IoT and IoMT devices may comprise 20% to 30% of a healthcare organization’s attack surface. John Vecchi, chief marketing officer at Phosphorus Cybersecurity, discusses how healthcare IT teams can...
Teams of engineers, customer success managers, designers — you name it — gathered at Phosphorus HQ in August for the second annual Phosphorus Hack Week. A cadre of carefully...
We talk with a lot of people, and sometimes, we find that they’re not quite aware of the omnipresence of IoT devices in the workplace and beyond. And if...
The code can’t tell us motive, but the people can. What’s the threat from China? Chris Rouland says Microsoft’s warning of Chinese hacking highlights tensions in the South China...
How Do We Achieve Zero Trust in IoT? Making IoT a priority for your security teams can make all the difference in protecting your company against a myriad of...
Sean Martin, ITSP Magazine, takes a seat across the computer from Phosphorus CSO Brian Contos for an entry in the Crucial Conversations series from BlueLava Community. In this interview,...
InfoSec Live founder Simon L brings another great guest onto The CISO Experience podcast, Phosphorus Chief of Security Brian Contos! Watch the video recorded live below.
So many IoT devices – cameras, printers, door locks, backup power and so much more, collectively bringing powerful capabilities to the enterprise. Excellent for enterprises, but attackers love IoT...
Brian Contos, Phosphorus Chief Security Officer, returns to the mnemonic security podcast for the third time. “IoT security today is like what IT security was in the early 90s.”...
SCHEDULE YOUR FREE 15-30-60 xIoT CHALLENGE WORKSHOP
Commit to securing and managing your entire xIoT attack surface efficiently. Request a half-day, remote or in-person workshop to experience firsthand how the 15-30-60 rule can enhance your organization’s security without a significant time commitment.
SCHEDULE YOUR WORKSHOP
TAKE THE 15-30-60 xIoT CHALLENGE
Do you Meet the 15-30-60 Rule?
When you take the Challenge, Phosphorus comes to your door for a live 15-30-60 Proof-of-Value Engagement. Together, we will establish…
Discovery of your xIoT assets as fast as 15 minutes
Hardening within 30 minutes
Remediation, safely and efficiently, in as little as 60 minutes
And we'll empower your organization to reduce xIoT threat risk with just one session.
TAKE THE CHALLENGE
Take the Challenge
The most comprehensive xIoT Security Management Platform for Manufacturing
Unified xIoT Security Management Platform for OT, ICS, and IIoT Cyber-Physical Systems.
Delivering secure, compliant infrastructure solutions and robust connectivity
Leading data center providers are now leveraging xTended Internet of Things (xIoT) devices – including IoT and OT Cyber-Physical Systems – more extensively than ever across local and global facilities.
Enhance the customer experience and maintain a secure, compliant xIoT environment
With the proliferation of smart devices and connected technologies in the retail and hospitality sectors, businesses are increasingly integrating xTended Internet of Things (xIoT) devices to enhance customer experiences and streamline operations.