Survival of the Fastest. Do You Meet the 15-30-60 Rule for Preventing xIoT Threats Faster? Find out
Phosphorus Cybersecurity blue logo
  • Platform
  • Partners
  • Resources
  • Company
  • Support
Get a Demo — it's free
  • Blog
  • News
  • Press Releases
  • Events
Mobile Phosphorus blue logo
  • Platform
    • FIND
      • Intelligent Active Discovery
      • Risk Assessment
      • Global Device Network
    • FIX
      • Password Management
      • Patch Management & Remediation
    • MONITOR
      • Detect & Response
  • Industry
    • Manufacturing
    • Healthcare
    • Energy & Utilities
    • Data Centers
    • Banking & Finance
    • Retail
    • Auto Dealerships
    • Every Device Counts
    • Reduce Truck Rolls
    • Complete Your IoT/OT Project
  • Partners
    • Integrations
    • Phosphorus and Check Point
    • Phosphorus and Microsoft Sentinel
    • Phosphorus and ServiceNow
    • Phosphorus and Axonius
    • Phosphorus and CyberArk
    • Become a Partner
  • Resources
    • Resource Center
    • Proof of Value Report
    • Advisory Session
    • IoT Security Podcast
    • Blogs and more
    • In the News
    • Events
    • Phosphorus Live
    • Compare Phosphorus
  • Company
    • Why Phosphorus?
    • About us
    • Leadership
    • Careers
    • Phosphorus Labs
    • 15-30-60 xIoT Challenge
  • Support
  • Get a Demo
Get a Demo — it's free

xIoT Research

xIoT: Defined. Discussed. Secured.

  • September 8, 2022
  • Author John Vecchi
xIoT-graphic-2022

Version Releases

Phosphorus Expands xIoT Security Platform with New Device Hardening Actions and Configuration Management Capabilities

  • October 6, 2022
  • Author Sonu Shankar

Security Trends

Finding Your ‘Creative Maliciousness’: John Terrill guests on Security Breach

  • September 26, 2024
  • Author Phosphorus Cybersecurity

Interview: Are your IoMT devices using default passwords?

  • October 2, 2023
  • Author Phosphorus Cybersecurity

StrategicCIO360: Protecting Your Company From IoT Threats

  • February 3, 2023
  • Author Chris Rouland

Achieving Zero Trust in IoT

  • January 24, 2023
  • Author Phosphorus Cybersecurity

Tag: Blog

  • Home
  • Blog
  • Blog
Phosphorus Blog
Phosphorus Blog
Daniel Craig November 4, 2022

Putting OpenSSL in Context for xIoT Device Security

OpenSSL.org announced last week that an updated version of its OpenSSL software package (v3.0.7) will be released on November 1, 2022. The update is expected to include a fix...
Phosphorus Blog
Phosphorus Blog
Sonu Shankar October 6, 2022

Phosphorus Expands xIoT Security Platform with New Device Hardening Actions and Configuration Management Capabilities

As the overall extended Internet of Things (xIoT) attack surface expands, connected devices are increasingly becoming attractive targets for threat actors to establish initial beachheads, facilitate lateral movement and...
Phosphorus Blog
xIoT-graphic-2022
Phosphorus Blog
John Vecchi September 8, 2022

xIoT: Defined. Discussed. Secured.

“Everything is becoming a computer… If it’s smart, it’s vulnerable.” – Mikko Hypponen, Chief Research Officer at F-Secure The enterprise attack surface of today has quickly evolved beyond traditional...
Phosphorus Blog
Phosphorus Blog
Phosphorus Cybersecurity September 20, 2021

How Your Printer Is Like Swiss Cheese

In February 2017, the FBI reported that a hacker using the alias Stackoverflowin compromised over 160,000 printers by scanning for printers open on ports 515, 631, and 9100. Stackoverflowin sent...
Phosphorus Blog
Phosphorus Blog
Phosphorus Cybersecurity July 8, 2021

Including IoT in a Zero Trust Model

While the zero trust security model is not new, it has certainly cemented itself as cybersecurity’s hottest buzzword. Following a National Institute of Standards and Technology (NIST) and National...
Phosphorus Blog
Phosphorus Blog
Phosphorus Cybersecurity May 19, 2021

Do you know every IoT device on your network?

Most organizations today unknowingly leave themselves vulnerable to attack. The source of this threat: connected devices. As the number of devices connecting to the network grows, so does the...
Phosphorus Blog
Phosphorus Blog
Phosphorus Cybersecurity May 10, 2021

Stopping Mirai: Bringing five years of wreaking havoc on devices to an end

In 2016, the makers of the Mirai malware turned their sights on well-known security expert Brian Krebs and his website KrebsonSecurity to flex their muscles. After the attackers published...
Phosphorus Blog
Phosphorus Blog
Phosphorus Cybersecurity April 16, 2021

Remediating the downstream security challenges of IoT device manufacturer breaches

This week, hackers breached Verkada security cameras exposing businesses, police departments, schools, jails and hospitals across the country. The incident, first reported by Bloomberg, allowed the hackers access to...
Phosphorus Blog
Phosphorus Blog
Phosphorus Cybersecurity April 15, 2021

What happens to customers when an IoT device manufacturer gets hacked?

