Survival of the Fastest. Do You Meet the 15-30-60 Rule for Preventing xIoT Threats Faster? Find out
Phosphorus Cybersecurity blue logo
  • Platform
  • Partners
  • Resources
  • Company
  • Support
Get a Demo — it's free
  • Blog
  • News
  • Press Releases
  • Events
Mobile Phosphorus blue logo
  • Platform
    • FIND
      • Intelligent Active Discovery
      • Risk Assessment
      • Global Device Network
    • FIX
      • Password Management
      • Patch Management & Remediation
    • MONITOR
      • Detect & Response
  • Industry
    • Manufacturing
    • Healthcare
    • Energy & Utilities
    • Data Centers
    • Banking & Finance
    • Retail
    • Auto Dealerships
    • Every Device Counts
    • Reduce Truck Rolls
    • Complete Your IoT/OT Project
  • Partners
    • Integrations
    • Phosphorus and Check Point
    • Phosphorus and Microsoft Sentinel
    • Phosphorus and ServiceNow
    • Phosphorus and Axonius
    • Phosphorus and CyberArk
    • Become a Partner
  • Resources
    • Resource Center
    • Proof of Value Report
    • Advisory Session
    • IoT Security Podcast
    • Blogs and more
    • In the News
    • Events
    • Phosphorus Live
    • Compare Phosphorus
  • Company
    • Why Phosphorus?
    • About us
    • Leadership
    • Careers
    • Phosphorus Labs
    • 15-30-60 xIoT Challenge
  • Support
  • Get a Demo
Get a Demo — it's free

xIoT Research

xIoT: Defined. Discussed. Secured.

  • September 8, 2022
  • Author John Vecchi
xIoT-graphic-2022

Version Releases

Phosphorus Expands xIoT Security Platform with New Device Hardening Actions and Configuration Management Capabilities

  • October 6, 2022
  • Author Sonu Shankar

Security Trends

Finding Your ‘Creative Maliciousness’: John Terrill guests on Security Breach

  • September 26, 2024
  • Author Phosphorus Cybersecurity

Interview: Are your IoMT devices using default passwords?

  • October 2, 2023
  • Author Phosphorus Cybersecurity

StrategicCIO360: Protecting Your Company From IoT Threats

  • February 3, 2023
  • Author Chris Rouland

Achieving Zero Trust in IoT

  • January 24, 2023
  • Author Phosphorus Cybersecurity

Tag: News

  • Home
  • Blog
  • News
IoT cybersecurity news
IoT cybersecurity news
Phosphorus Cybersecurity February 11, 2025

Russia decreases access to public internet, likely in response to cyber warfare

In a recent CyberNews article, Phosphorus’ Sonu Shankar weighed in on Russia’s growing digital isolation and what it means for cybersecurity worldwide. As the country limits its devices’ exposure...
IoT cybersecurity news Phosphorus Blog
A Security Week image. Wire frame of an industrial landscape, possibly facing increased threats of evolving OT malware
IoT cybersecurity news Phosphorus Blog
Phosphorus Cybersecurity February 6, 2025

OT Security Threats Aren’t Evolving. They’re Accelerating.

2025 will bring a new wave of OT malware that’s more sophisticated, scalable, and financially motivated than ever before. Threats like FrostyGoop, Fuxnet, and Volt Typhoon’s KV-Botnet are setting...
IoT cybersecurity news
Ry Crist/CNET
IoT cybersecurity news
Phosphorus Cybersecurity January 29, 2025

Will TP-Link Routers Get the TikTok Treatment?

While the TikTok ban has been staved off (for now), the debate over Chinese influence in technology rages on.
IoT cybersecurity news Phosphorus Blog
Different colored clouds contains groups of IoT devices connect down to a city skyline. The Manufacturing.net logo appears in the top left.
IoT cybersecurity news Phosphorus Blog
Phosphorus Cybersecurity December 30, 2024

These Agencies Need Help: IoT Security is MIA

The deadline was the end of 2024. However, several federal agencies missed their recent deadlines to meet requirements for IoT cybersecurity programs specifically referred to in a law passed...
IoT cybersecurity news
IoT cybersecurity news
Phosphorus Cybersecurity December 20, 2024

Proposed TP-Link Router Ban More About Politics Than Exploitation Risk

Even as U.S. government agencies contemplate a ban on TP-Link routers, two-thirds of Americans in consumer and small business rely on the Chinese brand for Wi-Fi delivery. Despite TP-Link...
IoT cybersecurity news
Water, Wastewater Cybersecurity Still Has Long Way to Go
IoT cybersecurity news
Daniel Craig December 5, 2024

OIG Report Identifies Security Flaws in Water Systems

The issues described in the EPA OIG report are as much cultural as they are technical, John Terrill tells Claroty Nexus. The report highlights security gaps in water and...
IoT cybersecurity news
Pushing the boulder up the hill as CISA pushes for secure software deployment
IoT cybersecurity news
Daniel Craig November 14, 2024

Secure Software Development Gets a Push from CISA

In the wake of the CrowdStrike incident, the US Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the Australian Signals Directorate (ASD) have issued new guidance aimed at...
IoT cybersecurity news
IoT cybersecurity news
Daniel Craig November 6, 2024

What Can Australian Businesses Do Before the Cyber Security Act is Finalized?

