Blog
Blogs and more
- Home
- Blogs
Russia decreases access to public internet, likely in response…
In a recent CyberNews article, Phosphorus’ Sonu Shankar weighed in on Russia’s growing digital…
OT Security Threats Aren’t Evolving. They’re Accelerating.
2025 will bring a new wave of OT malware that’s more sophisticated, scalable, and…
Will TP-Link Routers Get the TikTok Treatment?
While the TikTok ban has been staved off (for now), the debate over Chinese…
IoT Lessons We Learned in 2024
What did 2024 teach us about securing the IoT and OT landscape? In this…
DDoS Attack with 13K+ IoT Devices Reminder of Basic…
It seems that 2024 was a record-breaking year…for Mirai. Cloudflare reports having blocked the…
Set Up and Start Using the Phosphorus Integration for…
By combining Check Point’s cutting-edge platform for defending against the most sophisticated cyber-attacks with…
Phosphorus at S4x25: Elevating OT/ICS Security Management
Look at the news lately? Critical infrastructure and industrial environments have been in the…
Phosphorus Wins 2025 IoT Breakthrough Awards for “IoT Security…
Prestigious Annual IoT Breakthrough Awards Program Recognizes Standout Internet-of-Things Companies and Products NASHVILLE,…
A PLC Might Say “Oh No”: Unlocking Comprehensive Asset…
In this episode, host and xIoT security evangelist John Vecchi sits down with Enrique…
These Agencies Need Help: IoT Security is MIA
The deadline was the end of 2024. However, several federal agencies missed their recent…
Proposed TP-Link Router Ban More About Politics Than Exploitation…
Even as U.S. government agencies contemplate a ban on TP-Link routers, two-thirds of Americans…
FBI Issues Warning on Exploitation of xIoT Devices: Implications…
On December 16, 2024, the FBI issued a Private Industry Notification (PIN) alerting organizations…
Strategies for Industrial Resilience: Insights from Mark Mattei
In this episode, Mark Mattei, Global Director of Industrial Managed Security Services at 1898…
OIG Report Identifies Security Flaws in Water Systems
The issues described in the EPA OIG report are as much cultural as they…
Building a Bridge Across the Divide: The Intersection of…
Emphasizing the importance of collaboration and communication, Mike Holcomb shares his extensive experience and…
Critical Infrastructure Security: From Awareness to Action with Khris…
Recent years have seen a growing awareness of the vulnerabilities in our critical infrastructure…
Take the Path to Secure OT with Patrick Gillespie
Let’s welcome Patrick Gillespie, OT Practice Lead at GuidePoint Security and previous guest of…
Secure Software Development Gets a Push from CISA
In the wake of the CrowdStrike incident, the US Cybersecurity and Infrastructure Security Agency…
Phosphorus Recognized as a CRN® 2024 Stellar Startup!
NASHVILLE, TENN. – November 11, 2024 – Phosphorus Cybersecurity Inc., the leading provider of…
What Can Australian Businesses Do Before the Cyber Security…
Australia’s ambitious Cyber Security Act, its first standalone piece of cybersecurity legislation, introduces new…
Guarding the Gateways: Tackling IoT Vulnerabilities in Critical Systems…
Businesses and government organizations have seen threats to critical US infrastructure on the rise…
See through the mask of spoofing MAC addresses!
Don’t get scared, but we’re going to talk about all manner of hauntings. From…
CISA Looks to Global Cooperation for Strategic Plan Against…
The Cybersecurity and Infrastructure Security Agency (CISA) unveiled its global plan for partnering internationally…
New CISA-DHS Guidance: Prepare for Quantum Risks…or Focus on…
As quantum computing evolves, so do our conversations around security. Yet, John Terrill, CISO…
Is the ROUTERS Act’s Scope Too Narrow?
The ROUTERS Act, now in the hands of the Senate, could bring about a…
Anniversary: TSA’s cybersecurity groundwork for the rails
On the anniversary of the TSA’s updates to cybersecurity requirements for passenger and freight…
Iranian attackers use brute force, target critical infrastructure
You could call the brute force used by Iranian threat actors to compromise organizations…
Strengthening Your xIoT Security Strategy: How Phosphorus Aligns with…
In today’s hyper-connected world, cybersecurity isn’t just a concern—it’s a necessity. Organizations across industries…
Chinese State-Linked Cyberattack Raises Concerns Over National Security, Infrastructure
Attribution is still unclear, but The Wall Street Journal reported over the weekend that…
Phosphorus Expands Footprint into Asia Pacific and Japan
New Leadership Team to Drive Strategic Expansion and Growth NASHVILLE, Tenn.—Phosphorus Cybersecurity Inc., the…
How feasible is the ROUTERS Act?
