Learn How to Uncover Banned Chinese Devices Before Attackers Do
Phosphorus Cybersecurity blue logo
  • Platform

    FIND

    Intelligent Active Discovery

    Safely & actively discover, classify & assess every xIoT device.

    Risk Assessment

    Know the state of your Things as part of the device interrogation process.

    Global Device Network

    Providing the broadest & most extensible cyber-physical system device coverage.

    FIX

    Password Management

    Proactively update & rotate credentials.

    Patch Management & Remediation

    Remediate vulnerabilities at scale; maintain complete control.

    MANAGE

    Detect & Response

    Keep an eye on your xIoT with in-depth alert actions.

    PLATFORM

    Linkedin X-twitter Youtube

    contact us

    customer support

    partner portal

  • Industry

    INDUSTRY USE CASES

    Healthcare

    Proactively find, fix, and monitor every IoMT, OT, and IoT device.

    Banking & Finance

    xIoT Security for Financial Services. Eliminate your xIoT security gap.

    .

    Data Centers

    Delivering secure infrastructure solutions & robust connectivity.

    Retail & Hospitality

    Enhance the customer experience & maintain a secure xIoT environment.

    .

    Manufacturing

    Secure your OT, ICS, and IIoT Cyber-Physical Systems.

    Linkedin X-twitter Youtube

    contact us

    customer support

    partner portal

  • Partners

    PARTNERS

    • Integration Partners
    • Become a Partner
    • Partner Portal Access

    INTEGRATION PARTNERS

    • CheckPoint logoPhosphorus and Check Point
    • Microsoft Sentinel logo Phosphorus and Microsoft Sentinel
    • ServiceNow logo Phosphorus and ServiceNow
    • CyberArk logo Phosphorus and CyberArk
    • Axonius logo Phosphorus and Axonius

    BECOME A PARTNER

    Our global network of exclusive Enterprise Security Partners is at the heart of what makes Phosphorus successful.

    BECOME A PARTNER TODAY
    Linkedin X-twitter Youtube

    contact us

    customer support

    partner portal

  • Resources

    LEARN

    Resource Center

    Latest use cases, whitepapers, solution briefs, and more.

    Blog

    Insights and updates on xIoT security trends and strategies.

    .

    Case Studies

    See how Phosphorus helps secure the world's Cyber-Physical Systems.

    IoT Security Podcast

    Join the conversation for the IoT Security Podcast.

    MORE RESOURCES

    • Blog
    • In the News
    • Press Releases
    • Events
    Linkedin X-twitter Youtube

    contact us

    customer support

    partner portal

  • Company

    About Us

    xIoT Security? We know a Thing or two.

    Leadership

    Our leaders have a proven ability to solve big problems.

    Careers

    Be a part of a dynamic team that is building something great.

    Phosphorus Labs

    Delivers threat research, security analysis, and assessments.

    Support

    Get technical assistance and resources from our support team.

    Request a Demo

    See the Phosphorus xIoT platform in action today.

    Linkedin X-twitter Youtube

    contact us

    customer support

    partner portal

  • Pricing
Get a Demo
Phosphorus Cybersecurity blue logo
Get a Demo
  • Platform
    • FIND
      • Intelligent Active Discovery
      • Risk Assessment
      • Global Device Network
    • FIX
      • Password Management
      • Firmware Management & Remediation
    • MANAGE
      • Detect & Response
  • Industry
    • Healthcare
    • Data Centers
    • Banking & Finance
    • Retail & Hospitality
    • Manufacturing
  • Partners
    • Integrations
    • Phosphorus and Check Point
    • Phosphorus and Microsoft Sentinel
    • Phosphorus and ServiceNow
    • Phosphorus and CyberArk
    • Phosphorus and Axonius
    • Become a Partner
  • Resources
    • Resource Center
    • IoT Security Podcast
    • Blog
    • In the News
    • Events
  • Company
    • About Us
    • Careers
    • Leadership
    • Support
  • Pricing
  • Get a Demo
IoT cybersecurity news Phosphorus Blog
IoT cybersecurity news Phosphorus Blog
Phosphorus Cybersecurity July 21, 2025

Identifying Banned Chinese Devices in Your Environment

On Friday, July 18, 2025, U.S. Secretary of Defense Pete Hegseth ordered a two-week review of Pentagon cloud contracts after reports indicated that Chinese engineers had been hired to...
IoT cybersecurity news Phosphorus Blog
IoT cybersecurity news Phosphorus Blog
Phosphorus Cybersecurity June 3, 2025

