Recent years have seen a growing awareness of the vulnerabilities in our critical infrastructure to cyberattacks, particularly from nation-states like Russia, Iran, and China. In this episode of the IoT Security...
Businesses and government organizations have seen threats to critical US infrastructure on the rise in recent years, particularly within IoT and OT systems, posed by cyberattacks, notably from state...
Explore the intricate challenges and solutions in managing OT security, particularly emphasizing the importance of active querying over passive deep packet inspection, with Michael Lester, Senior Product Security Engineer...
In this episode, we’re diving deep into the world of Operational Technology (OT) and IoT security, exploring the critical challenges and evolving threat landscape that are impacting sectors from...
Are you curious about the evolving world of cybersecurity, virtual CISOs, and their vital role in different industries? In this episode, Brian and John are joined by cross-vertical vCISO...
Content Warning: This episode contains explicit language and references to criminal activity.In this episode, Brian and John are joined by a very special guest—John Threat, also known as John...
She’s no slacker. Danielle Jablanski has been an “expert” — she hates that word — in nuclear policy analysis (the “original Cyber-Physical System”), energy research, and now Nozomi Networks,...
Susan Peterson Sturm joins Brian Contos and John Vecchi on the IoT Security Podcast to discuss the importance of understanding specific features needed for different teams in IoT security....
Find the line between man and machine with John, Brian, and guest Len Noe, technical evangelist. Len, the personification of transhumanism and the future of human-machine integration, host to...
What is security? Our guest here, Patrick Benoit, Global CISO for Brinks, thinks about that a lot, working for a company with 165 years in the space. From reinforced...
The passion for cybersecurity can arise at any moment. For our guest Andres Andreu, he started his career in software engineering, but that path was not to be. His...
IoT and OT visibility, remediation, and management for Data Centers
Mitigate risk, maintain trust, and ensure compliance for your customers with visibility, remediation, and management for every IoT and OT asset.
Book your Demo Today
The information you provide may be used to send you updates from Phosphorus Cybersecurity. You may opt-out at any time. By submitting this form, you are agreeing to our privacy policy.
Happy Hour
The information you provide may be used to send you updates from Phosphorus Cybersecurity. You may opt-out at any time. By submitting this form, you are agreeing to our privacy policy.
Meet with Us
The information you provide may be used to send you updates from Phosphorus Cybersecurity. You may opt-out at any time. By submitting this form, you are agreeing to our privacy policy.
Take the Challenge
The most comprehensive xIoT Security Management Platform for Manufacturing
Unified xIoT Security Management Platform for OT, ICS, and IIoT Cyber-Physical Systems.
Delivering secure, compliant infrastructure solutions and robust connectivity
Leading data center providers are now leveraging xTended Internet of Things (xIoT) devices – including IoT and OT Cyber-Physical Systems – more extensively than ever across local and global facilities.
Enhance the customer experience and maintain a secure, compliant xIoT environment
With the proliferation of smart devices and connected technologies in the retail and hospitality sectors, businesses are increasingly integrating xTended Internet of Things (xIoT) devices to enhance customer experiences and streamline operations.