Blog

Blog

Stay informed on the latest trends,
insight and research in cybersecurity with swIDch Blog.

Popular

The 2022 IoT clamp down: how impending UK regulations are influencing the market
The 2022 IoT clamp down: how impending UK regulations are influencing the market
Jan 27 2022

Governments are becoming increasingly aware of the importance of IoT security, not only because of...

Read More
Is there a solution to the hacking problem behind the convenient IoT world?
Is there a solution to the hacking problem behind the convenient IoT world?
Jan 12 2022

The world is getting smarter. As various products in our daily life are connected to the network,...

Read More
Drone Misuse: A Threat To Be Reckoned With
Drone Misuse: A Threat To Be Reckoned With
Dec 15 2021

A recent report published by the Department for Business, Energy & Industrial Strategy (BEIS)...

Read More
Why the Cyber Security of your business is in the hands of your most frustrated employee
Why the Cyber Security of your business is in the hands of your most frustrated employee
Dec 08 2021

According to a study by Tech News World, more than half of US IT and cybersecurity professionals...

Read More
(Part 4) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 4) Key security vulnerabilities in IoT environment and how to effectively counteract them
Nov 29 2021

Welcome to the final instalment, part 4 of our IoT security vulnerabilities blog series. As I’ve...

Read More
Gen N Brings New Importance to User Authentication in Today’s Hybrid Work Environments
Gen N Brings New Importance to User Authentication in Today’s Hybrid Work Environments
Nov 10 2021

Remote working environments are not necessarily new to business, but are certainly fast becoming...

Read More
(Part 3) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 3) Key security vulnerabilities in IoT environment and how to effectively counteract them
Nov 10 2021

Join me, Charlie Choi, for Part 3 of our Key IoT Vulnerabilities series, with a focus on OWASP IoT...

Read More
(Part 2) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 2) Key security vulnerabilities in IoT environment and how to effectively counteract them
Oct 26 2021

Join me, Charlie Choi, as I once again walk you through the OWASP IoT Top 10 in the 2nd part of our...

Read More
(Part 1) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 1) Key security vulnerabilities in IoT environment and how to effectively counteract them
Oct 11 2021

The IoT (Internet of Things) accounts for the billions of physical devices that connect to the...

Read More
Current drone monitoring systems, pros and cons and how to solve them
Current drone monitoring systems, pros and cons and how to solve them
Sep 27 2021

Back in 2010, the drone market exploded with the launch of the very first consumer drone, the...

Read More

Featured

Authentication vs authorisation - what's the difference?
Authentication vs ...
Read More
Is Zero Trust Fool's Gold?
Is Zero Trust Fool's Gold?
Read More
Smart cities are the future - but what is the best approach?
Smart cities are the future - ...
Read More

Looking to stay up-to-date with our latest news?

Subscribe to our newsletter