29/04/2025
What makes Swissbit SD & microSD-Cards so special
In my first blog post, I analyze the factors that enable certain SD and microSD cards to withstand harsh conditions. I discuss the features that enhance their durability and explains why Swissbit SD and microSD cards are the most durable in harsh environments.
Latest Blog Posts
03/04/2025
Bypassing MFA: The Rise of Adversary-in-the-Middle Attacks
In my new article, I examine Adversary-in-the-Middle (AitM) attacks and compares this novel approach to traditional Man-in-the-Middle (MitM) attacks. The article shows how multi-factor authentication (MFA) can be bypassed as a core feature, but there is an effective way to prevent this: FIDO2
13/02/2025
[German Special] Doppelte Umwälzung am Kassenmarkt
Die Kassenbranche befindet sich im Umbruch – und dies gleich in zweifacher Hinsicht. Denn der Trend zum Soft-PoS-System, oft im Rahmen gemischter Kassenlandschaften implementiert, macht die Fiskalisierung komplexer. Zugleich rollt eine Welle strengerer Cybersecurity-Anforderungen auf die Hersteller zu – angeführt vom EU Cyber Resilience Act, der auch Kassen-Systeme betrifft!
12/02/2025
Swissbit Storage for Network and Communications
In this article, Norman Schmidt definitively examines the network and telecommunications industry (NetCom). These companies around the world depend on their critical data being kept secure, accessible, and reliable under the most demanding conditions. Norman clearly outlines the solutions and the significant benefits for these companies of relying on Swissbits' expertise to meet the challenges they face.
05/02/2025
Advantages of NVMe Features for Industrial Storage
In his first blog post, Norman Schmidt provides a comprehensive overview of NVMe, emphasizing its significance and the advantages it offers. Additionally, he outlines which NVMe features are supported by Swissbit storage products, offering valuable insights for those seeking to understand the capabilities of these technologies.
29/01/2025
Authentication 101: Passkeys for Enterprises?
In his new blog post for the “authentication 101” series, Travis Dunn takes a closer look at the development of FIDO Passkeys. Microsoft, Google and Apple are pushing the topic of passwordless authentication on the consumer side but is it realistic that passkeys will soon be used in companies? In his conclusion, Travis recommends another existing alternative: hardware authentication.
17/01/2025
EU Regulation DORA: How hardware authentication can secure financial companies
The Digital Operational Resilience Act (DORA) is the next major EU regulation to come into force. The aim of the EU regulation is to strengthen the IT security of European financial companies. Hardware authentication via FIDO Security Key can help effectively, as this article by Travis Dunn shows.
08/01/2025
Authentication 101: What makes hardware authentication so attractive to companies?
In his third "Authentication 101" blog post, Alexander explores the question of why hardware authentication is very attractive for companies. He highlights the most important aspects for the use of FIDO security keys. Using the iShield Key series as an example, he shows that Swissbit has assumed the role of technology leader in the FIDO security key sector.
02/12/2024
Social Robots: Where AI Meets Data Protection
Beyond industrial machines, a new wave of social robots is reshaping human interaction – from assisting in nursing homes to greeting at airports. But with this innovation comes a critical question: How can we protect sensitive data while enabling AI-driven relationships? Discover the balance between cutting-edge robotics and data security compliance in this latest blog by Matthias Poppel.
09/10/2024
Autonomous Cars: A Technological Revolution in Slow Motion
Autonomous vehicles are often associated with robotaxis, but this complex use case faces major hurdles. Meanwhile, in controlled environments like warehouses and highways, autonomous driving is already proving its value. In his latest blog post, Matthias Poppel explores how the real revolution is unfolding beyond city streets.
27/08/2024
Authentication 101: A comparison of five well known authentication methods
In his second "Authentication 101" blog post, Alexander Summerer presents selected methods for authenticating and protecting digital identities. He shows where their strengths and weaknesses lie. Finally, he gives a brief assessment of each method. The summary focuses mainly on the iShield Key series.
20/08/2024
Data Processing: 5 key benefits of Edge Computing
Martin Schreiber explores the essentials of Edge Computing and points out how and why Edge Computing offers a number of benefits that make it an important component of modern IT infrastructures. The five key benefits of Edge Computing contain security, mobility, speed and latency tolerance, cost, availability and stability.
23/07/2024
Authentication Basics: 7 Benefits of Using Hardware Tokens for MFA
In his latest blog post of the "Authentication Basics" series, Chris Collier explores the essentials of multi-factor authentication (MFA) and points out how and why hardware tokens provide unparalleled security and ease of use. Discover why these physical devices are a top choice for robust online protection against phishing and other cyber threats.
