Blog

Blog

Stay informed on the latest trends,
insight and research in cybersecurity with swIDch Blog.

Popular

Top 3 IoT Security Trends for 2022
Top 3 IoT Security Trends for 2022
Apr 27 2022

For many 2022 has been highlighted as critical in terms of IoT security, with The PSA Certified...

Read More
Can convenience and security coexist in digital payment?
Can convenience and security coexist in digital payment?
Apr 04 2022

The quick and easy way we pay online is the most fundamental agenda of digital transformation...

Read More
Smart factory vulnerabilities: operational aspects are not the only thing at risk
Smart factory vulnerabilities: operational aspects are not the only thing at risk
Mar 23 2022

IoT provides opportunity for businesses to improve process, increase efficiency and thus...

Read More
Discover swIDch at MWC22 for the future of authentication in cyber security
Discover swIDch at MWC22 for the future of authentication in cyber security
Feb 24 2022

OTAC-embedded-Smart Card will change the future of authentication in the telecom industry and...

Read More
The 2022 IoT clamp down: how impending UK regulations are influencing the market
The 2022 IoT clamp down: how impending UK regulations are influencing the market
Jan 27 2022

Governments are becoming increasingly aware of the importance of IoT security, not only because of...

Read More
Is there a solution to the hacking problem behind the convenient IoT world?
Is there a solution to the hacking problem behind the convenient IoT world?
Jan 12 2022

The world is getting smarter. As various products in our daily life are connected to the network,...

Read More
Drone Misuse: A Threat To Be Reckoned With
Drone Misuse: A Threat To Be Reckoned With
Dec 15 2021

A recent report published by the Department for Business, Energy & Industrial Strategy (BEIS)...

Read More
Why the Cyber Security of your business is in the hands of your most frustrated employee
Why the Cyber Security of your business is in the hands of your most frustrated employee
Dec 08 2021

According to a study by Tech News World, more than half of US IT and cybersecurity professionals...

Read More
(Part 4) Key security vulnerabilities in IoT environment and how to effectively counteract them
(Part 4) Key security vulnerabilities in IoT environment and how to effectively counteract them
Nov 29 2021

Welcome to the final instalment, part 4 of our IoT security vulnerabilities blog series. As I’ve...

Read More
Gen N Brings New Importance to User Authentication in Today’s Hybrid Work Environments
Gen N Brings New Importance to User Authentication in Today’s Hybrid Work Environments
Nov 10 2021

Remote working environments are not necessarily new to business, but are certainly fast becoming...

Read More

Featured

Cyber Shield: The Dawn of Digital Resilience with Cyber Resilience Act (CRA)
Cyber Shield: The Dawn of ...
Read More
Navigating the Evolution of Authentication from Past to Present
Navigating the Evolution of ...
Read More
Quantum-Proofing Our Secrets: Safeguarding Communication in the Age of Quantum Computers
Quantum-Proofing Our Secrets: ...
Read More

Looking to stay up-to-date with our latest news?

Subscribe to our newsletter