Blog

Blog

Stay informed on the latest trends,
insight and research in cybersecurity with swIDch Blog.

Popular

Billions at Risk from Exposed OT Systems Demand Urgent Action
Billions at Risk from Exposed OT Systems Demand Urgent Action
Aug 27 2025

This August, two independent studies made one thing clear—the risks facing Operational Technology...

Read More
£1 Billion for Cybersecurity Shows the Urgent Need for Robust OT Security
£1 Billion for Cybersecurity Shows the Urgent Need for Robust OT Security
Aug 19 2025

In 2025, the UK government announced a bold cybersecurity push, pledging a massive investment to...

Read More
Impact of the Cyber Resilience Act (CRA) on the Operational Technology (OT) Sector
Impact of the Cyber Resilience Act (CRA) on the Operational Technology (OT) Sector
Aug 04 2025

The Cyber Resilience Act (CRA) is poised to significantly reshape the landscape of cybersecurity...

Read More
Air-Gapped but Not Immune
Air-Gapped but Not Immune
Jul 28 2025

In the world of Operational Technology (OT), isolation is often seen as a shield. Air-gapped...

Read More
What Blockbuster Movies Are Teaching Us About OT Security
What Blockbuster Movies Are Teaching Us About OT Security
Jul 21 2025

Cyberattacks are everywhere in entertainment—from Hollywood blockbusters to binge-worthy thrillers....

Read More
What Makes IEC 62443 FR1 a Top Priority for OT Security This Year
What Makes IEC 62443 FR1 a Top Priority for OT Security This Year
Jul 11 2025

When it comes to OT (Operational Technology) security, standards don’t usually make headlines. But...

Read More
When Cyber Threats Reach Industrial Systems It’s Already Too Late
When Cyber Threats Reach Industrial Systems It’s Already Too Late
Jul 04 2025

The convergence of IT and OT systems has brought greater efficiency, visibility, and automation to...

Read More
The Overlooked Vulnerability: User Authentication in Purdue Model Level 3-0 OT Devices
The Overlooked Vulnerability: User Authentication in Purdue Model Level 3-0 OT Devices
Jun 30 2025

Operational Technology (OT) environments, particularly those conforming to the Purdue Model, face...

Read More
Why OT Organisations Can’t Afford to Ignore Endpoint Security Anymore
Why OT Organisations Can’t Afford to Ignore Endpoint Security Anymore
Jun 13 2025

Ransomware may start in IT, but it doesn’t always stop there. In recent years, critical...

Read More
Beyond the Deadline: Are You Prepared for the Reality of NIS2?
Beyond the Deadline: Are You Prepared for the Reality of NIS2?
Jun 09 2025

The NIS2 Directive is the EU-wide legislation on cybersecurity. It provides legal measures to boost...

Read More

Featured

Billions at Risk from Exposed OT Systems Demand Urgent Action
Billions at Risk from Exposed ...
Read More

Looking to stay up-to-date with our latest news?

Subscribe to our newsletter