Blog

Blog

Stay informed on the latest trends,
insight and research in cybersecurity with swIDch Blog.

Popular

(Part 4) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 4) Key security vulnerabilities in IoT environment and how to effectively counteract them
Nov 29 2021

Welcome to the final instalment, part 4 of our IoT security vulnerabilities blog series. As I’ve...

Read More
Gen N Brings New Importance to User Authentication in Today’s Hybrid Work Environments
Gen N Brings New Importance to User Authentication in Today’s Hybrid Work Environments
Nov 10 2021

Remote working environments are not necessarily new to business, but are certainly fast becoming...

Read More
(Part 3) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 3) Key security vulnerabilities in IoT environment and how to effectively counteract them
Nov 10 2021

Join me, Charlie Choi, for Part 3 of our Key IoT Vulnerabilities series, with a focus on OWASP IoT...

Read More
(Part 2) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 2) Key security vulnerabilities in IoT environment and how to effectively counteract them
Oct 26 2021

Join me, Charlie Choi, as I once again walk you through the OWASP IoT Top 10 in the 2nd part of our...

Read More
(Part 1) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 1) Key security vulnerabilities in IoT environment and how to effectively counteract them
Oct 11 2021

The IoT (Internet of Things) accounts for the billions of physical devices that connect to the...

Read More
Current drone monitoring systems, pros and cons and how to solve them
Current drone monitoring systems, pros and cons and how to solve them
Sep 27 2021

Back in 2010, the drone market exploded with the launch of the very first consumer drone, the...

Read More
The three key challenges facing today's Drone industry
The three key challenges facing today's Drone industry
Sep 06 2021

The potential benefits of drones to radically accelerate and change the landscape across multiple...

Read More
How does CIAM protect your customer's account information?
How does CIAM protect your customer's account information?
Aug 19 2021

Social media hacking occurs day by day. The hackers who obtain social media account information...

Read More
API vs SDK. What’s the difference? It's what you're developing...
API vs SDK. What’s the difference? It's what you're developing...
Aug 02 2021

In today’s rapidly changing business environment, many organisations are looking to develop...

Read More
Why should we pay attention to authentication SDKs?
Why should we pay attention to authentication SDKs?
Jul 12 2021

swIDch, an authentication technology startup in cybersecurity has launched a new product. It is...

Read More

Featured

swIDch is going GLOBAL - come and say hi LIVE and in person!
swIDch is going GLOBAL - come ...
Read More
How to pre-emptively deal with the risk of vulnerabilities in Industrial IoT
How to pre-emptively deal ...
Read More
Top 3 IoT Security Trends for 2022
Top 3 IoT Security Trends for ...
Read More

Looking to stay up-to-date with our latest news?

Subscribe to our newsletter