Blog

Blog

Stay informed on the latest trends,
insight and research in cybersecurity with swIDch Blog.

Popular

Why should continuous authentication be at the heart of your Zero Trust Architecture?
Why should continuous authentication be at the heart of your Zero Trust Architecture?
Jul 26 2023

Traditional perimeter-centric network security is based around a well defined network boundary...

Read More
2FA & MFA: The Good, The Bad & The Ugly
2FA & MFA: The Good, The Bad & The Ugly
Jul 04 2023

2FA and MFA are methods of verifying a user’s identity using two or more factors, such as...

Read More
A comprehensive guide to secure operational technology (OT)
A comprehensive guide to secure operational technology (OT)
Jun 05 2023

In today's interconnected world, Operational Technology (OT) faces increasing security challenges...

Read More
Facts to keep in mind to address smart factory security vulnerabilities
Facts to keep in mind to address smart factory security vulnerabilities
Mar 23 2023

The smart factory is a representative technology innovation field of Industry 4.0. It increases...

Read More
DCS vs PLC - what are the key differences?
DCS vs PLC - what are the key differences?
Feb 16 2023

This is one of the most commonly asked questions in relation to industrial control and automation...

Read More
Taking the leap - Overcoming security concerns to realise PLCs full potential
Taking the leap - Overcoming security concerns to realise PLCs full potential
Jan 24 2023

In September 2022, 55 programmable logic controllers (PLCs) used in major facilities in Israel were...

Read More
How to protect IoT with zero trust
How to protect IoT with zero trust
Jan 04 2023

While driving, sometimes a digital map guides you not to the initial route, but to an alternative...

Read More
Key cyber security trends for 2023
Key cyber security trends for 2023
Nov 30 2022

Throughout 2022, cyber security continued to evolve at pace as both hackers and cyber criminals...

Read More
Evolution of identity authentication technology required by digital transformation
Evolution of identity authentication technology required by digital transformation
Oct 26 2022

COVID-19 has propelled society into a fully-fledged digital era where everything is connected by...

Read More
Implementing MFA with swIDch's TAP-OTAC [Technical article]
Implementing MFA with swIDch's TAP-OTAC [Technical article]
Oct 12 2022

Abstract swIDch introduces an entirely new type of user authentication factor with the Tap-OTAC...

Read More

Featured

To Encrypt or not to Encrypt in OT Networks
To Encrypt or not to Encrypt ...
Read More
Securing the Seas through Advanced Authentication Revolutionising Safer and Cleaner Shipping
Securing the Seas through ...
Read More
Synergizing Standards: How NIS2, CRA, and IEC 62443 Forge a Unified Front in OT Cyber Security
Synergizing Standards: How ...
Read More

Looking to stay up-to-date with our latest news?

Subscribe to our newsletter