Blog

Blog

Stay informed on the latest trends,
insight and research in cybersecurity with swIDch Blog.

Popular

How to put your customers in control of their digital Identity even if they lose their phone
How to put your customers in control of their digital Identity even if they lose their phone
Nov 07 2023

In a hyper connected world mobile phones have become an essential part of our lives, not only for...

Read More
Passwordless Authentication: The Next Step in Cybersecurity
Passwordless Authentication: The Next Step in Cybersecurity
Oct 24 2023

Many industries are changing their authentication systems to passwordless systems. Technology...

Read More
Identity Defined Security (IDS) to Safeguard the Digital Realm
Identity Defined Security (IDS) to Safeguard the Digital Realm
Oct 10 2023

Cyber security is a term that has become ubiquitous in today’s digital world. Everyone is aware of...

Read More
Protecting Industrial Control Systems (ICS) from Identity Breach Incidents: Lessons from Notable Cases
Protecting Industrial Control Systems (ICS) from Identity Breach Incidents: Lessons from Notable Cases
Sep 20 2023

In today's interconnected world, the security of Industrial Control Systems (ICS) is of paramount...

Read More
Zero Trust maturity model: The path to transition to a Zero Trust architecture
Zero Trust maturity model: The path to transition to a Zero Trust architecture
Aug 23 2023

In an era marked by escalating cyber threats and the transformative power of digital connectivity,...

Read More
Securing Operational Technology in an Interconnected World: Challenges and the Imperative of Authentication
Securing Operational Technology in an Interconnected World: Challenges and the Imperative of Authentication
Aug 10 2023

In today's rapidly evolving technological landscape, the convergence of Operational Technology (OT)...

Read More
Why should continuous authentication be at the heart of your Zero Trust Architecture?
Why should continuous authentication be at the heart of your Zero Trust Architecture?
Jul 26 2023

Traditional perimeter-centric network security is based around a well defined network boundary...

Read More
2FA & MFA: The Good, The Bad & The Ugly
2FA & MFA: The Good, The Bad & The Ugly
Jul 04 2023

2FA and MFA are methods of verifying a user’s identity using two or more factors, such as...

Read More
A comprehensive guide to secure operational technology (OT)
A comprehensive guide to secure operational technology (OT)
Jun 05 2023

In today's interconnected world, Operational Technology (OT) faces increasing security challenges...

Read More
Facts to keep in mind to address smart factory security vulnerabilities
Facts to keep in mind to address smart factory security vulnerabilities
Mar 23 2023

The smart factory is a representative technology innovation field of Industry 4.0. It increases...

Read More

Featured

The Future of Industrial Cybersecurity: IEC 62443 Meets OTAC
The Future of Industrial ...
Read More
Intrigue and Defense in Critical Industries Unveiling the Cyber Battlefield
Intrigue and Defense in ...
Read More
Cyber Shield: The Dawn of Digital Resilience with Cyber Resilience Act (CRA)
Cyber Shield: The Dawn of ...
Read More

Looking to stay up-to-date with our latest news?

Subscribe to our newsletter