America’s Cyber Strategy Depends on Securing Networked xIoT Devices The newly released Cyber Strategy for America signals a decisive shift in how the United States plans to defend its...
Phosphorus Sweeps SC Awards Finalist Spots for Both Innovation and Leadership
Recognition from the cybersecurity community is meaningful when it reflects both technical innovation and industry leadership. That’s why we are proud to announce that Phosphorus has been named a...
Osama Al-Zoubi, Vice President, MEA, Phosphorus Cybersecurity, highlights how Saudi Arabia’s rapid digital modernization is expanding the xIoT attack surface across critical sectors, exposing OT environments to escalating threats,...
According to a new incident report by CERT Polska, coordinated cyberattacks targeted Poland’s energy sector in late December 2025. Wind farms, solar installations, and a combined heat and power...
CISA’s new Binding Operational Directive, BOD 26-02: Mitigating Risk from End-of-Support Edge Devices, addresses one of the most persistent and dangerous blind spots in modern enterprise security: unsupported devices...
Introducing the Phosphorus xIoT Compliance Report Phosphorus is introducing a new capability that changes how compliance works for connected devices. The Phosphorus xIoT Compliance Report shifts compliance from documentation...
The U.S. Coast Guard’s enforcement of 33 CFR Part 101, Subpart F draws a clear line in the water for ports and terminals. Cybersecurity is no longer advisory or...
You discovered a lot of xIoT devices! 6.8 Billion IP addresses scanned on behalf of our customers Top 10 device types you discovered: IP Phones Printers Network Appliances IP...
CISA’s latest joint advisory exposes a trend security teams have long suspected: pro-Russian hacktivist groups are exploiting unintentionally exposed industrial control interfaces to disrupt critical infrastructure. These groups lack...
Amazon Threat Intelligence has released new findings that should concern every organization operating connected devices. Presented at CYBERWARCON 2025 and detailed in Amazon’s security blog, the research outlines how...
Healthcare has never been more connected or more exposed. While IT systems have long been the focal point of cybersecurity programs, today’s adversaries are exploiting something far more expansive:...