CISA’s latest joint advisory exposes a trend security teams have long suspected: pro-Russian hacktivist groups are exploiting unintentionally exposed industrial control interfaces to disrupt critical infrastructure. These groups lack...
Amazon Threat Intelligence has released new findings that should concern every organization operating connected devices. Presented at CYBERWARCON 2025 and detailed in Amazon’s security blog, the research outlines how...
Healthcare has never been more connected or more exposed. While IT systems have long been the focal point of cybersecurity programs, today’s adversaries are exploiting something far more expansive:...
In October 2025, thieves stole eight priceless jewels from the Louvre Museum in under ten minutes. They climbed a balcony, broke a window, and vanished before guards could respond.The...
NASHVILLE, TN — September 4, 2025 — Phosphorus, the leading provider of proactive security and management for the extended Internet of Things (xIoT), today announced the promotion of Brett...
For too long, cybersecurity in the Cyber-Physical Systems (CPS) world has been conducted in the dark: vendors promising “visibility,” hiding their prices, and leaving customers with partial answers and...
In 2025, attackers no longer need zero-day exploits. They don’t need insider access. All they need is a device still running with its factory-set credentials. Default usernames and passwords...
For too long, vulnerability management has relied on CVSS scores alone to guide remediation priorities. But as CISOs and vulnerability managers know, severity does not equal risk. A “critical”...
This past weekend, airports across Europe, including Brussels, London Heathrow, and Berlin, were hit by a cyberattack that rippled far beyond the continent. Flight delays and cancellations cascaded into...
The dynamic evolution of hacker culture, the ongoing transformation of cybersecurity conferences, and the importance of resilience and curiosity among security researchers are all topics covered in this episode...
NASHVILLE, TN — September 4, 2025 — Phosphorus, the leading provider of proactive security and management for the extended Internet of Things (xIoT), today announced the promotion of Brett...
As outlined in the advisory, advanced persistent threat (APT) actors sponsored by the Chinese government systematically compromise infrastructure sectors, including telecommunications, transportation, government, and military, to build a global...
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
IoT and OT visibility, remediation, and management for Data Centers
Mitigate risk, maintain trust, and ensure compliance for your customers with visibility, remediation, and management for every IoT and OT asset.
Book your Demo Today
The information you provide may be used to send you updates from Phosphorus Cybersecurity. You may opt-out at any time. By submitting this form, you are agreeing to our privacy policy.
RSVP for Bi-Weekly Events Today
RSVP for Bi-Weekly Events Today
RSVP for Bi-Weekly Events Today
Life Science
Unified xIoT Security Management Platform for OT, ICS, and SCADA Cyber-Physical Systems.
Critical Infrastructure
Unified xIoT Security Management Platform for OT, ICS, and SCADA Cyber-Physical Systems.
Comprehensive xIoT Security Management for Oil & Gas
Unified xIoT Security Management Platform for OT, ICS, and SCADA Cyber-Physical Systems.
Enhance the customer experience and maintain a secure, compliant xIoT environment
With the proliferation of smart devices and connected technologies in the retail and hospitality sectors, businesses are increasingly integrating xTended Internet of Things (xIoT) devices to enhance customer experiences and streamline operations.
Delivering secure, compliant infrastructure solutions and robust connectivity
Leading data center providers are now leveraging xTended Internet of Things (xIoT) devices – including IoT and OT Cyber-Physical Systems – more extensively than ever across local and global facilities.