Blog

Blog

Stay informed on the latest trends,
insight and research in cybersecurity with swIDch Blog.

Popular

The OT Security Gap Behind the French Hospital Attack
The OT Security Gap Behind the French Hospital Attack
May 26 2025

On a winter morning in 2024, several hospitals across France were forced into emergency...

Read More
The Pivotal Role of Identity in OT Cybersecurity
The Pivotal Role of Identity in OT Cybersecurity
May 13 2025

Operational Technology (OT) environments, which control critical infrastructure and industrial...

Read More
How AI Is Transforming Authentication in Cybersecurity
How AI Is Transforming Authentication in Cybersecurity
May 09 2025

AI is no longer confined to massive central servers. It is now making decisions and taking actions...

Read More
Iberian Blackout Shows Why OT Cybersecurity Can’t Be an Afterthought
Iberian Blackout Shows Why OT Cybersecurity Can’t Be an Afterthought
Apr 30 2025

In late April 2025, Spain and Portugal were hit by one of the most extensive power outages in...

Read More
Why Securing Distributed Control Systems Is No Longer Optional
Why Securing Distributed Control Systems Is No Longer Optional
Apr 15 2025

The distributed control system (DCS) is the core of industrial automation. It synchronises...

Read More
Why Revolutionary Security Solutions Often Struggle in OT Environments
Why Revolutionary Security Solutions Often Struggle in OT Environments
Apr 10 2025

In the age of digital transformation, cybersecurity has become a boardroom topic across...

Read More
Evaluating PKI and OTAC for Secure Operational Technology
Evaluating PKI and OTAC for Secure Operational Technology
Mar 24 2025

The ubiquity of Public Key Infrastructure (PKI) in securing our digital world is undeniable. From...

Read More
Why Are Cyberattacks on OT Systems More Dangerous Than IT Breaches?
Why Are Cyberattacks on OT Systems More Dangerous Than IT Breaches?
Mar 13 2025

When people think of cyberattacks, they often picture stolen data, financial fraud, or personal...

Read More
Securing OT: Moving Beyond Passwords with swIDch's OTAC
Securing OT: Moving Beyond Passwords with swIDch's OTAC
Feb 25 2025

In the realm of Operational Technology (OT), the security measures applied to protect critical...

Read More
Securing Firmware Updates as a Critical Step in OT Cybersecurity
Securing Firmware Updates as a Critical Step in OT Cybersecurity
Feb 17 2025

In the world of Operational Technology (OT), firmware updates are a necessary but often...

Read More

Featured

The OT Security Gap Behind the French Hospital Attack
The OT Security Gap Behind ...
Read More

Looking to stay up-to-date with our latest news?

Subscribe to our newsletter