Learn How to Uncover Banned Chinese Devices Before Attackers Do
Phosphorus Cybersecurity blue logo
  • Platform
  • Partners
  • Resources
  • Company
  • Support
Get a Demo — it's free
  • Blog
  • News
  • Press Releases
  • Events
Mobile Phosphorus blue logo
  • Platform
    • FIND
      • Intelligent Active Discovery
      • Risk Assessment
      • Global Device Network
    • FIX
      • Password Management
      • Firmware Management & Remediation
    • MANAGE
      • Detect & Response
  • Industry
    • Healthcare
    • Data Centers
    • Banking & Finance
    • Retail
  • Partners
    • Integrations
    • Phosphorus and Check Point
    • Phosphorus and Microsoft Sentinel
    • Phosphorus and ServiceNow
    • Phosphorus and Axonius
    • Phosphorus and CyberArk
    • Become a Partner
  • Resources
    • Resource Center
    • IoT Security Podcast
    • Blog
    • In the News
    • Events
  • Company
    • Why Phosphorus?
    • About us
    • Leadership
    • Careers
  • Pricing
  • Get a Demo
Get a Demo — it's free

xIoT Research

xIoT: Defined. Discussed. Secured.

  • September 8, 2022
  • Author Phosphorus Cybersecurity
xIoT-graphic-2022

Version Releases

Phosphorus Expands xIoT Security Platform with New Device Hardening Actions and Configuration Management Capabilities

  • October 6, 2022
  • Author Sonu Shankar

Security Trends

Finding Your ‘Creative Maliciousness’: John Terrill guests on Security Breach

  • September 26, 2024
  • Author Phosphorus Cybersecurity

Interview: Are your IoMT devices using default passwords?

  • October 2, 2023
  • Author Phosphorus Cybersecurity

StrategicCIO360: Protecting Your Company From IoT Threats

  • February 3, 2023
  • Author Chris Rouland

Achieving Zero Trust in IoT

  • January 24, 2023
  • Author Phosphorus Cybersecurity
Phosphorus Blog
Phosphorus Cybersecurity November 6, 2025

The Louvre’s IP Camera Password Was “LOUVRE.” Yours Might Be Worse.

In October 2025, thieves stole eight priceless jewels from the Louvre Museum in under ten minutes. They climbed a balcony, broke a window, and vanished before guards could respond.The...
Phosphorus Blog
Phosphorus Cybersecurity November 3, 2025

Declaring Independence: Why Phosphorus Is Ending the Era of Opaque Pricing and Passive Discovery

For too long, cybersecurity in the Cyber-Physical Systems (CPS) world has been conducted in the dark: vendors promising “visibility,” hiding their prices, and leaving customers with partial answers and...
Phosphorus Blog
Phosphorus Blog
Phosphorus Cybersecurity October 2, 2025

It’s 2025. Are You Ok With Default Passwords?

In 2025, attackers no longer need zero-day exploits. They don’t need insider access. All they need is a device still running with its factory-set credentials. Default usernames and passwords...
Phosphorus Blog
Phosphorus Cybersecurity September 24, 2025

Context is King: Understanding and Reducing xIoT Risk with KEV and EPSS

For too long, vulnerability management has relied on CVSS scores alone to guide remediation priorities. But as CISOs and vulnerability managers know, severity does not equal risk. A “critical”...
Phosphorus Blog
Phosphorus Blog
Phosphorus Cybersecurity September 22, 2025

Global Aviation Disruptions Highlight Urgent Need for xIoT Security Hygiene

This past weekend, airports across Europe, including Brussels, London Heathrow, and Berlin, were hit by a cyberattack that rippled far beyond the continent. Flight delays and cancellations cascaded into...
Podcast
Podcast
Phosphorus Cybersecurity September 16, 2025

Hacking Culture, Community, and Curiosity: Evolving Security Research in a Modern World

The dynamic evolution of hacker culture, the ongoing transformation of cybersecurity conferences, and the importance of resilience and curiosity among security researchers are all topics covered in this episode...
Phosphorus Blog
Phosphorus Blog
Phosphorus Cybersecurity August 28, 2025

Banned Devices, Hidden Threats: Saluting the NSA’s Latest Guidance on Banned Chinese Device Threats

As outlined in the advisory, advanced persistent threat (APT) actors sponsored by the Chinese government systematically compromise infrastructure sectors, including telecommunications, transportation, government, and military, to build a global...
Podcast
Podcast
Phosphorus Cybersecurity August 26, 2025

Bridging Worlds: The Evolving Landscape of IoT Security and Regulation

Aseem Jakhar, Cybersecurity Entrepreneur, Technologist, and Founder of EXPLIoT, joins Phillip Wylie to address the current state and evolution of IoT and hardware security, examining why security has lagged...
Phosphorus Blog
Phosphorus Blog
Phosphorus Cybersecurity July 31, 2025

