View all Posts

Authentication vs authorisation - what's the difference?
Authentication vs authorisation - what's the difference?
Sep 15 2022

In the film "Mission Impossible", Ethan Hunt, an...

Read More
Is Zero Trust Fool's Gold?
Is Zero Trust Fool's Gold?
Aug 18 2022

These days, many enterprises and organisations...

Read More
Smart cities are the future - but what is the best approach?
Smart cities are the future - but what is the best approach?
Aug 04 2022

Forbes notes the definition of a smart city to be...

Read More
Global expansion of card tapping mobile OTP for security and convenience is imminent
Global expansion of card tapping mobile OTP for security and convenience is imminent
Jun 28 2022

If you transfer large sum remittance at once or...

Read More
swIDch is going GLOBAL - come and say hi LIVE and in person!
swIDch is going GLOBAL - come and say hi LIVE and in person!
May 30 2022

swIDch is going GLOBAL. Meet swIDch LIVE at one...

Read More
How to pre-emptively deal with the risk of vulnerabilities in Industrial IoT
How to pre-emptively deal with the risk of vulnerabilities in Industrial IoT
May 10 2022

The assumption that hackers take control of the...

Read More
Top 3 IoT Security Trends for 2022
Top 3 IoT Security Trends for 2022
Apr 27 2022

  For many 2022 has been highlighted as critical...

Read More
Can convenience and security coexist in digital payment?
Can convenience and security coexist in digital payment?
Apr 04 2022

The quick and easy way we pay online is the most...

Read More
Smart factory vulnerabilities: operational aspects are not the only thing at risk
Smart factory vulnerabilities: operational aspects are not the only thing at risk
Mar 23 2022

IoT provides opportunity for businesses to...

Read More
Discover swIDch at MWC22 for the future of authentication in cyber security
Discover swIDch at MWC22 for the future of authentication in cyber security
Feb 24 2022

OTAC-embedded-Smart Card will change the future...

Read More
The 2022 IoT clamp down: how impending UK regulations are influencing the market
The 2022 IoT clamp down: how impending UK regulations are influencing the market
Jan 27 2022

Governments are becoming increasingly aware of...

Read More
Is there a solution to the hacking problem behind the convenient IoT world?
Is there a solution to the hacking problem behind the convenient IoT world?
Jan 12 2022

The world is getting smarter. As various products...

Read More
Drone Misuse: A Threat To Be Reckoned With
Drone Misuse: A Threat To Be Reckoned With
Dec 15 2021

A recent report published by the Department for...

Read More
Why the Cyber Security of your business is in the hands of your most frustrated employee
Why the Cyber Security of your business is in the hands of your most frustrated employee
Dec 08 2021

According to a study by Tech News World, more...

Read More
(Part 4) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 4) Key security vulnerabilities in IoT environment and how to effectively counteract them
Nov 29 2021

Welcome to the final instalment, part 4 of our...

Read More
Gen N Brings New Importance to User Authentication in Today’s Hybrid Work Environments
Gen N Brings New Importance to User Authentication in Today’s Hybrid Work Environments
Nov 10 2021

Remote working environments are not necessarily...

Read More
(Part 3) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 3) Key security vulnerabilities in IoT environment and how to effectively counteract them
Nov 10 2021

Join me, Charlie Choi, for Part 3 of our Key IoT...

Read More
(Part 2) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 2) Key security vulnerabilities in IoT environment and how to effectively counteract them
Oct 26 2021

Join me, Charlie Choi, as I once again walk you...

Read More
(Part 1) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 1) Key security vulnerabilities in IoT environment and how to effectively counteract them
Oct 11 2021

The IoT (Internet of Things) accounts for the...

Read More
Current drone monitoring systems, pros and cons and how to solve them
Current drone monitoring systems, pros and cons and how to solve them
Sep 27 2021

Back in 2010, the drone market exploded with the...

Read More
The three key challenges facing today's Drone industry
The three key challenges facing today's Drone industry
Sep 06 2021

The potential benefits of drones to radically...

Read More
How does CIAM protect your customer's account information?
How does CIAM protect your customer's account information?
Aug 19 2021

Social media hacking occurs day by day. The...

Read More
API vs SDK. What’s the difference? It's what you're developing...
API vs SDK. What’s the difference? It's what you're developing...
Aug 02 2021

In today’s rapidly changing business environment,...

Read More
Why should we pay attention to authentication SDKs?
Why should we pay attention to authentication SDKs?
Jul 12 2021

swIDch, an authentication technology startup in...

Read More
The era of DIY kits for software development
The era of DIY kits for software development
Jun 17 2021

As social distancing has become common due to...

Read More
swIDch does it again! Making the Cybertech 100 for the second consecutive year
swIDch does it again! Making the Cybertech 100 for the second consecutive year
Jun 08 2021

CyberTech is one of the fastest growing sectors...

Read More
IoT IAM is the basis of IoT security
IoT IAM is the basis of IoT security
May 20 2021

The recent cyber-attack that paralyzed the...

Read More
Is 2021 the 'last hurrah' for passwords?
Is 2021 the 'last hurrah' for passwords?
May 05 2021

Last year the Covid-19 pandemic saw a radical...

Read More
ICAM applies the concept of 'Zero Trust'
ICAM applies the concept of 'Zero Trust'
Apr 21 2021

With the spread of cloud, remote work, and...

Read More
Why We Should Care About Smart Factory Security
Why We Should Care About Smart Factory Security
Mar 30 2021

A smart factory that can enhance not only...

Read More
How do we to create a safe smart city without a cyber citadel?
How do we to create a safe smart city without a cyber citadel?
Mar 05 2021

Smart cities are getting more attention over the...

Read More
Does IoT qualify as a core infrastructure in the era of Industry 4.0?
Does IoT qualify as a core infrastructure in the era of Industry 4.0?
Feb 08 2021

The Internet of Things (IoT) beyond just...

Read More
Variables hindering the growth of connected cars that changed the paradigm of transportation
Variables hindering the growth of connected cars that changed the paradigm of transportation
Jan 19 2021

The commercialization of connected cars became...

Read More
What is the solution to the current digital key for security, to limit user inconvenience?
What is the solution to the current digital key for security, to limit user inconvenience?
Jan 05 2021

Digitalization extends to spaces ranging from...

Read More
swIDch, Web Summit 2020 advance to final
swIDch, Web Summit 2020 advance to final
Dec 08 2020

The Web Summit, Europe's largest technology...

Read More
OTAC tech applied in Indonesian e-wallet App
OTAC tech applied in Indonesian e-wallet App
Mar 04 2020

OTAC tech applied in Indonesian e-wallet App 

Read More

Looking to stay up-to-date with our latest news?

Subscribe to our newsletter