Australia’s ambitious Cyber Security Act, its first standalone piece of cybersecurity legislation, introduces new standards for smart devices, ransomware reporting, and critical infrastructure protections. The Act has yet to...
IoT cybersecurity news
IoT cybersecurity news
Phosphorus Cybersecurity November 1, 2024

CISA Looks to Global Cooperation for Strategic Plan Against Cyber Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) unveiled its global plan for partnering internationally against cyber threats and attacks. Together with the Department of Homeland Security, the State Department,...
IoT cybersecurity news
IoT cybersecurity news
Phosphorus Cybersecurity October 30, 2024

New CISA-DHS Guidance: Prepare for Quantum Risks…or Focus on Today’s Threats?

As quantum computing evolves, so do our conversations around security. Yet, John Terrill, CISO at Phosphorus, urges OT operators to focus on what matters today: building defenses against the...
IoT cybersecurity news
IoT cybersecurity news
Phosphorus Cybersecurity October 28, 2024

Is the ROUTERS Act’s Scope Too Narrow?

The ROUTERS Act, now in the hands of the Senate, could bring about a massive study into the security posture of the nation’s routers. Meanwhile, some, like CISO John...
IoT cybersecurity news
IoT cybersecurity news
Phosphorus Cybersecurity October 23, 2024

Anniversary: TSA’s cybersecurity groundwork for the rails

On the anniversary of the TSA’s updates to cybersecurity requirements for passenger and freight railroad carriers, the focus remains on building cyber-resilient systems, proactive security tools, and rail-specific cybersecurity...
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
Phosphorus Cybersecurity® is the industry’s only xIoT discovery and remediation platform.
Linkedin Youtube
Solutions
  • xIoT Security Management
  • Intelligent Active Discovery
  • Global Device Network
  • Manage and Monitor
  • Partners
Industry
  • Healthcare
  • Manufacturing
  • Energy & Utilities
  • Data Centers
  • Retail & Hospitality
Resources
  • All Resources
  • Blog
  • Data Sheets
  • Phosphorus LIVE
  • Events
Contact
  • Support
  • Request a Demo
  • Terms of Service
  • Privacy Policy
Copyright © Phosphorus Cybersecurity 2024. All Rights Reserved.
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

RSVP for Bi-Weekly Events Today

BOOK YOUR DEMO

IoT and OT visibility, remediation, and management for Data Centers

Mitigate risk, maintain trust, and ensure compliance for your customers with visibility, remediation, and management for every IoT and OT asset.

Book your Demo Today



The information you provide may be used to send you updates from Phosphorus Cybersecurity. You may opt-out at any time. By submitting this form, you are agreeing to our privacy policy.
Happy Hour


The information you provide may be used to send you updates from Phosphorus Cybersecurity. You may opt-out at any time. By submitting this form, you are agreeing to our privacy policy.
Meet with Us


The information you provide may be used to send you updates from Phosphorus Cybersecurity. You may opt-out at any time. By submitting this form, you are agreeing to our privacy policy.

Take the Challenge


 

The most comprehensive xIoT Security Management Platform for Manufacturing

Unified xIoT Security Management Platform for OT, ICS, and IIoT Cyber-Physical Systems.

Learn More

RSVP for Bi-Weekly Events Today

RSVP for Bi-Weekly Events Today

RSVP for Bi-Weekly Events Today

Life Science

Unified xIoT Security Management Platform for OT, ICS, and SCADA Cyber-Physical Systems.

Critical Infrastructure

Unified xIoT Security Management Platform for OT, ICS, and SCADA Cyber-Physical Systems.

Comprehensive xIoT Security Management for Oil & Gas

Unified xIoT Security Management Platform for OT, ICS, and SCADA Cyber-Physical Systems.

Learn More

Smart Cities

Unified xIoT Security Management Platform for OT, ICS, and SCADA Cyber-Physical Systems.

Comprehensive xIoT Security Management for Energy & Utilities

Unified xIoT Security Management Platform for OT, ICS, and SCADA Cyber-Physical Systems.

Learn More

Delivering secure, compliant infrastructure solutions and robust connectivity

Leading data center providers are now leveraging xTended Internet of Things (xIoT) devices – including IoT and OT Cyber-Physical Systems – more extensively than ever across local and global facilities.

Learn More

Enhance the customer experience and maintain a secure, compliant xIoT environment

With the proliferation of smart devices and connected technologies in the retail and hospitality sectors, businesses are increasingly integrating xTended Internet of Things (xIoT) devices to enhance customer experiences and streamline operations.

Learn More

xIoT Security for Financial Services

Firms that don’t invest in securing their digital resources are exposed and liable for security breaches in the unmonitored xIoT landscape.

Learn More

The most comprehensive xIoT Security Management Platform for Healthcare

Proactively FIND, FIX, and MANAGE every IoT, OT, and IoMT device.

Learn More


Register Now for The Phosphorus S4x24 Happy Hour





Phosphorus (un)Believable Tour