The IoT Security Podcast has, for the second time, been recognized in the Best Cybersecurity Podcast category for the 2025 Cybersecurity Excellence Awards. This recognition underscores our commitment to...
In this episode, host Eric Johansen welcomes Bill Lucas, Senior Director of Cybersecurity at Mastronardi Produce, to explore the evolving security challenges in agricultural IoT. With over sixteen years...
In a recent CyberNews article, Phosphorus’ Sonu Shankar weighed in on Russia’s growing digital isolation and what it means for cybersecurity worldwide. As the country limits its devices’ exposure...
2025 will bring a new wave of OT malware that’s more sophisticated, scalable, and financially motivated than ever before. Threats like FrostyGoop, Fuxnet, and Volt Typhoon’s KV-Botnet are setting...
What did 2024 teach us about securing the IoT and OT landscape? In this special 2024 lookback episode, Alex Nehmy, Asia Pacific CTO at Phosphorus, revisits impactful moments from industry...
It seems that 2024 was a record-breaking year…for Mirai. Cloudflare reports having blocked the largest-ever DDoS attack to be reported to date originating from a Mirai-variant botnet in October...
By combining Check Point’s cutting-edge platform for defending against the most sophisticated cyber-attacks with the Phosphorus capabilities to find, fix, and manage all of your enterprise xIoT, this integration...
Look at the news lately? Critical infrastructure and industrial environments have been in the crosshairs. The need for robust security in Operational Technology (OT) and Industrial Control Systems (ICS)...
In this episode, host and xIoT security evangelist John Vecchi sits down with Enrique Martinez, OT/IoT Practice Lead at World Wide Technology (WWT), to explore the critical challenges and...
The deadline was the end of 2024. However, several federal agencies missed their recent deadlines to meet requirements for IoT cybersecurity programs specifically referred to in a law passed...
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
IoT and OT visibility, remediation, and management for Data Centers
Mitigate risk, maintain trust, and ensure compliance for your customers with visibility, remediation, and management for every IoT and OT asset.
Book your Demo Today
The information you provide may be used to send you updates from Phosphorus Cybersecurity. You may opt-out at any time. By submitting this form, you are agreeing to our privacy policy.
Happy Hour
The information you provide may be used to send you updates from Phosphorus Cybersecurity. You may opt-out at any time. By submitting this form, you are agreeing to our privacy policy.
Meet with Us
The information you provide may be used to send you updates from Phosphorus Cybersecurity. You may opt-out at any time. By submitting this form, you are agreeing to our privacy policy.
Take the Challenge
The most comprehensive xIoT Security Management Platform for Manufacturing
Unified xIoT Security Management Platform for OT, ICS, and IIoT Cyber-Physical Systems.
Delivering secure, compliant infrastructure solutions and robust connectivity
Leading data center providers are now leveraging xTended Internet of Things (xIoT) devices – including IoT and OT Cyber-Physical Systems – more extensively than ever across local and global facilities.
Enhance the customer experience and maintain a secure, compliant xIoT environment
With the proliferation of smart devices and connected technologies in the retail and hospitality sectors, businesses are increasingly integrating xTended Internet of Things (xIoT) devices to enhance customer experiences and streamline operations.