Blog

Blog

Stay informed on the latest trends,
insight and research in cybersecurity with swIDch Blog.

Popular

Global expansion of card tapping mobile OTP for security and convenience is imminent
Global expansion of card tapping mobile OTP for security and convenience is imminent
Jun 28 2022

If you transfer large sum remittance at once or request sensitive financial information, most...

Read More
swIDch is going GLOBAL - come and say hi LIVE and in person!
swIDch is going GLOBAL - come and say hi LIVE and in person!
May 30 2022

swIDch is going GLOBAL. Meet swIDch LIVE at one of our many upcoming exhibitions including London,...

Read More
How to pre-emptively deal with the risk of vulnerabilities in Industrial IoT
How to pre-emptively deal with the risk of vulnerabilities in Industrial IoT
May 10 2022

The assumption that hackers take control of the internet of things (IoT) and cause serious...

Read More
Top 3 IoT Security Trends for 2022
Top 3 IoT Security Trends for 2022
Apr 27 2022

For many 2022 has been highlighted as critical in terms of IoT security, with The PSA Certified...

Read More
Can convenience and security coexist in digital payment?
Can convenience and security coexist in digital payment?
Apr 04 2022

The quick and easy way we pay online is the most fundamental agenda of digital transformation...

Read More
Smart factory vulnerabilities: operational aspects are not the only thing at risk
Smart factory vulnerabilities: operational aspects are not the only thing at risk
Mar 23 2022

IoT provides opportunity for businesses to improve process, increase efficiency and thus...

Read More
Discover swIDch at MWC22 for the future of authentication in cyber security
Discover swIDch at MWC22 for the future of authentication in cyber security
Feb 24 2022

OTAC-embedded-Smart Card will change the future of authentication in the telecom industry and...

Read More
The 2022 IoT clamp down: how impending UK regulations are influencing the market
The 2022 IoT clamp down: how impending UK regulations are influencing the market
Jan 27 2022

Governments are becoming increasingly aware of the importance of IoT security, not only because of...

Read More
Is there a solution to the hacking problem behind the convenient IoT world?
Is there a solution to the hacking problem behind the convenient IoT world?
Jan 12 2022

The world is getting smarter. As various products in our daily life are connected to the network,...

Read More
Drone Misuse: A Threat To Be Reckoned With
Drone Misuse: A Threat To Be Reckoned With
Dec 15 2021

A recent report published by the Department for Business, Energy & Industrial Strategy (BEIS)...

Read More

Featured

Underestimating the Vulnerabilities of Authentication Processes on PLCs: A Perilous Oversight
Underestimating the ...
Read More
How to put your customers in control of their digital Identity even if they lose their phone
How to put your customers in ...
Read More
Passwordless Authentication: The Next Step in Cybersecurity
Passwordless Authentication: ...
Read More

Looking to stay up-to-date with our latest news?

Subscribe to our newsletter