This week, hackers breached Verkada security cameras exposing businesses, police departments, schools, jails and hospitals across the country. The incident, first reported by Bloomberg, allowed the hackers access to...
Phosphorus Blog
Phosphorus Blog
Phosphorus Cybersecurity March 18, 2021

When security becomes a threat itself: Inside the Verkada breach

This week, hackers breached Verkada security cameras exposing businesses, police departments, schools, jails and hospitals across the country. The incident, first reported by Bloomberg, allowed the hackers access to...
Phosphorus Blog
Phosphorus Blog
Phosphorus Cybersecurity March 12, 2021

A Step in the Right Direction: The IoT Cybersecurity Improvement Act

A constantly growing network of connected devices – also known as the Internet of Things (IoT) – is expanding the landscape and reach of information technology and enabling digital...
Phosphorus Blog
Phosphorus Blog
Phosphorus Cybersecurity March 2, 2021

CyberArk, Forescout and Phosphorus help orgs secure their IoT devices

CyberArk announced it is working with Forescout and Phosphorus to enable organizations to secure the increasing number of IoT devices and technologies resulting from digital business transformation. Customers can significantly reduce risk using...
  • 1
  • 2
  • 3
Phosphorus Cybersecurity® is the industry’s only xIoT discovery and remediation platform.
Linkedin Youtube
Solutions
  • xIoT Security Management
  • Intelligent Active Discovery
  • Global Device Network
  • Manage and Monitor
  • Partners
Industry
  • Healthcare
  • Manufacturing
  • Energy & Utilities
  • Data Centers
  • Retail & Hospitality
Resources
  • All Resources
  • Blog
  • Data Sheets
  • Phosphorus LIVE
  • Events
Contact
  • Support
  • Request a Demo
  • Terms of Service
  • Privacy Policy
Copyright © Phosphorus Cybersecurity 2024. All Rights Reserved.
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

RSVP for Bi-Weekly Events Today

BOOK YOUR DEMO

IoT and OT visibility, remediation, and management for Data Centers

Mitigate risk, maintain trust, and ensure compliance for your customers with visibility, remediation, and management for every IoT and OT asset.

Book your Demo Today



The information you provide may be used to send you updates from Phosphorus Cybersecurity. You may opt-out at any time. By submitting this form, you are agreeing to our privacy policy.
Happy Hour


The information you provide may be used to send you updates from Phosphorus Cybersecurity. You may opt-out at any time. By submitting this form, you are agreeing to our privacy policy.
Meet with Us


The information you provide may be used to send you updates from Phosphorus Cybersecurity. You may opt-out at any time. By submitting this form, you are agreeing to our privacy policy.

Take the Challenge


 

The most comprehensive xIoT Security Management Platform for Manufacturing

Unified xIoT Security Management Platform for OT, ICS, and IIoT Cyber-Physical Systems.

Learn More

RSVP for Bi-Weekly Events Today

RSVP for Bi-Weekly Events Today

RSVP for Bi-Weekly Events Today

Life Science

Unified xIoT Security Management Platform for OT, ICS, and SCADA Cyber-Physical Systems.

Critical Infrastructure

Unified xIoT Security Management Platform for OT, ICS, and SCADA Cyber-Physical Systems.

Comprehensive xIoT Security Management for Oil & Gas

Unified xIoT Security Management Platform for OT, ICS, and SCADA Cyber-Physical Systems.

Learn More

Smart Cities

Unified xIoT Security Management Platform for OT, ICS, and SCADA Cyber-Physical Systems.

Comprehensive xIoT Security Management for Energy & Utilities

Unified xIoT Security Management Platform for OT, ICS, and SCADA Cyber-Physical Systems.

Learn More

Delivering secure, compliant infrastructure solutions and robust connectivity

Leading data center providers are now leveraging xTended Internet of Things (xIoT) devices – including IoT and OT Cyber-Physical Systems – more extensively than ever across local and global facilities.

Learn More

Enhance the customer experience and maintain a secure, compliant xIoT environment

With the proliferation of smart devices and connected technologies in the retail and hospitality sectors, businesses are increasingly integrating xTended Internet of Things (xIoT) devices to enhance customer experiences and streamline operations.

Learn More

xIoT Security for Financial Services

Firms that don’t invest in securing their digital resources are exposed and liable for security breaches in the unmonitored xIoT landscape.

Learn More

The most comprehensive xIoT Security Management Platform for Healthcare

Proactively FIND, FIX, and MANAGE every IoT, OT, and IoMT device.

Learn More


Register Now for The Phosphorus S4x24 Happy Hour





Phosphorus (un)Believable Tour