15/07/2024
Flash Memory on a Rollercoaster Ride: Q3 Update
Fasten your seat belt! The flash memory market's wild ride continues in 2024. Demand for AI and data centers soars, while automotive sputters. Join our Head of Product Management Martin Schreiber to see where the market's headed next and who's leading the charge.
08/07/2024
(Edge) AI: From Science Fiction to Reality
Today, AI makes us think of generative AI like ChatGPT, but the future lies in Edge AI, working directly at data sources. This shift will revolutionize daily life and demand robust system design. Five years ago, ChatGPT seemed like science fiction. Now, AI permeates various processes and products. Join our CSMO Matthias Poppel as he explores how Edge AI will transform our lives and the new challenges it brings.
02/07/2024
FIPS 140-3: Enhancing Cryptographic Security for Modern Challenges
In his latest blog post, Chris Collier explores FIPS 140-3, the new standard for cryptographic modules used by the U.S. government, replacing FIPS 140-2. This update addresses the need for improved security amid technological advancements and new threats. Learn more about key updates such as alignment with international standards, enhanced security requirements, and rigorous testing protocols.
26/06/2024
EU Regulation NIS2: Don't Get Caught Off Guard!
The EU's NIS2 Directive is tightening cybersecurity for critical infrastructures. Navigating these regulations can be daunting. Alexander Summerer explains what NIS2 means for your organization and how Multi-Factor Authentication (MFA) can help you comply. Discover who is affected, the penalties for non-compliance, and why USB tokens might be the most secure and cost-effective MFA solution.
18/06/2024
Authentication Basics: An Introduction to FIDO2
Join our IAM technologist, Chris Collier, in a new blog series about the basics of authentication, Identity & Access Management, and cybersecurity. In this first post, Chris explores the fundamentals of the FIDO2 standard, offering essential information and practical tips for software administrators aiming to implement this robust security protocol.
13/06/2024
MFA is essential: Why a hardware token can make all the difference
At the beginning of June, the Christian Democratic Union (CDU) in Germany was the victim of a serious cyberattack. Hackers exploited a VPN vulnerability and accessed sensitive data. This attack underlines (once again) the urgent need for multi-factor authentication (MFA), says Claus Gründel, General Manager for Swissbit's security solutions, and emphasizes the importance of decisive action in cyber security.
23/04/2024
Secure Boot: A Key to Digital Security
Have you ever wondered how your computer system safeguards itself at startup? Our security specialist Johann-Philipp Thiers provides an introductory look into “Secure Boot” exploring its crucial role in protecting your data and devices. Discover how this technology builds a "Chain of Trust" and why it's essential for maintaining a secure digital environment.
17/01/2024
Unlocking the Future of Cybersecurity: Zero Trust Solutions with Hardware Authentication
Dive into the concept of 'zero trust' and learn practical implementation strategies to safeguard your company's critical resources and data against internal and external threats. In his blog post – and our corresponding white paper – Alexander Summerer reveals how zero trust principles, including hardware-based authentication like FIDO security keys, can elevate your security measures and proactively minimize risks.
28/02/2023
Application-Optimized SSDs: Life in the Digital Fast Lane
In their highly competitive market, data center operators need to adapt their storage equipment to match the application load as exactly as possible. This blog post shows how that can be accomplished and what cars in the fast lane have to do with it.
10/01/2023
4 reasons to use industrial 3D TLC NAND flash as pseudo-SLC
The ability to operate TLC in pseudo-SLC mode with one bit per cell continues to carve out a niche existence. However, for a vast number of applications the economic advantages of this configuration outweigh the disadvantages. We've compiled four arguments to consider.
31/10/2022
Wrong Flash Storage: 5 main reasons for occurring issues
NAND Flash SSDs are generally accepted as standard and universal storage devices. Nevertheless, many things can go wrong if you don’t choose the right SSD for your application. Here are the main areas where damage may occur by using unsuited products.
16/08/2022
Flash Memory in the Era of the Software-Defined Car
The implementation of effective cyber security risk mitigation mechanisms as well as the functional split between hardware and software are major challenges for automotive OEMs. The Swissbit Automotive competence offers solution paths for both areas - and even more.
30/06/2022
5 reasons why CFexpress is the future
Do you want to know, why does CFexpress have the potential to become the number 1 removable storage media for demanding industrial applications? We've compiled five arguments.
14/12/2021
SATA vs. PCIe: Competition or Coexistence?
SATA is dead, long live PCIe! Wait a minute, it’s not that simple! Let's take a closer look at both interfaces and check where each of them can show their advantages.
19/07/2021
Explained: Garbage Collection
The clear up process of being able to release entire blocks in flash memory is called “garbage collection”. But how does it work?
18/07/2021
From CompactFlash to SD Express
Industrial memory cards over the course of time and what to look out for when you need to use them in industrial applications.