how to effectively counteract them](https://www.swidch.com/hubfs/twi001t3136517%204MP.jpg)
Welcome to the final instalment, part 4 of our...
![Gen N Brings New Importance to User Authentication in Today’s Hybrid Work Environments](https://www.swidch.com/hubfs/tica1010002237_l.jpg)
Remote working environments are not necessarily...
![(Part 3) Key security vulnerabilities in IoT environment and how to effectively counteract them](https://www.swidch.com/hubfs/Image%201.png)
Join me, Charlie Choi, for Part 3 of our Key IoT...
![(Part 2) Key security vulnerabilities in IoT environment and how to effectively counteract them](https://www.swidch.com/hubfs/tcp009t107809%204MP.jpg)
Join me, Charlie Choi, as I once again walk you...
![(Part 1) Key security vulnerabilities in IoT environment and how to effectively counteract them](https://www.swidch.com/hubfs/tcp009t107938.jpg)
The IoT (Internet of Things) accounts for the...
![Current drone monitoring systems, pros and cons and how to solve them](https://www.swidch.com/hubfs/tip2440008118%204MP.jpg)
Back in 2010, the drone market exploded with the...
![The three key challenges facing today's Drone industry](https://www.swidch.com/hubfs/twi001t3215950-1.jpg)
The potential benefits of drones to radically...
![How does CIAM protect your customer's account information?](https://www.swidch.com/hubfs/cb0460045263%202.jpg)
Social media hacking occurs day by day. The...
![API vs SDK. What’s the difference? It's what you're developing...](https://www.swidch.com/hubfs/ti253a4804%20ratio%203%202.jpg)
In today’s rapidly changing business environment,...
![Why should we pay attention to authentication SDKs?](https://www.swidch.com/hubfs/Imported_Blog_Media/EUMnjd8S3AKSPLtASNqtK-TN-1.jpg)
swIDch, an authentication technology startup in...
![The era of DIY kits for software development](https://www.swidch.com/hubfs/Imported_Blog_Media/okA9A4UvVv7Qd_BvGiewj-2021-06-17%20104713%20TN-1.jpg)
As social distancing has become common due to...
![swIDch does it again! Making the Cybertech 100 for the second consecutive year](https://www.swidch.com/hubfs/Imported_Blog_Media/k4uo98pIDyQmUzDqRUIVS-Screenshot%202021-06-08%20111424-1.jpg)
CyberTech is one of the fastest growing sectors...
![IoT IAM is the basis of IoT security](https://www.swidch.com/hubfs/Imported_Blog_Media/tfUwYsFxwpnuNr_AykhLa-Screenshot%202021-05-20%20155000-1.jpg)
The recent cyber-attack that paralyzed the...
![Is 2021 the 'last hurrah' for passwords?](https://www.swidch.com/hubfs/Imported_Blog_Media/z7s2Lmrc_NrpyLcKEYAZm-Screenshot%202021-05-05%20134840-1.jpg)
Last year the Covid-19 pandemic saw a radical...
![ICAM applies the concept of 'Zero Trust'](https://www.swidch.com/hubfs/Imported_Blog_Media/n-Ab5DDpB75ksjcPeysdX-Screenshot%202021-04-21%20124802-1.png)
With the spread of cloud, remote work, and...
![Why We Should Care About Smart Factory Security](https://www.swidch.com/hubfs/Imported_Blog_Media/o0i27OR8FhE8iPzmme8NH-original%20%288%29-1.jpg)
A smart factory that can enhance not only...
![How do we to create a safe smart city without a cyber citadel?](https://www.swidch.com/hubfs/Imported_Blog_Media/O91gD9HD2sAEkVh66TpGO-original%20%287%29-1.jpg)
Smart cities are getting more attention over the...
![Does IoT qualify as a core infrastructure in the era of Industry 4.0?](https://www.swidch.com/hubfs/Imported_Blog_Media/jjW8ZbGNCKkEqL6RsI_u--original%20%286%29-1.jpg)
The Internet of Things (IoT) beyond just...
![Variables hindering the growth of connected cars that changed the paradigm of transportation](https://www.swidch.com/hubfs/Imported_Blog_Media/djHJZYG_U-CCV_4zFIqO9-original%20%284%29-1.jpg)
The commercialization of connected cars became...
![What is the solution to the current digital key for security, to limit user inconvenience?](https://www.swidch.com/hubfs/Imported_Blog_Media/DVEOsqrhb8RgNeSI1C6VV-original%20%283%29-1.jpg)
Digitalization extends to spaces ranging from...
![swIDch, Web Summit 2020 advance to final](https://www.swidch.com/hubfs/Imported_Blog_Media/gnQhXPb6fZxKZHxJBfI50-original%20%282%29-1.jpg)
The Web Summit, Europe's largest technology...
![OTAC tech applied in Indonesian e-wallet App](https://www.swidch.com/hubfs/Imported_Blog_Media/1Kc7kNeuIFRWIM0JorHpI-DOKU%20signing%20photo-1.jpg)
OTAC tech applied in Indonesian e-wallet App