Blog
insight and research in cybersecurity with swIDch Blog.
Popular
As industrial organisations enter the second quarter of 2026 a fundamental shift in the cyber...
The most enduring comfort in industrial security has always been the concept of physical...
A startling figure has emerged from recent global OT security research that should keep every...
To destroy a single physical power plant in a conventional conflict, an adversary requires...
Across industrial sectors, most OT incidents do not begin with sophisticated exploits. They begin...
In late 2025,a coordinated cyberattack disrupted parts of Poland’s power grid, affectingrenewable...
Approval has long been treated as a proxy for control. If access is approved, it is assumed to be...
At a large industrial site, a contractor needed temporary access to a controller to complete...
At a large manufacturing plant in Northern Europe, a routine maintenance task nearly became a...
For many OT organisations, Passwordless still feels abstract. The concept is attractive — fewer...
Looking to stay up-to-date with our latest news?