Following the state of geopolitical conflicts and recent displays of weaponized technology, IoT security…
CISA’s Threat Sharing in a Death Spiral, says John…
A recent report indicates that participation in the Cybersecurity and Infrastructure Security Agency’s (CISA)…
Finding Your ‘Creative Maliciousness’: John Terrill guests on Security…
In this episode of the Security Breach podcast from Manufacturing.net, Phosphorus CISO John Terrill…
China-backed Salt Typhoon Reportedly Targets ISPs, Sets “New Expectation”
A Chinese government-linked threat group has reportedly infiltrated critical US networks, this time focusing…
FERC Proposal Means a Reassessment of Your Risk Management…
The Federal Energy Regulatory Commission (FERC) is proposing new requirements for new or modified…
National Security Concerns Over Chinese- and Russian-made Car Software…
As reported by the Techstrong ITSM, the Biden Administration proposed a ban on Chinese…
Solid but Challenging: CISA’s FOCAL Plan
CISA, the US Cybersecurity and Infrastructure Security Agency, has recently released a plan to…
Concerns Reported Over Connected Cranes at US Seaports
While the United States continues to find ways to shore up the cyber-resilience of…
Perspective: CISA’s Federal Cybersecurity Alignment
Some experts say that CISA’s FOCAL plan to align the cyber defenses of government…
Phosphorus Named to the First IT-Harvest Cyber 150
Phosphorus is one of the fastest-growing companies in cybersecurity today! Richard Stiennon and IT-Harvest…
Information Weekly: Pattern of Critical Infrastructure Disruption
Following last Wednesday’s revelation about a cyberattack incident at Halliburton, a big player in…
Unraveling FrostyGoop: The ICS Malware Threatening Global Industrial Operations
Recent revelations about a novel malware strain named FrostyGoop have sent shockwaves through the cybersecurity community,…
From Vulnerabilities to Visibility: Enhancing OT Network Security with…
Explore the intricate challenges and solutions in managing OT security, particularly emphasizing the importance…
Navigating the Convergence: Securing OT in a Connected World
In this episode, we’re diving deep into the world of Operational Technology (OT) and…
Phosphorus Launches the “15-30-60 xIoT Challenge” at RSAC 2024,…
NASHVILLE, TN – Phosphorus Cybersecurity Inc., the leading provider of unified, prevention-based security management…
Phosphorus Brings the Industry’s Only Proactive Cyber-Physical System (CPS)…
Phosphorus brings its Mobile xIoT Security Lab and Gartner-recognized Unified xIoT Security Management Platform…
Phosphorus Appoints Osama AlZoubi as Regional Vice President of…
Former Cisco CTO for the Middle East and Africa will lead the company’s expansion…
Phosphorus Appoints Mike Sullivan as President of Worldwide Field…
Former CrowdStrike and Tanium leader brings decades of experience building and scaling disruptive security…
Accelerating Federal Cybersecurity in the IoT/OT Landscape
Streamlining Compliance with OMB Mandates The Office of Management and Budget (OMB) has mandated…
Phosphorus’ Cyber-Physical System (CPS) Protection Platform Empowers Federal Agencies…
NASHVILLE, TENN. – Phosphorus Cybersecurity Inc., the leading provider of unified, prevention-based security management…
Phosphorus to Showcase (un)Believable Advances in Proactive OT/ICS Security…
The award-winning Cyber-Physical System protection pioneer is debuting new cutting-edge capabilities for finding, fixing,…
Unlocking Resilient Cybersecurity Solutions in Healthcare and Beyond with…
Are you curious about the evolving world of cybersecurity, virtual CISOs, and their vital…
Securing Critical Infrastructure: Challenges and Strategies with Sean Tufts
Sean Tufts is in the house, and we ask him to go all the…
US Hearing on Destructive Critical Infrastructure Attacks Highlights Urgent…
Risk of Nation-States causing real-world harm to U.S. water, electrical, and transportation systems requires…
The Evolution of Hacking: From Counterculture to Cybersecurity with…
Content Warning: This episode contains explicit language and references to criminal activity.In this episode,…
2024 Outlook: Vectors of attack in Healthcare
As 2024 looms ahead, cybersecurity experts examine current trends and how they may evolve…
Phosphorus Raises $27 Million Series A2 Financing Round led…
The new funding further validates Phosphorus’ market-leading approach to proactively securing and managing a…
Why CISA’s Plea to Network Defenders is a Forewarning…
“NSA and CISA encourage network defenders to implement the recommendations found within the Mitigations section of…
CISA and the WaterISAC respond to the Aliquippa cyberattack
