Are you curious about the evolving world of cybersecurity, virtual CISOs, and their vital role in different industries? In this episode, Brian and John are joined by cross-vertical vCISO...
Content Warning: This episode contains explicit language and references to criminal activity.In this episode, Brian and John are joined by a very special guest—John Threat, also known as John...
She’s no slacker. Danielle Jablanski has been an “expert” — she hates that word — in nuclear policy analysis (the “original Cyber-Physical System”), energy research, and now Nozomi Networks,...
Susan Peterson Sturm joins Brian Contos and John Vecchi on the IoT Security Podcast to discuss the importance of understanding specific features needed for different teams in IoT security....
Find the line between man and machine with John, Brian, and guest Len Noe, technical evangelist. Len, the personification of transhumanism and the future of human-machine integration, host to...
What is security? Our guest here, Patrick Benoit, Global CISO for Brinks, thinks about that a lot, working for a company with 165 years in the space. From reinforced...
The passion for cybersecurity can arise at any moment. For our guest Andres Andreu, he started his career in software engineering, but that path was not to be. His...
Ron Kuriscak is here to share his extensive knowledge and experiences in the world of IoT security, and has he got some great stories! Ron brings over 20 years...
Huddled in a corner, away from the lights and sounds of the slots, John and Brian reminisce about the Black Hat USA conferences gone by and what trends and...
Over the past 17 years, Kelly Jackson Higgins, editor-in-chief at Dark Reading, has watched the cybersecurity industry explode. She brings a unique perspective to the podcast in discussion with...
It’s cyber all day, every day, with Chase Cunningham, Dr. Zero Trust himself. He joins John and Brian to delve into the complex and ever-evolving world of online security...
SCHEDULE YOUR FREE 15-30-60 xIoT CHALLENGE WORKSHOP
Commit to securing and managing your entire xIoT attack surface without a massive time commitment. Request your remote or in-person half-day 15-30-60 xIoT Challenge Workshop for (AGENDA FROM HUCK).
SCHEDULE YOUR WORKSHOP
TAKE THE 15-30-60 xIoT CHALLENGE
Do you Meet the 15-30-60 Rule?
When you take the Challenge, Phosphorus comes to your door for a live 15-30-60 Proof-of-Value Engagement. Together, we will establish…
Discovery of your xIoT assets as fast as 15 minutes
Hardening within 30 minutes
Remediation, safely and efficiently, in as little as 60 minutes
And we'll empower your organization to reduce xIoT threat risk with just one session.
TAKE THE CHALLENGE
Take the Challenge
The most comprehensive xIoT Security Management Platform for Manufacturing
Unified xIoT Security Management Platform for OT, ICS, and IIoT Cyber-Physical Systems.
Delivering secure, compliant infrastructure solutions and robust connectivity
Leading data center providers are now leveraging xTended Internet of Things (xIoT) devices – including IoT and OT Cyber-Physical Systems – more extensively than ever across local and global facilities.
Enhance the customer experience and maintain a secure, compliant xIoT environment
With the proliferation of smart devices and connected technologies in the retail and hospitality sectors, businesses are increasingly integrating xTended Internet of Things (xIoT) devices to enhance customer experiences and streamline operations.