The Hidden Security Crisis: Why Your IoT Devices Are Handing Attackers the Keys to Your Network

Take the recent case where the Akira ransomware group successfully deployed ransomware across a corporate network after their initial Windows-based attack was blocked by Endpoint Detection and Response (EDR)...
Podcast
Podcast
Phosphorus Cybersecurity July 29, 2025

Breaking Down Barriers: Making IoT and Hardware Hacking Accessible to All with Andrew Bellini

The episode centers on the challenges and opportunities in IoT and OT security, with insights from technical content creator, hardware hacker, and educator Andrew Bellini. It highlights the often-overlooked...
IoT cybersecurity news Phosphorus Blog
IoT cybersecurity news Phosphorus Blog
Phosphorus Cybersecurity July 21, 2025

Identifying Banned Chinese Devices in Your Environment

On Friday, July 18, 2025, U.S. Secretary of Defense Pete Hegseth ordered a two-week review of Pentagon cloud contracts after reports indicated that Chinese engineers had been hired to...
Podcast
Podcast
Phosphorus Cybersecurity July 15, 2025

Building IoT Trust: Budgeting, Community, and the Hacker Mindset with Ted Harrington

Ted Harrington (Founder of IoT Village, Executive Partner for Independent Security Evaluators, Author, Speaker, and Podcaster) examines the ongoing challenges and progress in IoT security, emphasizing how community initiatives,...
  • 1
  • 2
  • 3
  • 4
  • 5
Full Phosphorus Logo
Phosphorus Cybersecurity® is the industry’s only xIoT discovery and remediation platform.
Linkedin Youtube
Solutions
  • xIoT Security Management
  • Intelligent Active Discovery
  • Global Device Network
  • Manage and Monitor
  • Partners
Industry
  • Healthcare
  • Data Centers
  • Retail & Hospitality
  • Banking & Finance
Resources
  • All Resources
  • Blog
  • In the News
  • Data Sheets
  • Events
Contact
  • Support
  • Request a Demo
  • Terms of Service
  • Privacy Policy
Copyright © Phosphorus Cybersecurity 2025. All Rights Reserved.
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Sign up for our newsletter

RSVP for Bi-Weekly Events Today

BOOK YOUR DEMO

IoT and OT visibility, remediation, and management for Data Centers

Mitigate risk, maintain trust, and ensure compliance for your customers with visibility, remediation, and management for every IoT and OT asset.

Book your Demo Today



The information you provide may be used to send you updates from Phosphorus Cybersecurity. You may opt-out at any time. By submitting this form, you are agreeing to our privacy policy.

RSVP for Bi-Weekly Events Today

RSVP for Bi-Weekly Events Today

RSVP for Bi-Weekly Events Today

Life Science

Unified xIoT Security Management Platform for OT, ICS, and SCADA Cyber-Physical Systems.

Critical Infrastructure

Unified xIoT Security Management Platform for OT, ICS, and SCADA Cyber-Physical Systems.

Comprehensive xIoT Security Management for Oil & Gas

Unified xIoT Security Management Platform for OT, ICS, and SCADA Cyber-Physical Systems.

Learn More

Smart Cities

Unified xIoT Security Management Platform for OT, ICS, and SCADA Cyber-Physical Systems.

Comprehensive xIoT Security Management for Energy & Utilities

Unified xIoT Security Management Platform for OT, ICS, and SCADA Cyber-Physical Systems.

Learn More

Enhance the customer experience and maintain a secure, compliant xIoT environment

With the proliferation of smart devices and connected technologies in the retail and hospitality sectors, businesses are increasingly integrating xTended Internet of Things (xIoT) devices to enhance customer experiences and streamline operations.

Learn More

Delivering secure, compliant infrastructure solutions and robust connectivity

Leading data center providers are now leveraging xTended Internet of Things (xIoT) devices – including IoT and OT Cyber-Physical Systems – more extensively than ever across local and global facilities.

Learn More

xIoT Security for Financial Services

Firms that don’t invest in securing their digital resources are exposed and liable for security breaches in the unmonitored xIoT landscape.

Learn More

 

The most comprehensive xIoT Security Management Platform for Manufacturing

Unified xIoT Security Management Platform for OT, ICS, and IIoT Cyber-Physical Systems.

Learn More

The most comprehensive xIoT Security Management Platform for Healthcare

Proactively FIND, FIX, and MANAGE every IoT, OT, and IoMT device.

Learn More


Register Now for The Phosphorus S4x24 Happy Hour





Phosphorus (un)Believable Tour