Just last week, CISA confirmed that the systems exploited in the attack on the…
Phosphorus’s Cyber-Physical System (CPS) Protection Platform Matches CISA Mitigation…
NASHVILLE, TN – Phosphorus, the leading provider of unified security management and breach prevention…
The Case for “Shared Responsibility” in IoT Security
Originally published as commentary for the FCC, Phosphorus Chief Strategy Officer Sonu Shankar writes…
Phosphorus Wins the Winter 2023 Intellyx Digital Innovator Award
NASHVILLE, TN – Phosphorus, the leading provider of unified security management and breach prevention…
Doosan Digital Innovation Announces Strategic Partnership with Phosphorus Cybersecurity
NASHVILLE, TN – Doosan Digital Innovation (Justin Park, CEO of DDI) has partnered with Phosphorus…
The “Original Cyber-Physical System”: Legacy Devices and Key Trends…
She’s no slacker. Danielle Jablanski has been an “expert” — she hates that word…
Phosphorus Partners with Check Point to Provide Unprecedented xIoT…
NASHVILLE, TN – Phosphorus, the leading provider of unified security management and breach prevention…
Phosphorus Releases Mitigation Solutions for Critical Cisco IOS XE…
Amid active exploitation of CVE-2023-20198, Phosphorus is releasing a new platform capability that enables…
User-Centric Security: Focusing on UX, Design, and Embedding Security…
Susan Peterson Sturm joins Brian Contos and John Vecchi on the IoT Security Podcast…
Implants, Innovation, and the Human Condition: Embracing the Technological…
Find the line between man and machine with John, Brian, and guest Len Noe,…
Interview: Are your IoMT devices using default passwords?
IoT and IoMT devices may comprise 20% to 30% of a healthcare organization’s attack…
The Human Component: Vulnerabilities and Leadership with Patrick Benoit…
What is security? Our guest here, Patrick Benoit, Global CISO for Brinks, thinks about…
Lab in a Box: Representing the Cyber-Physical Systems category…
It’s one thing to hear how we find, fix, and monitor every xIoT device.…
Cross-functional teams participate in annual Hack Week
Teams of engineers, customer success managers, designers — you name it — gathered at…
Hiding Inside Devices: Unveiling Vulnerabilities in Finance, Retail, and…
The passion for cybersecurity can arise at any moment. For our guest Andres Andreu,…
Lessons from the Frontlines: Ron Kuriscak’s Experiences with IoT…
Ron Kuriscak is here to share his extensive knowledge and experiences in the world…
Insuring Cyber Podcast: Sonu Shankar on the Proposed U.S.…
In a two-part episode of the Insuring Cyber Podcast, Elizabeth Blosfield interviews Sonu Shankar,…
Live from Las Vegas: the Black Hat experience
Huddled in a corner, away from the lights and sounds of the slots, John…
Phosphorus Cybersecurity Appoints Sonu Shankar to Chief Strategy Officer
Phosphorus, the leading provider of unified security management and breach prevention for the xTended Internet…
It Only Takes One: Navigating Vulnerabilities with Dark Reading’s…
Over the past 17 years, Kelly Jackson Higgins, editor-in-chief at Dark Reading, has watched…
The FDA’s new medical device guidelines: 4 things to…
New guidance from the FDA has rolled out covering how medical devices are developed…
Unmasking Cybersecurity with Dr. Zero Trust: A Conversation with…
It’s cyber all day, every day, with Chase Cunningham, Dr. Zero Trust himself. He…
Phosphorus Included in the 2023 Gartner® Market Guide for…
NASHVILLE, TN – Phosphorus, the leading provider of unified security management and breach prevention…
Protecting your network from insider threats with Tammy Hawkins
In this episode, Tammy Hawkins, a fraud specialist with over 20 years of experience,…
SaaSy Services and Combatting Disruption with Vignesa Moorthy
Brian and John sit down to the mic with Vignesa Moorthy. With a seasoned…
The Privacy Paradox with Anna Maria Mandalari
Are you tired of feeling helpless and exposed when using IoT devices? Have you…
Microsoft Warns About China Hacking, CNBC Talks to Chris…
The code can’t tell us motive, but the people can. What’s the threat from…
The Next Wave: AI, Infrastructure, and IoT with Mark…
In this episode, John and Brian talk with Mark Weatherford, a skilled cybersecurity veteran…
Phosphorus Poised for Record Growth with Appointment of New…
Security industry veteran Shawn O’Brien will lead the company’s global sales and field operations…
Hackers, Researchers, and Industry Tackle Security Challenges with IoT…
In this episode, Brian and John dive into the world of Capture the Flag…
Mastering IoT Security with Julie Tsai: Lessons from a…
In this episode, Brian and John speak with Julie Tsai. Julie Tsai is a…