Endpoint Security,
Events,
Fraud Management & Cybercrime
Insights from Phosphorus Cybersecurity’s Phillip Wylie on Asset Inventory and Password Hygiene
Recent developments in endpoint security have inadvertently led to a shift in attack strategies by cybercriminals, who are beginning to exploit Internet of Things (IoT) devices to infiltrate corporate networks. This concerning trend highlights an evolution in tactics as connected devices are increasingly recognized as viable pathways for cyber intrusions.
Phillip Wylie, xIoT security evangelist at Phosphorus Cybersecurity, pointed out a telling incident involving the Akira ransomware group that underscores this shift. “They were unable to penetrate traditional endpoints due to robust detection systems,” he explained. “Instead, they leveraged malware hidden within a compromised camera to gain an SMB share access to the network, revealing a significant oversight by IT and cybersecurity teams.”
Organizations often harbor misplaced trust in their own hardware, neglecting the potential vulnerabilities associated with IoT devices. Basic security protocols, such as credential rotation and vulnerability patching, are frequently overlooked for these devices, despite their critical role in an organization’s security posture. This negligence has left many enterprises exposed to threats they had not anticipated.
In a recent video interview at the RSAC Conference 2025, Wylie elaborated on several key concerns regarding IoT security. These included the ramifications of shadow IT practices that undermine air-gapped protections for operational technology systems, as well as the elusive challenge of maintaining good password hygiene for connected devices. He emphasized the imperative need for stringent asset inventory practices within IoT security programs to mitigate risks.
Wylie brings over 27 years of experience in IT and cybersecurity, having previously served as an adjunct instructor at Dallas College and as the founder of The Pwn School Project and Defcon Group 940. His expertise spans various areas, including network security, application security, and penetration testing, equipping him with a broad perspective on cybersecurity challenges.