Streamlining Compliance with OMB Mandates The Office of Management and Budget (OMB) has mandated federal agencies to maintain a detailed inventory of their Internet of Things (IoT) and Operational...
“NSA and CISA encourage network defenders to implement the recommendations found within the Mitigations section of this advisory… to reduce the risk of malicious actors exploiting the identified misconfigurations.” – CISA...
Just last week, CISA confirmed that the systems exploited in the attack on the Municipal Water Authority of Aliquippa were Unitronics programmable logic controllers (PLCs). These PLCs are used in the water...
Originally published as commentary for the FCC, Phosphorus Chief Strategy Officer Sonu Shankar writes in response to Commissioner Simington, advocating further for a new security model of Shared Responsibility....
New guidance from the FDA has rolled out covering how medical devices are developed and maintained by their manufacturers. In this article for Chief Healthcare Executive, Phosphorus VP of...
What to know about the new Directive requiring asset visibility and vulnerability detection by April 2023 With the announcement of Binding Operational Directive (BOD 23-01): Improving Asset Visibility and...
OpenSSL.org announced last week that an updated version of its OpenSSL software package (v3.0.7) will be released on November 1, 2022. The update is expected to include a fix...
As the overall extended Internet of Things (xIoT) attack surface expands, connected devices are increasingly becoming attractive targets for threat actors to establish initial beachheads, facilitate lateral movement and...
“Everything is becoming a computer… If it’s smart, it’s vulnerable.” – Mikko Hypponen, Chief Research Officer at F-Secure The enterprise attack surface of today has quickly evolved beyond traditional...
In February 2017, the FBI reported that a hacker using the alias Stackoverflowin compromised over 160,000 printers by scanning for printers open on ports 515, 631, and 9100. Stackoverflowin sent...
While the zero trust security model is not new, it has certainly cemented itself as cybersecurity’s hottest buzzword. Following a National Institute of Standards and Technology (NIST) and National...
Delivering secure, compliant infrastructure solutions and robust connectivity
Leading data center providers are now leveraging xTended Internet of Things (xIoT) devices – including IoT and OT Cyber-Physical Systems – more extensively than ever across local and global facilities.
Enhance the customer experience and maintain a secure, compliant xIoT environment
With the proliferation of smart devices and connected technologies in the retail and hospitality sectors, businesses are increasingly integrating xTended Internet of Things (xIoT) devices to enhance customer experiences and streamline operations.