5 Billion and Counting: How Phosphorus is Illuminating the Dark Corners of Enterprise Networks

Today marks a significant milestone in our mission to secure the Internet of Things: Phosphorus Cybersecurity has successfully scanned more than 5 billion customer IP addresses, bringing countless unknown...
IoT cybersecurity news
IoT cybersecurity news
Phosphorus Cybersecurity February 11, 2025

Russia decreases access to public internet, likely in response to cyber warfare

In a recent CyberNews article, Phosphorus’ Sonu Shankar weighed in on Russia’s growing digital isolation and what it means for cybersecurity worldwide. As the country limits its devices’ exposure...
IoT cybersecurity news Phosphorus Blog
A Security Week image. Wire frame of an industrial landscape, possibly facing increased threats of evolving OT malware
IoT cybersecurity news Phosphorus Blog
Phosphorus Cybersecurity February 6, 2025

OT Security Threats Aren’t Evolving. They’re Accelerating.

2025 will bring a new wave of OT malware that’s more sophisticated, scalable, and financially motivated than ever before. Threats like FrostyGoop, Fuxnet, and Volt Typhoon’s KV-Botnet are setting...
IoT cybersecurity news
Ry Crist/CNET
IoT cybersecurity news
Phosphorus Cybersecurity January 29, 2025

Will TP-Link Routers Get the TikTok Treatment?

While the TikTok ban has been staved off (for now), the debate over Chinese influence in technology rages on.
IoT cybersecurity news Phosphorus Blog
Different colored clouds contains groups of IoT devices connect down to a city skyline. The Manufacturing.net logo appears in the top left.
IoT cybersecurity news Phosphorus Blog
Phosphorus Cybersecurity December 30, 2024

These Agencies Need Help: IoT Security is MIA

The deadline was the end of 2024. However, several federal agencies missed their recent deadlines to meet requirements for IoT cybersecurity programs specifically referred to in a law passed...
IoT cybersecurity news
IoT cybersecurity news
Phosphorus Cybersecurity December 20, 2024

Proposed TP-Link Router Ban More About Politics Than Exploitation Risk

Even as U.S. government agencies contemplate a ban on TP-Link routers, two-thirds of Americans in consumer and small business rely on the Chinese brand for Wi-Fi delivery. Despite TP-Link...
IoT cybersecurity news
Water, Wastewater Cybersecurity Still Has Long Way to Go
IoT cybersecurity news
Phosphorus Cybersecurity December 5, 2024

OIG Report Identifies Security Flaws in Water Systems

The issues described in the EPA OIG report are as much cultural as they are technical, John Terrill tells Claroty Nexus. The report highlights security gaps in water and...
IoT cybersecurity news
Pushing the boulder up the hill as CISA pushes for secure software deployment
IoT cybersecurity news
Phosphorus Cybersecurity November 14, 2024

Secure Software Development Gets a Push from CISA

In the wake of the CrowdStrike incident, the US Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the Australian Signals Directorate (ASD) have issued new guidance aimed at...
IoT cybersecurity news
IoT cybersecurity news
Phosphorus Cybersecurity November 6, 2024

What Can Australian Businesses Do Before the Cyber Security Act is Finalized?

Australia’s ambitious Cyber Security Act, its first standalone piece of cybersecurity legislation, introduces new standards for smart devices, ransomware reporting, and critical infrastructure protections. The Act has yet to...
IoT cybersecurity news
IoT cybersecurity news
Phosphorus Cybersecurity November 1, 2024

CISA Looks to Global Cooperation for Strategic Plan Against Cyber Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) unveiled its global plan for partnering internationally against cyber threats and attacks. Together with the Department of Homeland Security, the State Department,...
IoT cybersecurity news
IoT cybersecurity news
Phosphorus Cybersecurity October 30, 2024

New CISA-DHS Guidance: Prepare for Quantum Risks…or Focus on Today’s Threats?

As quantum computing evolves, so do our conversations around security. Yet, John Terrill, CISO at Phosphorus, urges OT operators to focus on what matters today: building defenses against the...
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
Full Phosphorus Logo
Phosphorus Cybersecurity® is the industry’s only xIoT discovery and remediation platform.
Linkedin Youtube
Solutions
  • xIoT Security Management
  • Intelligent Active Discovery
  • Global Device Network
  • Manage and Monitor
  • Partners
Industry
  • Healthcare
  • Data Centers
  • Retail & Hospitality
  • Banking & Finance
Resources
  • All Resources
  • Blog
  • Data Sheets
  • Events
  • Sign up for our Newsletter
Contact
  • Support
  • Request a Demo
  • Terms of Service
  • Privacy Policy
Copyright © Phosphorus Cybersecurity 2025. All Rights Reserved.
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}