

Blog
insight and research in cybersecurity with swIDch Blog.
Popular

Historically, OT networks utilized proprietary protocols optimized for specific functions. Some...

Operational Technology (OT) devices, including SCADA systems, Distributed Control Systems (DCS),...

In today's digital age, the importance of robust cybersecurity cannot be overstated. Yet, despite...

In the fast-evolving realm of operational technology (OT), the infusion of digital systems into...

There has been a noticeable rise in authentication vulnerabilities in Operational Technology (OT)...

As industrial systems become increasingly interconnected, the operational technology (OT) landscape...

In the ever-evolving landscape of cybersecurity, two critical vulnerabilities have recently come to...

As artificial intelligence (AI) continues to evolve and integrate into various industries, it...

In today's interconnected industrial landscape, the security of Programmable Logic Controllers...

When I transitioned from cybersecurity in IT to Operational Technology (OT), I was initially...
Looking to stay up-to-date with our latest news?